AP modifications

  • AP modifications can violate 802.11 specification, on the other hand they prevent the DEAUTH DOS attacks

  • A suitable timeout (e.g. 10 seconds) for management frame (DEAUTH, DISAS, ..) execution can be implemented - effective against wlan_jack DOS attack

  • Integration of IDS to AP can considerably increase security on 2nd link-layer (e.g. Snort-Wireless in OpenWRT). The IDS requirements in the AP:

    • The sequence numbers have to be watched by IDS even if the wireless client is roamed out of range of the AP for a short period and then it gets back. If the wireless client is roamed for a long period, the IDS has to invalidate its sequence numbers.

    • The sequence numbers sometimes jump to higher value in case of sending/receiving channel alternation or are set to zero if the firmware drops the damaged frame or the PCMCIA bus is reinitialized