Light Reading

Wireless IDS Is All the Rage

Light Reading
LR Mobile News Analysis
Light Reading
10/22/2003
50%
50%
Repost This

Scared stiff by daily reports of new and ever-more-sophisticated attacks on 802.11 wireless LAN networks, enterprise IT managers are turning to the new breed of wireless intrusion detection systems (IDS) that are fast becoming a must-have feature of any self-respecting wireless LAN vendor's portfolio.

Wireless intrusion detection systems work by continuously scanning an enterprise's airspace for the tell-tale signatures that indicate sophisticated denial of service and man-in-the-middle attacks against networks secured by 802.1X-based authentication mechanisms and/or VPN tunnels are underway.

As such, wireless IDS is a step beyond the rogue detection capabilities that are now promoted by many vendors of business-grade equipment. However, recent IDS product announcements from the likes of Aruba Wireless Networks, IBM Corp. (NYSE: IBM), and Red-M suggest that there's more than one way to skin a hacker.

Aruba, for example, offers IDS as a software application that runs on its core or edge wireless LAN switches (see Aruba's Mini-Switch), while IBM offers a managed wireless IDS service for enterprises that don’t want the hassle of doing it themselves (see IBM Eyes the Enterprise). Red-M, meanwhile, says IDS can either be run in-house or be outsourced to a third party (see Red-M Launches IDS).

According to Red-M's president and CEO, Karl Feilder, there are basically three ways to do wireless IDS. The first is to use the existing access point network to monitor traffic patterns. This is the approach being taken by switch startup Airespace Inc., which has seven or eight as-yet-unannounced customers using its system for IDS, according to Alan Cohen, its VP of marketing.

The second way is to dedicate passive 802.11 monitors to tracking all wireless traffic and then analyze the data at a central server for attack patterns. This is the approach being taken by AirMagnet Inc., Aruba, IBM, and others.

Red-M favors a third way: "We have our own specially-designed sensors that analyze traffic, identify the fingerprints of the bad guys, and then send anything suspicious back to the server," says Feilder. He claims that this approach is "more scaleable" because most of the processing is "done at the edge of the network."

Despite all this, Meta Group analyst Chris Kozup says customers shopping for IDS should really look for systems that allow manual control and adjustment of attack patterns and the resultant security reactions, rather than autonomous systems that put security lockdowns in place without user intervention. "Administrators don't want automatic systems," Kozup contends.

Red-M's Feilder cites banks, insurance companies, healthcare agencies, and car manufacturers among the customers using Red-M’s wireless IDS. Ironically, however, he says: "We’re selling most of our products to companies that want to ensure a no-wireless policy." Spoilsports.

— Gabriel Brown, Research Analyst, Unstrung

(0)  | 
Comment  | 
Print  | 
Newest First  |  Oldest First  |  Threaded View
Flash Poll
LRTV Custom TV
Optimizing SDN & NFV Architectures Through Application Awareness

4|23|14   |   6:24   |   (0) comments


Jerome Tollet, CTO at Qosmos, explains how network equipment vendors and operators deploying SDN and NFV can take advantage of network intelligence delivered by DPI to strengthen products and services.
LRTV Custom TV
Wind River Demonstrates Carrier-Grade Software for NFV

4|22|14   |   5:00   |   (0) comments


Wind River VP of Product Management, Glenn Seiler, takes a look the industry's first and only complete NFV software platform designed specifically for the unique carrier-grade and high-performance needs of telecom networks.
LRTV Documentaries
Cable Eyes Big Technology Shifts

4|16|14   |   03:02   |   (4) comments


US cable engineers are facing a lot of heavy lifting in the coming years, notes Light Reading Cable/Video Practice Leader Alan Breznick.
LRTV Custom TV
Maximizing Customer Experience & Assuring Service Delivery in an IP World

4|15|14   |   4:57   |   (0) comments


Steven Shalita, VP of Marketing, NetScout Systems, Inc., discusses the challenges cable/MSO operators face in assuring the delivery of new IP-based services. Key points include the value of proactively managing performance, and using rich analytics and operational intelligence to better understand service and usage trends, make smarter business decisions and ...
LRTV Documentaries
Bye-Bye DVD: Consumers Embrace Digital Video

4|10|14   |   04:17   |   (7) comments


Veteran video analyst Colin Dixon, founder and principal analyst of nScreenMedia, says research shows 56% are using digital video already.
LRTV Documentaries
Video: TW Cable Puts Multicast Gateways to the Test

4|8|14   |   04:13   |   (1) comment


Tom Gonder, a chief architect at Time Warner Cable, explains how its trial of multicast gateways is impacting IP-based video plans.
LRTV Custom TV
Managing & Monetizing Big Data in Operator Environments

4|7|14   |     |   (1) comment


At Mobile World Congress, Gigamon's Director of Service Provider Solutions, Andy Huckridge, and Heavy Reading Analyst Sarah Wallace discuss the 'big data' issues facing carriers and operators today.
LRTV Huawei Video Resource Center
Data Center Energy – Build Your Data Center in a Modular Way

4|7|14   |   2:13   |   (0) comments


Dr. Fang Liangzhou, VP Network Energy Product Line, shared his thoughts about the challenges for data centers during CeBIT 2014.
LRTV Huawei Video Resource Center
Agile Network Solution – An Overview of Huawei's Agile Network Solution

4|7|14   |   2:31   |   (0) comments


Ajay Gupta, Director of Product Marketing, Networking Product Line, gives an overview of the Agile Network Solutions during CeBIT 2014.
LRTV Huawei Video Resource Center
Huawei’s eLTE Voice Trunking, Video and Data Applied for Railways

4|7|14   |   1:38   |   (0) comments


Gottfried Winter is the Sales Director at Funkwerk, a German specialist in GSM-r terminals and a long-time partner of Huawei. At CeBIT 2014, Winter talks to Light Reading about this partnership and the integration of enhanced voice trunking, video and data functions.
LRTV Huawei Video Resource Center
LeaseWeb Speaks Highly of Huawei's Datacenter Products

4|7|14   |   1:37   |   (0) comments


Rene Olde Olthof, Operations Director LeaseWeb, talks about the next data center transformation during CeBIT 2014.
LRTV Documentaries
Comcast: Reshaping the Cable Network Architecture

4|3|14   |   07:11   |   (8) comments


Shamim Akhtar, Comcast's architect and senior director of network strategy, explains why the cable company is moving to a more distributed network architecture.
Hot Topics
WhatsApp Threatens Carrier VoLTE
Sarah Reedy, Senior Editor, 4/18/2014
The Hungry, Hungry Cloud
Dan Jones, Mobile Editor, 4/22/2014
Who's Ready to Play Broadband?
Carol Wilson, Editor-at-large, 4/21/2014
FCC's 'Middle Ground' Already Under Attack
Carol Wilson, Editor-at-large, 4/24/2014
AT&T Gets 81% of Subs Off Unlimited Data
Sarah Reedy, Senior Editor, 4/22/2014
Like Us on Facebook
Twitter Feed