Showing: 1 - 6 of 8 RESULTS
CWSPStudyOverview – WIDS and WIPS

Overview – WIDS and WIPS

As you probably know, there are multiple attacks possible in the wireless world. To detect and prevent those attacks there are monitor tools like a wireless intrusion detection system (WIDS). The best solution for attacks is to prevent them. With wireless intrusion prevention system (WIPS), it is possible to mitigate attacks from, for example, rogue …

CWSPStudyWIDS and WIPS analysis and monitoring

WIDS and WIPS analysis and monitoring

In the overview WIDS/WIPS blog, I wrote of four analysis methods from the server used to collect data: – Signature analysis looks for patterns. – Behaviour analysis looks for anomalies. – Protocol analysis analyses the MAC layer information or upper layer non-encrypted frames. – Spectrum analysis analyses the RF spectrum. The WIPS/WIDS has a database …

CWSPStudyRogue detection and mitigation

Rogue detection and mitigation

A WIDS/WIPS can do device classification and recognize devices such as access points, client stations, and ad hoc clients, as long as those devices are within range of the sensors. When the devices are scanned and recognized the devices will be classified in four categories: Authorized devices: Devices that are owned by the company or …