Wireless security
A wireless intrusion prevention system: Added WIPS vendors and the reason why WIPS became important
| ← Previous revision | Revision as of 10:49, 22 April 2026 | ||
| Line 99: | Line 99: | ||
A [[Wireless Intrusion Prevention System]] (WIPS) is a concept for the most robust way to counteract wireless security risks.{{Cite web|url=https://www.pcisecuritystandards.org/|title=Official PCI Security Standards Council Site|website=PCI Security Standards Council}} However such WIPS does not exist as a ready designed solution to implement as a software package. A WIPS is typically implemented as an overlay to an existing [[Wireless LAN]] infrastructure, although it may be deployed standalone to enforce no-wireless policies within an organization. WIPS is considered so important to wireless security that in July 2009, the [[Payment Card Industry Security Standards Council]] published wireless guidelines{{cite web|title= PCI DSS Wireless Guidelines|url=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_Wireless_Guidelines.pdf|access-date=2009-07-16}} for [[PCI DSS]] recommending the use of WIPS to automate wireless scanning and protection for large organizations. |
A [[Wireless Intrusion Prevention System]] (WIPS) is a concept for the most robust way to counteract wireless security risks.{{Cite web|url=https://www.pcisecuritystandards.org/|title=Official PCI Security Standards Council Site|website=PCI Security Standards Council}} However such WIPS does not exist as a ready designed solution to implement as a software package. A WIPS is typically implemented as an overlay to an existing [[Wireless LAN]] infrastructure, although it may be deployed standalone to enforce no-wireless policies within an organization. WIPS is considered so important to wireless security that in July 2009, the [[Payment Card Industry Security Standards Council]] published wireless guidelines{{cite web|title= PCI DSS Wireless Guidelines|url=https://www.pcisecuritystandards.org/pdfs/PCI_DSS_Wireless_Guidelines.pdf|access-date=2009-07-16}} for [[PCI DSS]] recommending the use of WIPS to automate wireless scanning and protection for large organizations. |
||
Several WIPS vendors were established in the early 2000s. AirDefense was founded in 2001 and later acquired by [[Motorola]] in 2008{{Cite web |last=Staff |first=Sensors |date=2008-07-30 |title=Motorola to Acquire AirDefense {{!}} Fierce Sensors |url=https://www.fiercesensors.com/components/motorola-to-acquire-airdefense |access-date=2026-04-22 |website=www.fiercesensors.com |language=en}}. Mojo Networks was founded in 2004 and later acquired by [[Arista Networks]] in 2018{{Cite news |last=Sisler |first=Whitney |title=Arista Acquires Mojo Networks - Arista |url=https://www.arista.com/en/company/news/press-release/5717-pr-20180802 |archive-url=http://web.archive.org/web/20260122234409/https://www.arista.com/en/company/news/press-release/5717-pr-20180802 |archive-date=2026-01-22 |access-date=2026-04-22 |work=Arista Networks |language=en-gb}}. With the rapid growth of Wireless LANs, WIPS became an important part of every organization's security posture. |
|||
== Security measures == |
== Security measures == |
||
| Line 117: | Line 119: | ||
{{Main|IEEE 802.1X}} |
{{Main|IEEE 802.1X}} |
||
IEEE 802.1X is the [[IEEE Standard]] [[authentication]] mechanisms to devices wishing to attach to a Wireless LAN. |
IEEE 802.1X is the [[IEEE Standard]] [[authentication]] mechanisms to devices wishing to attach to a Wireless LAN. |
||
| Line 122: | Line 125: | ||
{{Main|Wired Equivalent Privacy}} |
{{Main|Wired Equivalent Privacy}} |
||
The Wired Equivalent Privacy (WEP) [[encryption]] standard was the original encryption standard for wireless, but since 2004 with the ratification [[WPA2]] the IEEE has declared it "deprecated",{{cite web|title=What is a WEP key?|url=http://lirent.net/wifi/what-is-a-wep-key.html|publisher=lirent.net|access-date=2008-03-11|archive-date=2008-04-17|archive-url=https://web.archive.org/web/20080417005957/http://lirent.net/wifi/what-is-a-wep-key.html|url-status=dead}} and while often supported, it is seldom or never the default on modern equipment. |
The Wired Equivalent Privacy (WEP) [[encryption]] standard was the original encryption standard for wireless, but since 2004 with the ratification [[WPA2]] the IEEE has declared it "deprecated",{{cite web|title=What is a WEP key?|url=http://lirent.net/wifi/what-is-a-wep-key.html|publisher=lirent.net|access-date=2008-03-11|archive-date=2008-04-17|archive-url=https://web.archive.org/web/20080417005957/http://lirent.net/wifi/what-is-a-wep-key.html|url-status=dead}} and while often supported, it is seldom or never the default on modern equipment. |
||
| Line 158: | Line 162: | ||
'''LEAP''' |
'''LEAP''' |
||
{{Main|Lightweight Extensible Authentication Protocol}} |
{{Main|Lightweight Extensible Authentication Protocol}} |
||
This stands for the Lightweight Extensible Authentication Protocol. This protocol is based on [[802.1X]] and helps minimize the original security flaws by using WEP and a sophisticated key management system. This EAP-version is safer than EAP-MD5. This also uses MAC address authentication. LEAP is not secure; THC-LeapCracker can be used to break [[Cisco]]'s version of LEAP and be used against computers connected to an access point in the form of a [[dictionary attack]]. Anwrap and asleap finally are other crackers capable of breaking LEAP. |
This stands for the Lightweight Extensible Authentication Protocol. This protocol is based on [[802.1X]] and helps minimize the original security flaws by using WEP and a sophisticated key management system. This EAP-version is safer than EAP-MD5. This also uses MAC address authentication. LEAP is not secure; THC-LeapCracker can be used to break [[Cisco]]'s version of LEAP and be used against computers connected to an access point in the form of a [[dictionary attack]]. Anwrap and asleap finally are other crackers capable of breaking LEAP. |
||
'''PEAP''' |
'''PEAP''' |
||
{{Main|Protected Extensible Authentication Protocol}} |
{{Main|Protected Extensible Authentication Protocol}} |
||
This stands for Protected Extensible Authentication Protocol. This protocol allows for a secure transport of data, passwords, and encryption keys without the need of a certificate server. This was developed by Cisco, Microsoft, and [[RSA Security]]. |
This stands for Protected Extensible Authentication Protocol. This protocol allows for a secure transport of data, passwords, and encryption keys without the need of a certificate server. This was developed by Cisco, Microsoft, and [[RSA Security]]. |
||
| Line 184: | Line 190: | ||
{{Main|IEEE 802.11i}} |
{{Main|IEEE 802.11i}} |
||
[[WPA2]] is a WiFi Alliance branded version of the final 802.11i standard.{{cite web|title=Wi-Fi Protected Access |url=http://www.wifialliance.org/knowledge_center_overview.php?docid=4486 |publisher=[[Wi-Fi Alliance]] |access-date=2008-02-06 |url-status=usurped |archive-url=https://web.archive.org/web/20070521092851/http://www.wifialliance.org/knowledge_center_overview.php?docid=4486 |archive-date=May 21, 2007 }} The primary enhancement over WPA is the inclusion of the [[AES-CCMP]] algorithm as a mandatory feature. Both WPA and WPA2 support EAP authentication methods using RADIUS servers and preshared key (PSK). |
[[WPA2]] is a WiFi Alliance branded version of the final 802.11i standard.{{cite web|title=Wi-Fi Protected Access |url=http://www.wifialliance.org/knowledge_center_overview.php?docid=4486 |publisher=[[Wi-Fi Alliance]] |access-date=2008-02-06 |url-status=usurped |archive-url=https://web.archive.org/web/20070521092851/http://www.wifialliance.org/knowledge_center_overview.php?docid=4486 |archive-date=May 21, 2007 }} The primary enhancement over WPA is the inclusion of the [[AES-CCMP]] algorithm as a mandatory feature. Both WPA and WPA2 support EAP authentication methods using RADIUS servers and preshared key (PSK). |
||
| Line 197: | Line 204: | ||
{{Main|WLAN Authentication and Privacy Infrastructure||l2 = }} |
{{Main|WLAN Authentication and Privacy Infrastructure||l2 = }} |
||
This stands for WLAN Authentication and Privacy Infrastructure. This is a wireless security standard defined by the [[China|Chinese]] government. |
This stands for WLAN Authentication and Privacy Infrastructure. This is a wireless security standard defined by the [[China|Chinese]] government. |
||
| Line 263: | Line 271: | ||
{{Main|RADIUS}} |
{{Main|RADIUS}} |
||
''Remote Authentication Dial In User Service'' (RADIUS) is an [[AAA protocol|AAA (authentication, authorization and accounting) protocol]] used for remote network access. RADIUS, developed in 1991, was originally proprietary but then published in 1997 under ISOC documents RFC 2138 and RFC 2139.{{Cite book|title= RADIUS: Securing Public Access to Private Resources|author =Jonathan Hassell |publisher= O'Reilly Media |year=2003 |isbn= 978-0596003227|pages=15–16}}{{cite web|url=http://www.interlinknetworks.com/app_notes/History%20of%20RADIUS.pdf|title=The Beginnings and History of RADIUS|author=John Vollbrecht|year=2006|publisher=Interlink Networks|access-date=2009-04-15}} The idea is to have an inside server act as a gatekeeper by verifying identities through a username and password that is already pre-determined by the user. A RADIUS server can also be configured to enforce user policies and restrictions as well as record accounting information such as connection time for purposes such as billing. |
''Remote Authentication Dial In User Service'' (RADIUS) is an [[AAA protocol|AAA (authentication, authorization and accounting) protocol]] used for remote network access. RADIUS, developed in 1991, was originally proprietary but then published in 1997 under ISOC documents RFC 2138 and RFC 2139.{{Cite book|title= RADIUS: Securing Public Access to Private Resources|author =Jonathan Hassell |publisher= O'Reilly Media |year=2003 |isbn= 978-0596003227|pages=15–16}}{{cite web|url=http://www.interlinknetworks.com/app_notes/History%20of%20RADIUS.pdf|title=The Beginnings and History of RADIUS|author=John Vollbrecht|year=2006|publisher=Interlink Networks|access-date=2009-04-15}} The idea is to have an inside server act as a gatekeeper by verifying identities through a username and password that is already pre-determined by the user. A RADIUS server can also be configured to enforce user policies and restrictions as well as record accounting information such as connection time for purposes such as billing. |
||