Download now Free registration required
To address security concerns in wireless LAN deployments, many organizations have deployed Wireless Intrusion Detection Systems (WIDS) to monitor wireless activity for signs of attack. Deployed as an integrated monitoring system with the wireless transport network or as an overlay monitoring system separate from the wireless transport network, these systems are effective at analyzing wireless activity and identifying wireless attackers. Focusing their analysis on the data-link and physical layers of the OSI model (Layers 2 and 1), these tools allow organizations to successfully identify and defend against rogue APs, wireless protocol attacks and denial of service attacks.
- Format: PDF
- Size: 1010.7 KB