2.3 Detecting Rogue Access Points
There are recommended standard practices for deploying
a wireless network infrastructure in an institutional setting.
Among the recommended practices is monitoring both your
wired and wireless networks for indications of Rogue Access
Points. Good record keeping and doing radio site audits
will help detect these rogues. These techniques rely on
monitoring 802.11b Sequence Control numbers. Depending
on your deployment scenario, monitoring the traffic on
the wired LAN can also aid in detection of Rogue APs.
2.4 Other Security Solutions
There have been other attempts to address these security
problems. Some from Academia [1, 2, 4] and some from
the open source community[13, 10].
These and many more solutions arose out of the particular
needs of the groups designing them, all with the intent of
improving security. However, in the case of highly mobile
networks where the clients have a large degree of network
promiscuity, a partial fix, or fix at home, will not solve the
problem. A client from an entity that has deployed and ultra
secure local solution will not benefit from that solution
when away from the home network.
3 Vulnerabilities
As mentioned earlier wireless networks suffer from the
same vulnerabilities as wired networks. Both can experience
the same hodgepodge of IP based and higher vulnerabilities.
The difference begins at the Data Link Layer and
the inherent broadcast nature of the wireless physical layer,
which doesn’t benefit from the restricted physical access of
traditional wired networks.