Denial of Service Attacks against 802.11 Dcf
نویسندگان
چکیده
This paper investigates the vulnerabilities in the 802.11 Distributed Coordination Function (DCF) mechanisms. We have conducted a series of Denial of Service (DoS) attack experiments targeting at the 802.11 DCF and evaluated the effectiveness of such attacks on different configurations. The results show that any current or upcoming 802.11 standards would not provide adequate help to mitigate the risk of DoS attacks. Therefore, the 802.11-based wireless LANs should not be used in any environments where the requirement of network availability is essential. We have also analysed some countermeasures against such attacks.
منابع مشابه
802.11 DCF Denial of Service Vulnerabilities
Abstract This paper addresses denial of service vulnerabilities (DOS) in 802.11 wireless LANs that arise from the 802.11 distributed coordination function (DCF). We demonstrate that the DCF is vulnerable to equivalent DOS attacks at both the MAC and PHY layers. Denial of service attacks against the DCF are easily staged by a single adversary and affect both infrastructure and mobile ad hoc netw...
متن کاملHF-Blocker: Detection of Distributed Denial of Service Attacks Based On Botnets
Abstract—Today, botnets have become a serious threat to enterprise networks. By creation of network of bots, they launch several attacks, distributed denial of service attacks (DDoS) on networks is a sample of such attacks. Such attacks with the occupation of system resources, have proven to be an effective method of denying network services. Botnets that launch HTTP packet flood attacks agains...
متن کاملAutomated Proof of Resistance of Denial of Service Attacks Using Event with Theorem Prover
The huge damage of denial of service attacks in security protocols attracts researchers’ attention and effort to analysis, verification and prevention of denial of service attacks. In order to model resistance of denial of service attacks, firstly, we extend applied pi calculus from both adversary context and processes aspects; secondly, the first computer-aided method of resistance of denial o...
متن کاملComputer Assisted Proof of Resistance of Denial of Service Attacks in Security Protocols Based on Events with CryptoVerif in Computational Model
Owning to the huge damage and difficulty of prevention of denial of service attacks in security protocols, people pay serious attentions on analysis, verification and prevention of denial of service attacks. Formal method in computational model is a powerful tool used to analyze and prove securities in security protocols, network and distributed system. But until now in computational model ther...
متن کاملUsing Random Bit Authentication to Defend IEEE 802.11 DoS Attacks
IEEE 802.11 networks are insecure. Wired Equivalent Privacy (WEP), the security mechanism used in 802.11, was proved to be vulnerable. IEEE 802.11i, the security enhancement, concentrates only on integrity and confidentiality of transmitted frames. Either version did not properly handle the network availability. Because management frames are not authenticated, {802.11, 802.11i} networks are sus...
متن کامل