DES Based IDS for detection Minimal De-authentication DoS Attack in 802.11 Wi-Fi Networks

被引:0
作者
Agarwal, Mayank [1 ]
机构
[1] Indian Inst Technol Patna, Dept Comp Sci & Engn, Patna, Bihar, India
来源
2021 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS) | 2021年
关键词
Wifi; De-authentication Attack; DES Modeling; IDS; Low Rate; DIAGNOSIS;
D O I
10.1109/ANTS52808.2021.9936939
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The inherent security weaknesses of 802.11 MAC Access Layer is the primary reason for a wide variety of attacks that can be mounted on 802.11 Wi-Fi networks. In this paper we focus on Minimal De-authentication (de-auth henceforth) DoS Attack which is a low rate de-auth DoS attack in Wi-Fi networks. There exist studies which can tackle flooding based de-auth DoS, however, there has been limited work done in the case for minimal de-auth DoS attack. The network frame exchange under minimal de-auth DoS attack and normal de-auth process is the same, making the detection even more challenging. Since minimal de-auth DoS attack involves sending only a few spoofed de-auth frames into the network, no significant frame injection can be observed in the network. So the contemporary signature and anomaly based Intrusion Detection System (IDS) fail to recognize the minimal de-auth DoS attack. In this paper, we propose a Discrete Event System (DES) based IDS for detecting minimal deauth DoS attack. The proposed DES based IDS provides a novel detection method and does not require any protocol changes, or require any server/client side changes and can be proved for completeness and correctness. Experiments results show that the proposed DES based IDS detects minimal de-auth DoS attack swiftly and with high accuracy.
引用
收藏
页数:6
相关论文
共 10 条
[1]  
Agarwal M, 2013, ANNU IEEE IND CONF
[2]   Machine learning approach for detection of flooding DoS attacks in 802.11 networks and attacker localization [J].
Agarwal, Mayank ;
Pasumarthi, Dileep ;
Biswas, Santosh ;
Nandi, Sukumar .
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS, 2016, 7 (06) :1035-1051
[3]  
Anjum F, 2005, 2005 International Conference on Wireless Networks, Communications and Mobile Computing, Vols 1 and 2, P292
[4]  
Beck M., 2009, P 2 ACM C WIR NETW S, P79, DOI DOI 10.1145/1514274.1514286
[5]  
Bellardo J, 2003, USENIX ASSOCIATION PROCEEDINGS OF THE 12TH USENIX SECURITY SYMPOSIUM, P15
[6]   The final nail in WEP's coffin [J].
Bittau, Andrea ;
Handley, Mark ;
Lackey, Joshua .
2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, :386-+
[7]   Active diagnosis of discrete-event systems [J].
Sampath, M ;
Lafortune, S ;
Teneketzis, D .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1998, 43 (07) :908-929
[8]  
Subbotin D., 2020, 2020 IEEE 14 INT C A, P1
[9]  
Xia HD, 2004, LECT NOTES COMPUT SC, V3042, P795
[10]   Overview of fault diagnosis methods for Discrete Event Systems [J].
Zaytoon, J. ;
Lafortune, S. .
ANNUAL REVIEWS IN CONTROL, 2013, 37 (02) :308-320