DocumentCode :
2998282
Title :
Wireless LAN (WLAN) spoofing detection methods - Analysis and the victim Silent case
Author :
Shikha ; Kaushik, Vijender ; Gautam, Saumya
Author_Institution :
Deptt. of CSE, Mewar Univ., Ghaziabad, India
fYear :
2013
fDate :
12-14 Dec. 2013
Firstpage :
155
Lastpage :
160
Abstract :
Wireless LANs are quite popular and have found wide spread usage amongst various segments. The issue of spoofing, and its detection, in Wireless LANs has been a matter of serious debate and received wide spread attention in research community as well. Spoofing is a potent weapon in the hands of a Cyber Criminal. The very characteristics of spoofing makes the task of identification and tracking back of the perpetrator / initiator in Cyber Crimes very difficult, e.g. those relating to denial of service, session hijacking, and address masquerading attacks by changing its network identifiers in WLANs. One way to overcome the problem of spoofing is to authenticate the frames. However, in 802.11 WLANs, authentication and encryption for management and control frames is not provided. It is also observed that present MAC spoofing detection techniques bring out large number of false positives. This paper analyses the various spoofing detection methods in WLANs bringing out their pros and cons including the different level of security provided ranging from low to high. The analysis in the paper also brings out as to which particular method could be more suitable in a particular scenario and how one can easily get the reduced false positives, which has been a bane of current detection methods. The paper also presents two case scenarios, particularly highlighting the victim Silent case scenario not discussed much thus far in the current literature on the topic, to validate the results. By way of retrospect, an outline of future work is also suggested in the concluding remarks.
Keywords :
access protocols; computer network security; wireless LAN; IEEE 802.11 wireless LAN; MAC spoofing detection techniques; WLAN spoofing detection methods; cyber crimes; cyber criminal; denial of service; masquerading attacks; network identifiers; perpetrator-initiator; potent weapon; session hijacking; victim silent case; Authentication; Computer crime; Monitoring; Probes; Protocols; Wireless LAN; 802.11 Wireless LAN; FRR; FRR-RA; MAC address; SNRA; Sequence Gap; Spoofing; false positives / negatives; transmission rate; victim Silent case in WLAN;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Signal Processing and Communication (ICSC), 2013 International Conference on
Conference_Location :
Noida
Print_ISBN :
978-1-4799-1605-4
Type :
conf
DOI :
10.1109/ICSPCom.2013.6719774
Filename :
6719774
Link To Document :
بازگشت