IBM unveils wireless IDS service
Citing the "explosion" of wireless hotspots in public spaces, homes and businesses, IBM Corp. on Wednesday unveiled a new managed IDS (intrusion detection service) targeted at wireless networks.
The new wireless intrusion detection service uses "sniffing" technology developed by IBM that can detect the presence of unauthorized ("rogue") access points, denial of service attacks, improperly configured access points and compromised Wired Equivalent Privacy (WEP) encryption keys, according to Jim Goddard, security principal at IBM Global Services.
The new service relies on a network of Linux appliances that act as wireless sensors and are deployed similar to wireless access points within an office, Goddard said.
"They look like fuse boxes mounted on the wall," Goddard said.
[ Read more ]
- Review: 802.11 Security (3 October 2003)
- Review: Installing, Troubleshooting, and Repairing Wireless Networks (5 September 2003)
- Review: Building Secure Wireless Networks with 802.11 (28 August 2003)
- Review: How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN (22 August 2003)
- Article: Lack of Security at Wireless Conferences (6 August 2003)
- Review: WiFi Security (9 July 2003)
- Review: Wireless Security End to End (4 June 2003)
- Review: The Complete Wireless Internet and Mobile Business Programming Training Course (28 May 2003)
- Review: Deploying License-Free Wireless Wide-Area Networks (14 May 2003)
- Article: Positive Identification in a Wireless World (6 May 2003)
- Article: Warchalking and Other Wireless Worries (3 April 2003)
- Article: How to Make Wireless Networks Secure (26 March 2003)
- Article: Interview with Cyrus Peikari, CEO of AirScanner Mobile Security (24 February 2003)
- Review: Maximum Wireless Security (17 February 2003)
- Article: Detecting Wireless LAN MAC Address Spoofing (22 January 2003)
- Article: Avoid Wireless LAN Security Pitfalls (17 January 2003)
- Article: Interview with Jay Chaudhry, CEO of AirDefense (7 January 2003)
- Review: Wireless Security and Privacy: Best Practices and Design Techniques (17 December 2002)