The Community for Technology Leaders
RSS Icon
Mar. 4, 2008 to Mar. 7, 2008
ISBN: 978-0-7695-3102-1
pp: 520-525
A great variety of well-known attacks exist for the IEEE 802.11 protocol. The lack of mechanisms for management frame authentication and the complexity of the protocol itself have derived into a considerable number of denial of service and identity spoofing attacks. As most denial of service attacks are based on spoofing of MAC addresses, spoofed frame detection schemes have gained attentions. Currently the most efficient techniques to detect this kind of attacks are based on the creation of profiles for the wireless nodes and behavior based protocol anomaly detection. However, these techniques tend to generate too many of false positives. This is caused by the unstable nature of the wireless medium and also because of the difficulty to model the behaviour of the diverse implementations from different manufacturers. One way to reduce false positives is to combine different techniques to carry out the analysis. We propose a novel method that identifies the impersonation of certain management frames, which helps to reduce the number of false positives within other existing MAC spoofing detection techniques.
802.11 MAC address spoofing, false positive
Asier Mart?nez, Urko Zurutuza, Roberto Uribeetxeberria, Miguel Fern?ndez, Jesus Lizarraga, Ainhoa Serna, I?aki V?lez, "Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks", ARES, 2008, 2012 Seventh International Conference on Availability, Reliability and Security, 2012 Seventh International Conference on Availability, Reliability and Security 2008, pp. 520-525, doi:10.1109/ARES.2008.130
25 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool