Hi Brian,
Security Onion (SO) does not support direct sniffing on a wireless interface.
There are several reasons for this, and I won't go into those. But using VMware
or some other virtual host software, it's possible for SO to see the traffic
that is destined for or that is from the wireless interface.
Here is a link to the VMware walkthrough:
https://github.com/Security-Onion-Solutions/security-onion/wiki/VMWare-Walkthrough
My first exposure to IDS was building Snort and the various components to
support the old ACID alert display interface, which was replaced by BASE, and
then by SO. As you may be aware, SO is not just an IDS - it is a full network
security monitor (NSM), and when configured correctly can capture all of the
traffic it sees for review and analysis later. For your project, I recommend
staying with installing Snort, Mysql, and Sguil - you will learn a lot more
about how an IDS works that way, and it will look less like a black box that
spits out alerts.
OTOH, SO has lots of really cool tools for digging into network traffic, and the
Bro component is worth deep study all by itself. SO is really the "deep end" of
the IDS pool.
There is a package named Kismet that can sniff wireless traffic, and Wireshark
can do it as well. Kismet does not necessarily need your wireless interface to
be a client to an AP, but I'm pretty sure that, ordinarily, Wireshark does,
unless you have one of the special USB radios (Airshark, I think).
If you examine the various things that Kismet has to do you may see why SO does
not support wireless radios.
--
Mit besten Grüßen
Shane Castle