It’s a bird, it’s a plane, it’s a drone. As drones are constantly evolving in what they can and can’t do, companies in the WiFi security industry will always be looking for ways to protect consumers from potential data breaches. Recent growing threats regarding drones attempting to connect to previously used WiFi networks have been a reason for concern.
Drones themselves do not pose an issue; however, they can be programmed to act as rogue access points sent to break into an unprotected WiFi network, potentially stealing personal or confidential data. Swooping in to seek a connection to WiFi networks previously accessed by a user, the drone can steal a plethora of personal or confidential data.
One of the more popular drones on the market is the Parrot AR.Drone quadcopter, an unmanned aerial drone. The device, designed for in flight video and photographic capture, can be controlled by mobile or tablet operating systems.
To combat the potential of broader network attacks, Fluke Networks has released the first drone detection signature for the Parrot AR.Drone as a free update to its AirMagnet Enterprise Wireless IDS/IDP product.
AirMagnet’s WiFi software and wireless networking tools allow you to analyze and monitor WLAN performance. As the first formal anti-drone technology made available to WLAN customers, it’s likely just the start of a trend as drones grow in popularity. The new AirMagnet signature detects the drone and alerts customers to a few different drone-specific signals. It can detect video-streaming traffic and the signal in use to the ad-hoc network.
Prior to the recent update, AirMagnet could already identify drone-based rogue access points and automatically block them from communicating with a customer’s WiFi controller. With the release of the drone detection signature, AirMagnet is taking security awareness a step further as the customer themselves want to be able to recognize a potential security threat. The update looks for specific types of MAC addresses and other signals to notify the IT Administrator that an AR.Drone is nearby.
There haven’t been massive numbers of drone attacks, at least not yet. As there are sure to be more reports of drones spoofing public hotspots in the near future, the best thing WLAN companies can do is stay one step ahead of the game.