A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator, or has been created to allow a hacker to conduct a man-in-the-middle attack. Rogue access points of the first kind can pose a security threat to large organizations with many employees, because anyone with access to the premises can install (maliciously or non-maliciously) an inexpensive wireless router that can potentially allow access to a secure network to unauthorized parties. Rogue access points of the second kind target networks that do not employ mutual authentication (client-server server-client) and may be used in conjunction with a rogue RADIUS server, depending on security configuration of the target network.
Presence of a large number of wireless access points can be sensed in airspace of a typical enterprise facility. These include managed access points in the secure network plus access points in the neighborhood. A wireless intrusion prevention system facilitates the job of auditing these access points on a continuous basis to learn whether there are any rogue access points among them.
In order to detect rogue access points, two conditions need to be tested:
- whether or not the access point is in the managed access point list
- whether or not it is connected to the secure network
The first of the above two conditions is easy to test - compare wireless MAC address (also called as BSSID) of the access point against the managed access point BSSID list. However, automated testing of the second condition can become challenging in the light of following factors: a) Need to cover different types of access point devices such as bridging, NAT (router), unencrypted wireless links, encrypted wireless links, different types of relations between wired and wireless MAC addresses of access points, and soft access points, b) necessity to determine access point connectivity with acceptable response time in large networks, and c) requirement to avoid both false positives and negatives which are described below.
False positive (crying wolf) occurs when the wireless intrusion prevention system detects an access point not actually connected to the secure network as wired rogue. Frequent false positives result in wastage of administrative bandwidth spent in chasing them. Possibility of false positives also creates hindrance to enabling automated blocking of wired rogues due to the fear of blocking friendly neighborhood access point.
False negative occurs when the wireless intrusion prevention system fails to detect an access point actually connected to the secure network as wired rogue. False negatives result in security holes.
If an unauthorized access point is found connected to the secure network, it is the rogue access point of the first kind (also called as “wired rogue”). On the other hand, if the unauthorized access point is found not connected to the secure network, it is an external access points. Among the external access points, if any is found to be mischievous or potential risk (e.g., whose settings can attract or have already attracted secure network wireless clients), it is tagged as rogue access point of the second kind, which is often called an "evil twin".
Read more about Rogue Access Point: Soft Rogue Access Point
Other articles related to "rogue access point, access point, access":
... A soft Access Point (soft AP) is set up on a Wi-Fi adapter without the need of a physical Wi-Fi router ... Once up and running, one can share the network access available on a machine to other Wi-Fi users that will connect to the soft AP ... If any employee sets up a soft Access Point on their machine inside the corporate premises and share the corporate network through it, then this ...
Famous quotes containing the words point, rogue and/or access:
“I am the kind of a woman that likes to move on mentally from point to point, and I like for my man to be there way ahead of me. Then if he is strong and honest, it goes on from there. Good looks are not essential, just extra added attraction.”
—Zora Neale Hurston (18911960)
“A pox of this gout! or a gout of this pox! for the one or the
other plays the rogue with my great toe.”
—William Shakespeare (15641616)
“Whilst the rights of all as persons are equal, in virtue of their access to reason, their rights in property are very unequal. One man owns his clothes, and another owns a country.”
—Ralph Waldo Emerson (18031882)