Spoofing Detection Methods in Wireless LAN (WLAN) - A Study with pros and cons

نویسندگان

  • Shikha Goel
  • Vijender Kaushik
  • Suruchi Gautam
چکیده

Spoofing makes the task of identification and tracking back of the perpetrator / initiator in Cyber Crimes very difficult, e.g. the attacks by way of changing its network identifiers in WLANs. In such a scenario, spoof detection methods have gain wide attention. One way to prevent from spoofing is to authenticate the frames. However, in 802.11 WLANs, authentication and encryption for management and control frames is not provided. Further, present MAC spoofing detection techniques bring out large number of false positives. This paper discusses the various spoofing detection methods. Each method has its own pros and cons and provides a different level of security ranging from low to high. By analyzing the different detection techniques together, it is brought out in the paper as to which particular method could be more suitable in a particular scenario and how one can easily get the reduced false positives. As a study, performing a Session Containment attack by spoofing the IP address of the access point (AP) is also presented and detection of the attack is done using sequence number analysis method. By way of retrospect, an outline of future work is also suggested in the concluding remarks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Sequence Number-Based MAC Address Spoof Detection

The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that exploit vulnerabilities at the IP layer or above can be readily addressed by intrusion detection systems designed for wired networks. However, attacks exploiting linklayer protocol vulnerabilities require a different set of intrusi...

متن کامل

WLAN Intrusion Detection System

This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...

متن کامل

Rogue Access Point Detection Using Time Stamp

This is an implementation of the Wireless LAN Intrusion Detection System (WIDS ) using clock-skews as a fingerprinting property as suggested by Jana-Kasera [1]. Our objective is to detect the presence of a fake access point (AP) in a Wireless LAN (WLAN). Use of clock -skew enables us to effectively detect Medium Access Control (MAC) Address spoofing. The principle used in this project is that c...

متن کامل

Design of Cross Layer Based Intrusion Detection Technique for Wireless Lan

In this chapter, a cross-layer based intrusion detection technique for wireless networks is proposed. The proposed technique uses a combined weight value that is computed from the received signal strength (RSS) and time taken for RTS-CTS Handshake (TT). 3.1 Introduction The rapid proliferation of wireless local area networks has changed the landscape of network security. The traditional way of ...

متن کامل

Spoofing Mitigation of GPS Receiver using Least Mean Squares-Based Adaptive Filter

The Global Positioning System (GPS) signals are very weak signal over wireless channels, so they are vulnerable to in-band interferences. Therefore, even a low-power interference can easily spoof GPS receivers. Among the variety of GPS signal interference, spoofing is considered as the most dangerous intentional interference. The spoofing effects can mitigate with an appropriate strategy in the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013