Abstract

The IEEE 802.11 wireless networks are organized either in infrastructure mode or ad-hoc mode. These wireless networks are very common, because of their portability and ease of access. In infrastructure mode of wireless networks, wireless clients have to be aware of the environments due to vulnerability and various types of attacks that can made by wireless intruders. Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) security protocols are used to protect any wireless infrastructure against wireless intruders. The main problem of wireless network is to maintain the network security. Firewalls are not much capable to secure network from attacks because firewall can only detect the attacks which come from outside of the network. Therefore, Intrusion Detection System (IDS) plays an important role in network security. In general Intrusion Detection System (IDS) is used to detect unauthorized access, malicious access point and various types of wireless attacks in IEEE 802.11 infrastructure mode of wireless networks. Network based Wireless Intrusion Detection system (WIDS) is designed to detect Denial of Service (DOS) attack and Malicious Access Point (Evil Twin Attack) in Wi-Fi networks. Because DOS attack and Evil Twin Attack are the most significant attacks in IEEE 802.11 networks. In this work, a diverse detection algorithm is proposed to detect DOS attack and Evil Twin Attack which is based on number of deauthentication frames and beacon frames and some other fields. In this project, an experimental setup for wireless network infrastructure with one access point (AP) and three or four number of wireless clients are used to design Wireless Intrusion Detection System (WIDS). In that design, one client act as an attacker and another one client act as detector. In this work, Kali Linux based attack software tool is used to register wireless clients to launch attacks on the network. The set of commends are used to configure on the designed infrastructure wireless networks for testing the attacks and solutions

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call