DocumentCode
593239
Title
Detection of stealth Man-in-the-Middle attack in wireless LAN
Author
Kumar, Vipin ; Chakraborty, Shiladri ; Barbhuiya, F.A. ; Nandi, Sukumar
Author_Institution
Dept. of Comput. Sci. & Eng., Indian Inst. of Technol. Guwahati, Guwahati, India
fYear
2012
fDate
6-8 Dec. 2012
Firstpage
290
Lastpage
295
Abstract
Wireless Local Area Networks (WLANs) are acquiring their hold in all the verticals of life. WLANs have gone through rapid changes with respect to their security standards in near time. Man-in-the-Middle (MITM) attack is one of the most catastrophic attacks in WLAN. Stealth MITM (SMITM) attack is a new way of doing MITM based on Address Resolution Protocol (ARP) poisoning. In this attack, ARP poisoning is done directly to the victim by forging the frame ARP response protocol structure and exploiting WPA2 key management. In this paper we propose a Wireless Intrusion Detection System (WIDS) for SMITM attack. The proposed WIDS successfully detects the SMITM attack and other similar attacks like MITM (using ARP poisoning) and IP Spoofing. The proposed WIDS system is simulated in NS-3 network simulator and the scheme is found to work correctly when the attacker is static and is under the coverage of a single sensor during the complete period of attack.
Keywords
computer network security; protocols; wireless LAN; ARP; IP spoofing; NS-3 network simulator; SMITM; WIDS; address resolution protocol; man-in-the-middle attack; security standards; stealth MITM; stealth detection; wireless LAN; wireless intrusion detection system; wireless local area networks; Local area networks; Logic gates; Probes; Programmable logic arrays; Quality of service; Transmitters; Uplink;
fLanguage
English
Publisher
ieee
Conference_Titel
Parallel Distributed and Grid Computing (PDGC), 2012 2nd IEEE International Conference on
Conference_Location
Solan
Print_ISBN
978-1-4673-2922-4
Type
conf
DOI
10.1109/PDGC.2012.6449834
Filename
6449834
Link To Document