spoofing detection. In our design, we use “passive
SYN-based OS fingerprinting” to track the wireless
stations’ OS fingerprints. This type of OS signature
analysis is similar to the one used in P0f (Zalewski,
n.d.).
Like SN tracking, passive OS fingerprinting and
tracking also has its drawbacks if used alone. Firstly,
management frames and control frames in 802.11
WLANs do not provide OS fingerprints. Secondly,
in some cases, MAC address spoofing does not need
to be run on Linux system. For example, in
Windows system with service pack 2, the MAC
address of the NIC can be changed with only a
simple configuration. Thirdly, passive OS
fingerprinting relies on SYN packets. However,
during the network communication wireless stations
do not always generate SYN packets, especially
when the station is under passive monitor mode or
when it only sends out management frames. In these
cases, no OS fingerprints are tracked, thus no alert
will be triggered by the IDS.
2.2 RSS Fingerprinting
Received Signal Strength (RSS) has been widely
used in indoor geographical location (geolocation)
and positioning systems in wireless LANs (e.g. the
RARDA system of Microsoft (Bahl and
Padmanabhan, 2000)). Some Intrusion Detection and
Response Systems, as described in (Interlink
Networks, 2000), use RSS to pinpoint the
unauthorized 802.11 wireless station and APs.
However, RSS itself has never been used as
fingerprints of 802.11 wireless devices for the
purpose of intrusion detection. It is very hard for an
attacker to modify the signal strength of his or her
wireless devices during the network transmission.
For this reason, the RSS at the physical layer is a
good signature or fingerprint for both wireless
station and AP in IDS. There are four units of
measurement to represent the RF signal strength
(Bardwell, n.d.): mW (milliwatts), dB (decibels) and
RSSI (Received Signal Strength Indicator), and a
percentage measurement.
RSSI in IEEE 802.11 standard (IEEE Wireless
LAN Standards, n.d.) is an integer value between 0-
255 (a 1-byte value). No vendors have actually
measured 256 different signal levels in their wireless
devices, so each vendor’s device will have a specific
maximum RSSI value (“RSSI_Max”). For example,
Cisco has 101 separate RSSI values for RF energy,
and their RSSI_Max is 100. RSSI is internally used
by the microcode on the wireless adapter or by the
device driver. Roaming Threshold is the point when
the wireless station is moving away from the AP and
the received signal drops to a somewhat low value,
which indicates the wireless station is roaming.
Different vendors use different RSSI values for
the Roaming Threshold, and those threshold values
are seldom released. We tested the roaming
threshold of Cisco Aironet 1200 Wireless AP, and
the RSSI value is around 97, which we implemented
in our test bed as the roaming threshold for wireless
station RSS fingerprinting and tracking. Some
protocol analysis tools, such as AiroPeek (Airopeek,
n.d.), measure RSSI as a percentage of RSSI_MAX.
2.3 Current IDSs
Many open source and commercial IDSs are
available today. Snort-Wireless (Snort Wireless,
n.d.) is a “lightweight”, rule-based and real-time
network IDS under UNIX OS. It is popular because
of its open source, which can be customized for new
detection by writing Snort rules or by adding new
preprocessors and detection rules to reflect the latest
attacks and exploits. Snort-Wireless adds several
new features for 802.11 IDS functionality to the
standard Snort distribution. These features allow one
to specify custom rules for detecting specific 802.11
frames, rogue access points and Netstumbler like
behavior (Wright, 2003). In order to accomplish this,
Snort’s rule engine has been augmented with support
for Wi-Fi. The remaining features are implemented
as preprocessors that can be configured and
customized as desired according to the different
requirements.
WiFi-Scanner (WiFi Scanner, n.d.) is an
identification scanner program under UNIX OS. It
changes the channel periodically, tries to find any
received frame on every channel, and displays them.
It uses the SN Tracking techniques discussed in the
previous section as well as the timestamp
fingerprinting technique for intrusion in the WLAN.
AirDefense (Air Defense Enterprise, n.d.) is a
complete hardware and software system consisting
of sensors deployed throughout the network, which
are interfaced to a management appliance and
administered by a management console. Their starter
kit provides five sensors and can guard up to ten
APs. AirDefense detects intruders and attacks and
also diagnoses potential vulnerabilities in the
network like mis-configurations.
Aruba Wireless Networks (Aruba Networks,
n.d.) has released a complete software and hardware
system consisting of switches, APs and its
monitoring software. It is the first company to
announce the installation of a secure wireless
SECRYPT 2007 - International Conference on Security and Cryptography
142