A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks

被引:0
作者
Thankappan, Manesh [1 ,2 ]
Rifa-Pous, Helena [1 ,3 ]
Garrigues, Carles [1 ,3 ]
机构
[1] Univ Oberta Catalunya UOC, Internet Interdisciplinary Inst IN3, Barcelona, Spain
[2] Adi Shankara Inst Engn & Technol, Kalady, Kerala, India
[3] Ctr Cybersecur Res Catalonia CYBERCAT, Barcelona, Spain
关键词
Intrusion detection; KRACK; MC-MitM attack; FragAttacks; Attack signature; Distributed; Wi-Fi; WLAN;
D O I
10.1007/s10207-024-00899-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A Multi-Channel Man-in-the-Middle (MC-MitM) attack is an advanced form of MitM attack, characterized by its ability to manipulate encrypted wireless communications between the Access Point (AP) and clients within a WiFi network. MC-MitM attacks can target any Wi-Fi client, regardless of the authentication method used with the AP. Notable examples of such attacks include Key Reinstallation Attacks and FragAttacks, which have impacted millions of WiFi systems worldwide, especially those involving Internet of Things devices. Current defense mechanisms are inadequate against these attacks due to interoperability challenges and the need for modifications to devices or protocols within the targeted Wi-Fi networks. This paper introduces a distributed and cooperative signature-based wireless intrusion detection mechanism designed for online passive monitoring to detect malicious traffic patterns during MC-MitM attacks in any environment, from apartments and houses to large areas like hotels, offices or industrial sites. We implemented the proposed framework on Raspberry Pis and evaluated it in real-world settings. Our evaluation demonstrates that this framework can effectively identify MC-MitM attacks with an average accuracy of 98% when deployed across different locations within our experimental testbed.
引用
收藏
页码:3527 / 3546
页数:20
相关论文
共 53 条
  • [1] Abare G., 2019, INT J SCI RES NETW S, V7, P21
  • [2] A systematic literature review for network intrusion detection system (IDS)
    Abdulganiyu, Oluwadamilare Harazeem
    Tchakoucht, Taha Ait
    Saheed, Yakub Kayode
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (05) : 1125 - 1162
  • [3] CheckShake: Passively Detecting Anomaly in Wi-Fi Security Handshake Using Gradient Boosting Based Ensemble Learning
    Agrawal, Anand
    Chatterjee, Urbi
    Maiti, Rajib Ranjan
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (06) : 4868 - 4880
  • [4] kTRACKER: Passively Tracking KRACK using ML Model
    Agrawal, Anand
    Chatterjee, Urbi
    Maiti, Rajib Ranjan
    [J]. CODASPY'22: PROCEEDINGS OF THE TWELVETH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, 2022, : 364 - 366
  • [5] Aircrack-Ng, 2018, AIRBASE NG AIRCRACK
  • [6] Al-Sakib Khan Pathan, 2014, STATE ART INTRUSION, DOI [10.1201/b16390, DOI 10.1201/B16390]
  • [7] Physical Unclonable Functions in the Internet of Things: State of the Art and Open Challenges
    Babaei, Armin
    Schiele, Gregor
    [J]. SENSORS, 2019, 19 (14)
  • [8] Bertka Benjamin, 2012, P INF
  • [9] Network Intrusion Detection for IoT Security Based on Learning Techniques
    Chaabouni, Nadia
    Mosbah, Mohamed
    Zemmari, Akka
    Sauvignac, Cyrille
    Faruki, Parvez
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (03): : 2671 - 2701
  • [10] Stupify: A Hardware Countermeasure of KRACKs in WPA2 using Physically Unclonable Functions
    Chatterjee, Urbi
    Sadhukhan, Rajat
    Mukhopadhyay, Debdeep
    Chakraborty, Rajat Subhra
    Mahata, Debashis
    Prabhu, Mukesh M.
    [J]. WWW'20: COMPANION PROCEEDINGS OF THE WEB CONFERENCE 2020, 2020, : 217 - 221