Specifications

IDS and DoS Alerts
RoamAbout Mobility System Software Configuration Guide 22-13
Flood Attacks
AfloodattackisatypeofDenialofServiceattack.Duringafloodattack,aroguewirelessdevice
attemptstooverwhelmtheresourcesofotherwirelessdevicesbycontinuouslyinjecting
managementframesintotheair.Forexample,arogueclientcanrepeatedlysendassociation
requeststotrytooverwhelmAPs
thatreceivetherequests.
Thethresholdfortriggeringafloodmessageis100framesofthesametypefromthesameMAC
address,withinaonesecondperiod.IfMSSdetectsmorethan100ofthesametypeofwireless
framewithinonesecond,MSSgeneratesalogmessage.Themessage
indicatestheframetype,the
MACaddressofthesender,thelistener(APandradio),channelnumber,andRSSI.
DoS Attacks
WhenactivescanisenabledonAPs,MSScandetectthefollowingtypesofDoSattacks:
•RFJamming—ThegoalofanRFjammingattackistotakedownanentireWLANby
overwhelmingtheradioenvironmentwithhighpowernoise.AsymptomofanRFjamming
attackisexcessiveinterference.If
anAPradiodetects excessiveinterferenceonachannel,and
RFAutoTuningisenabled,MSSchangestheradiotoadifferentchannel.
Deauthenticateframes—SpoofeddeauthenticateframesformthebasisformostDoSattacks,
andarethebasisforothertypesofattacksincludingmaninthemiddleattacks.Thesource
MACaddressisspoofedsothatclientsthinkthepacketiscomingfromalegitimateAP.Ifan
APdetectsapacketwithitsownsourceMACaddress,theAPknowsthatthepacketwas
spoofed.
•Broadcastdeauthenticateframes—Similartothespoofeddeauthenticateframeattackabove,a
broadcastdeauthenticateframe
attackgeneratesspoofeddeauthenticateframes,witha
broadcastdestinationaddressinsteadoftheaddressofaspecificclient.Theintentofthe
attackistodisconnectallstationsattachedtoanAP.
Disassociationframes—AdisassociationframefromanAPinstructstheclienttoendits
associationwiththeAP.Theintent
ofthisattackistodisconnectclientsfromtheAP.
•Nullproberesponses—Aclient’sproberequestframeisansweredbyaproberesponse
containinganullSSID.SomeNICcardslockupuponreceivingsu chaproberesponse.
•Decrypterrors—Anexcessivenumberofdecrypterrorscanindicatethatmultipleclientsare
usingthesameMACaddress.Adevice’sMACaddressissupposedtobeunique.Multiple
instancesofthesameaddresscanindicatethataroguedeviceispretendingtobealegitimate
devicebyspoofingitsMAC address.
•FakeAP—AroguedevicesendsbeaconframesforrandomlygeneratedSSIDsor
BSSIDs.This
typeofattackcancauseclientstobecomeconfusedbythepresenceofsomanySSIDsand
BSSIDs,andthusinterfereswiththeclients’abilitytoconnecttovalidAPs.Thistypeofattack
canalsointerferewithRF AutoTuningwhenanAPistryingtoadjusttoits
RFneighborhood.
•SSIDmasquerade—AroguedevicepretendstobealegitimateAPbysendingbeaconframes
foravalidSSIDservicedbyAPsinyournetwork.Datafromclientsthatassociatewiththe
roguedevicecanbeaccessedbythehackercontrollingtheroguedevice.