Abstract
Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces many researchers to revise robust and reliable Wireless Intrusion Detection Techniques (WIDTs). In this paper we propose an algorithm to enhance the performance of the correlation of two WIDTs in detecting MAC spoofing Denial of Service (DoS) attacks. The two techniques are the Received Signal Strength Detection Technique (RSSDT) and Round Trip Time Detection Technique (RTTDT). Two sets of experiments were done to evaluate the proposed algorithm. Absence of any false negatives and low number of false positives in all experiments demonstrated the effectiveness of these techniques.
Highlights
Due to the vast interest in WLAN technologies, these wireless networks have matured a lot since ratification of the first 802.11 standard in 1997 [2, 4]
As a result of the failure of the WLAN standards to address the lack of authentication of 802.11 Management frames and network card addresses, it is possible for adversaries to spoof the identity of legitimate WLAN nodes and take over their associations
Experimentation -Set1 In Set1 of the experiments, robustness and reliability of the Round Trip Time Detection Technique (RTTDT) and the Received Signal Strength Detection Technique (RSSDT) were tested when none of the participants were in motion
Summary
Due to the vast interest in WLAN technologies, these wireless networks have matured a lot since ratification of the first 802.11 standard in 1997 [2, 4]. As a result of the failure of the WLAN standards to address the lack of authentication of 802.11 Management frames and network card addresses, it is possible for adversaries to spoof the identity of legitimate WLAN nodes and take over their associations. Such attacks, where the attacker assumes the identity of another WLAN node, are referred to as MAC spoofing or spoofing based attacks. Few intrusion detection techniques are available for reliably and accurately detecting MAC spoofing. Given the enormous impact MAC spoofing has on WLAN security, wireless intrusion detection techniques are
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.