Spoofing Detection Methods in Wireless LAN (WLAN) - A Study with pros and cons
نویسندگان
چکیده
Spoofing makes the task of identification and tracking back of the perpetrator / initiator in Cyber Crimes very difficult, e.g. the attacks by way of changing its network identifiers in WLANs. In such a scenario, spoof detection methods have gain wide attention. One way to prevent from spoofing is to authenticate the frames. However, in 802.11 WLANs, authentication and encryption for management and control frames is not provided. Further, present MAC spoofing detection techniques bring out large number of false positives. This paper discusses the various spoofing detection methods. Each method has its own pros and cons and provides a different level of security ranging from low to high. By analyzing the different detection techniques together, it is brought out in the paper as to which particular method could be more suitable in a particular scenario and how one can easily get the reduced false positives. As a study, performing a Session Containment attack by spoofing the IP address of the access point (AP) is also presented and detection of the attack is done using sequence number analysis method. By way of retrospect, an outline of future work is also suggested in the concluding remarks.
منابع مشابه
Sequence Number-Based MAC Address Spoof Detection
The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that exploit vulnerabilities at the IP layer or above can be readily addressed by intrusion detection systems designed for wired networks. However, attacks exploiting linklayer protocol vulnerabilities require a different set of intrusi...
متن کاملWLAN Intrusion Detection System
This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...
متن کاملRogue Access Point Detection Using Time Stamp
This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...
متن کاملDesign of Cross Layer Based Intrusion Detection Technique for Wireless Lan
In this chapter, a cross-layer based intrusion detection technique for wireless networks is proposed. The proposed technique uses a combined weight value that is computed from the received signal strength (RSS) and time taken for RTS-CTS Handshake (TT). 3.1 Introduction The rapid proliferation of wireless local area networks has changed the landscape of network security. The traditional way of ...
متن کاملSpoofing Mitigation of GPS Receiver using Least Mean Squares-Based Adaptive Filter
The Global Positioning System (GPS) signals are very weak signal over wireless channels, so they are vulnerable to in-band interferences. Therefore, even a low-power interference can easily spoof GPS receivers. Among the variety of GPS signal interference, spoofing is considered as the most dangerous intentional interference. The spoofing effects can mitigate with an appropriate strategy in the...
متن کامل