Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Keeping Intruders Out Of Your WLAN: Page 4 of 5

  • Tracking Down Intruders

    If someone gets through security, the IDS has a very good chance of taking notice and performing effective countermeasures. The systems can also help find the persons implementing the malicious activity. Most of the IDSs have provisions for locating the intruders.

    For example, AirMagnet uses triangulation to pinpoint the location of unauthorized clients and access points. With this knowledge, a company can carry out pre-planned procedures that notify appropriate security personnel with information on where they can find the bad guys.

    Most IDS systems use separate sensors that a company installs throughout their facilities. For example, AirMagnet Enterprise 5.0 requires the installation of multiple AirMagnet SmartEdge sensors, which each monitor 802.11a/b/g activity in scan-only mode over a 50,000 square foot area. Up to 1,500 SmartEdge sensors interface to a single AirMagnet Enterprise Server. AirDefense has a similar solution. An advantage of using probes to perform the monitoring is that they operate aside from the operational wireless LAN.

    Some of the wireless switch systems, such as the one offered by Airespace, integrate IDS sensors into the access points. This approach is often less expensive to deploy than having dedicated sensors, assuming you install Airespace access points. The IDS data, however, must traverse the same wireless network as operational data, which could limit capacity available for higher end wireless applications. In addition, this solution is not vendor agnostic.