Specifications
IDS and DoS Alerts
RoamAbout Mobility System Software Configuration Guide 22-13
Flood Attacks
AfloodattackisatypeofDenialofServiceattack.Duringafloodattack,aroguewirelessdevice
attemptstooverwhelmtheresourcesofotherwirelessdevicesbycontinuouslyinjecting
managementframesintotheair.Forexample,arogueclientcanrepeatedlysendassociation
requeststotrytooverwhelmAPs
thatreceivetherequests.
Thethresholdfortriggeringafloodmessageis100framesofthesametypefromthesameMAC
address,withinaone‐secondperiod.IfMSSdetectsmorethan100ofthesametypeofwireless
framewithinonesecond,MSSgeneratesalogmessage.Themessage
indicatestheframetype,the
MACaddressofthesender,thelistener(APandradio),channelnumber,andRSSI.
DoS Attacks
WhenactivescanisenabledonAPs,MSScandetectthefollowingtypesofDoSattacks:
•RFJamming—ThegoalofanRFjammingattackistotakedownanentireWLANby
overwhelmingtheradioenvironmentwithhigh‐powernoise.AsymptomofanRFjamming
attackisexcessiveinterference.If
anAPradiodetects excessiveinterferenceonachannel,and
RFAuto‐Tuningisenabled,MSSchangestheradiotoadifferentchannel.
• Deauthenticateframes—SpoofeddeauthenticateframesformthebasisformostDoSattacks,
andarethebasisforothertypesofattacksincludingman‐in‐the‐middleattacks.Thesource
MACaddressisspoofedsothatclientsthinkthepacketiscomingfromalegitimateAP.Ifan
APdetectsapacketwithitsownsourceMACaddress,theAPknowsthatthepacketwas
spoofed.
•Broadcastdeauthenticateframes—Similartothespoofeddeauthenticateframeattackabove,a
broadcastdeauthenticateframe
attackgeneratesspoofeddeauthenticateframes,witha
broadcastdestinationaddressinsteadoftheaddressofaspecificclient.Theintentofthe
attackistodisconnectallstationsattachedtoanAP.
• Disassociationframes—AdisassociationframefromanAPinstructstheclienttoendits
associationwiththeAP.Theintent
ofthisattackistodisconnectclientsfromtheAP.
•Nullproberesponses—Aclient’sproberequestframeisansweredbyaproberesponse
containinganullSSID.SomeNICcardslockupuponreceivingsu chaproberesponse.
•Decrypterrors—Anexcessivenumberofdecrypterrorscanindicatethatmultipleclientsare
usingthesameMACaddress.Adevice’sMACaddressissupposedtobeunique.Multiple
instancesofthesameaddresscanindicatethataroguedeviceispretendingtobealegitimate
devicebyspoofingitsMAC address.
•FakeAP—AroguedevicesendsbeaconframesforrandomlygeneratedSSIDsor
BSSIDs.This
typeofattackcancauseclientstobecomeconfusedbythepresenceofsomanySSIDsand
BSSIDs,andthusinterfereswiththeclients’abilitytoconnecttovalidAPs.Thistypeofattack
canalsointerferewithRF Auto‐TuningwhenanAPistryingtoadjusttoits
RFneighborhood.
•SSIDmasquerade—AroguedevicepretendstobealegitimateAPbysendingbeaconframes
foravalidSSIDservicedbyAPsinyournetwork.Datafromclientsthatassociatewiththe
roguedevicecanbeaccessedbythehackercontrollingtheroguedevice.