Detect Identity Threats
in Your WiFi Network
Nine engines detect credential attacks, mid-session hijack, data exfiltration, insider threats, AI agent compromise, captive portal fraud, and OpenRoaming federation abuse across your WiFi network in real time. 50+ threat types. 30+ MITRE ATT&CK techniques. Zero agents to deploy.
WiFi ITDR (Identity Threat Detection and Response) is a security category defined by Gartner that IronWiFi applies specifically to wireless network authentication. Nine detection engines analyze every RADIUS authentication event, RADIUS accounting packet (Start/Interim/Stop), captive portal session, AI agent authentication, and OpenRoaming federation transaction to identify 50+ threat types — credential attacks, behavioral anomalies, certificate threats, device spoofing, mid-session hijack, data exfiltration, portal fraud, compromised AI agents, insider threats, and federated roaming abuse — mapped to 30+ MITRE ATT&CK techniques with per-identity risk scoring from 0 to 100. Detections trigger automated response via RADIUS Change of Authorization, session blocking, or certificate revocation, and export to Splunk, Sentinel, Elastic, QRadar, or Datadog via syslog/CEF and webhooks.
What Is WiFi ITDR?
Identity security for the wireless authentication layer
ITDR (Identity Threat Detection and Response) is a security category defined by Gartner that focuses on detecting threats targeting identity infrastructure. Most ITDR platforms monitor Active Directory, cloud IAM, or SSO providers. IronWiFi is the first to apply ITDR to WiFi network authentication, captive portal logins, and AI agent credentials.
Every time a user, guest, device, or AI agent authenticates on your wireless network, RADIUS and captive portal authentication produces rich telemetry — who, when, where, how, and what device. Most organizations discard this data. WiFi ITDR transforms it into continuous threat detection.
Seven specialized engines build behavioral baselines per identity and analyze every authentication event for credential attacks, behavioral anomalies, certificate misuse, device spoofing, portal-layer threats, insider threats, and compromised AI agents. Each detection is mapped to one of 15 MITRE ATT&CK techniques, risk-scored from 0 to 100, and correlated into incidents with automated response via RADIUS Change of Authorization.
Identity-Layer Detection
Operates at the authentication layer — sees threats that network-level tools miss entirely.
Per-Identity Baselines
Learns normal behavior for every identity: hours, APs, devices, EAP methods, locations.
Risk Scoring (0–100)
Composite risk score per identity based on detection severity, frequency, and recency.
MITRE ATT&CK Mapped
Every detection linked to the relevant technique for SOC workflows and compliance.
Nine Detection Engines, 50+ Threat Types
Every authentication event — RADIUS auth + accounting, captive portal, AI agent, and OpenRoaming federation — passes through nine specialized engines running in parallel
Credential Attack Engine
Sliding-window counters detect volumetric attacks targeting authentication credentials across RADIUS and captive portal logins in real time.
Identity Anomaly Engine
Behavioral baselines built per identity detect deviations from normal authentication patterns across enterprise users, guest visitors, and devices — including sudden-denial bursts that signal out-of-band credential revocation or account de-provisioning.
Certificate Threat Engine
Validates certificate chains and detects misuse of PKI infrastructure for network access.
Device Threat Engine
Cross-references MAC addresses, device fingerprints, and session data to detect device-level threats.
Session Anomaly Engine
Consumes RADIUS accounting (Start / Interim-Update / Stop) to detect threats that the auth packet alone cannot see — mid-session credential hijack, data exfiltration via outbound volume, and session-duration anomalies. Trust-tag-weighted thresholds calibrate per-NAS accounting accuracy against the WBA RADIUS Accounting Assurance standard.
Portal Security Engine
Detects web-layer threats unique to captive portal authentication — social login abuse, automated attacks, and session manipulation that RADIUS telemetry cannot see.
Agent Anomaly Engine
Purpose-built for non-human identities. Detects compromised AI agents, shadow AI, supply chain attacks, and lateral movement using per-agent behavioral baselines.
Insider Threat Engine
Detects compromised or malicious insiders through authentication pattern analysis — after-hours access, excessive roaming, privilege escalation, and terminated user activity.
OpenRoaming Compliance Engine
Detects WBA OpenRoaming v5.0.0 specification violations (October 2025) across the roaming federation — missing WBA-Identity-Provider, missing Acct-Session-Id, missing CUI on permanent-ID RCOIs, oversized Session-Timeout on short-lived On-Board RCOIs, malformed Operator-Name, unknown RCOI classes, settlement-provider mismatches, IDP reject reasons, and eduroam inbound classification gaps invisible to single-realm tools.
One Dashboard, Every Authentication Layer
RADIUS, captive portal, and AI agent detections feed into the same incident timeline, risk scores, and MITRE mapping
Three of the nine engines — Credential Attack, Identity Anomaly, and Device Threat — analyze events across all authentication layers. The Session Anomaly Engine consumes RADIUS accounting to catch mid-session hijack and data exfiltration after auth succeeded. The Portal Security Engine adds web-layer detection for captive portal threats. The Agent Anomaly Engine monitors non-human identities for compromise, shadow AI, and supply chain attacks. The Insider Threat Engine catches warwalking, privilege escalation, and terminated user access. The OpenRoaming Compliance Engine catches WBA v5.0.0 federation-layer violations — federated credential stuffing, cross-realm MAC reuse, Operator-Name spoofing, RCOI settlement-class mismatch, oversized Session-Timeout on short-lived On-Board RCOIs, and missing CUI on permanent-ID RCOIs — invisible to single-realm tools. Every detection, regardless of source, appears in a single unified view.
How Does WiFi ITDR Work?
From silent authentication telemetry to actionable threat intelligence in four steps
The Detection Pipeline
Every authentication event flows through a purpose-built pipeline that turns raw RADIUS data into security intelligence — automatically and in real time.
Connect RADIUS
Point your access points to IronWiFi RADIUS. Authentication telemetry flows automatically — no agents, no sensors, no network taps.
Baselines Learn
Behavioral baselines build per identity within 7–14 days: typical hours, access points, devices, authentication methods, and locations.
Engines Analyze
Every authentication event passes through nine detection engines in parallel. Each engine scores threats and maps them to MITRE ATT&CK techniques.
Threats Surfaced
Detections are risk-scored, correlated into incidents, and surfaced in your console with full identity context and response playbooks.
Why This Architecture Matters
Zero Infrastructure
No agents, sensors, or network taps. Works from RADIUS telemetry your APs already produce.
Real-Time Detection
Sub-30-second mean time to detect. Threats caught during the authentication event, not hours later.
Defense in Depth
Nine engines with different detection strategies ensure threats can't slip through a single blind spot.
Full Audit Trail
Every detection and incident logged with timestamps, identity context, and MITRE technique IDs.
MITRE ATT&CK Technique Coverage
Every detection mapped to the framework your SOC already speaks
| Technique | Name | Tactic | ITDR Detection |
|---|---|---|---|
T1110 |
Brute Force | Credential Access | Brute force, password spray, credential stuffing, voucher stuffing |
T1110.001 |
Password Guessing | Credential Access | Failed auth threshold per identity per window |
T1110.003 |
Password Spraying | Credential Access | Single credential against multiple identities |
T1078 |
Valid Accounts | Defense Evasion | Impossible travel, time anomaly, AP anomaly, payment fraud, off-hours activity |
T1078.004 |
Cloud Accounts | Persistence | Agent rate spike, compromised automation loops |
T1556 |
Modify Auth Process | Credential Access | EAP downgrade, certificate misuse, unknown CA, agent certificate change |
T1036 |
Masquerading | Defense Evasion | MAC spoofing, device cloning, rapid MAC rotation |
T1562 |
Impair Defenses | Defense Evasion | Rogue device, unauthorized AP association |
T1110.004 |
Credential Stuffing | Credential Access | Captive portal credential reuse, federated credential stuffing across roaming partners |
T1595.002 |
Active Scanning: Vulnerability Scanning | Reconnaissance | Bot submissions, headless-browser portal probing, automated CAPTCHA bypass |
T1563 |
Remote Service Session Hijacking | Lateral Movement | Portal session hijacking, multi-Acct-Session-Id replay across roaming federation |
T1021 |
Remote Services | Lateral Movement | Agent accessing unauthorized network segments or SSIDs |
T1078.003 |
Valid Accounts: Local Accounts | Privilege Escalation | Privilege escalation via auth to unfamiliar SSID outside baseline |
T1040 |
Network Sniffing | Discovery | Warwalking (10+ access points in 1 hour) indicating physical reconnaissance |
T1557 |
Adversary-in-the-Middle | Credential Access | Replay attacks, credential interception via rogue AP |
T1550 |
Use Alternate Authentication Material | Defense Evasion | Mid-session hijack via Framed-IP change on active RADIUS session |
T1048 |
Exfiltration Over Alternative Protocol | Exfiltration | Anomalous outbound octet volume vs per-identity baseline (octets z-score from RADIUS accounting) |
T1531 |
Account Access Removal | Impact | Sudden-denial burst from known AP for historically-healthy user (out-of-band credential revocation, account de-provisioning, MFA fatigue tail) |
Built for Compliance Audits
WiFi ITDR maps directly to the controls auditors ask about
SOC 2 Type II
Report issued 2026-05-07 by Johanson Group LLP — unqualified opinion, no exceptions noted (Security + Availability TSCs, period 2025-12-01 to 2026-03-09). Continuous monitoring of authentication events satisfies CC6.1 (logical access controls), CC6.6 (system boundaries), and CC7.2 (anomaly detection). Full audit trail in BigQuery with 365-day retention.
HIPAA
Detects unauthorized access to ePHI network segments. Maps to §164.312(a) (access control), §164.312(b) (audit controls), and §164.312(d) (person authentication).
NIS2
Satisfies Article 21 requirements for risk analysis, incident handling, and supply chain security. Insider Threat and Agent Anomaly engines address access control and asset management obligations.
PCI DSS 4.0
Addresses Requirement 10 (log and monitor) and Requirement 11 (test security). Payment fraud detection on captive portals maps to Requirement 6 (secure systems). 90-day detection retention meets audit requirements.
WiFi ITDR vs. Traditional Security Approaches
How identity-layer detection compares to what you may be using today
Detect, Then Respond — Automatically
Configurable playbooks with shadow, detect, and enforce modes close the loop between detection and remediation in seconds
RADIUS Change of Authorization
Quarantine, disconnect, or reassign VLAN for compromised identities in real time via RADIUS CoA — no manual intervention, no waiting for the next auth cycle.
Captive Portal Enforcement
Block portal sessions, require re-authentication, or trigger MFA step-up for guest users flagged by detection engines. Stops payment fraud and bot attacks mid-session.
Agent Lifecycle Actions
Revoke certificates, restrict network segments, or suspend AI agent identities when anomalies indicate compromise or unauthorized lateral movement.
SIEM & SOAR Integration
Forward risk-scored detections to Splunk, Sentinel, Elastic, QRadar, or Datadog via syslog/CEF, webhooks, or REST API. Trigger SOAR playbooks from any detection event.
Talk to a WiFi Identity Specialist
- See IronWiFi working with your hardware
- Get a deployment plan for your network
- 30-minute call — no pitch deck
Limited design-partner cohort for Q3 2026 — dedicated engineering support, zero cost
