Detection of Stealth Man-In-The-Middle Attack in Wireless LAN

被引:0
作者
Kumar, Vikas [1 ]
Chakraborty, Sandip [1 ]
Barbhuiya, Ferdous A. [1 ]
Nandi, Sukumar [1 ]
机构
[1] Indian Inst Technol Guwahati, Dept Comp Sci & Engn, Gauhati, Assam, India
来源
2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC) | 2012年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Local Area Networks (WLANs) are acquiring their hold in all the verticals of life. WLANs have gone through rapid changes with respect to their security standards in near time. Man-in-the-Middle (MITM) attack is one of the most catastrophic attacks in WLAN. Stealth MITM (SMITM) attack is a new way of doing MITM based on Address Resolution Protocol (ARP) poisoning. In this attack, ARP poisoning is done directly to the victim by forging the frame ARP response protocol structure and exploiting WPA2 key management. In this paper we propose a Wireless Intrusion Detection System (WIDS) for SMITM attack. The proposed WIDS successfully detects the SMITM attack and other similar attacks like MITM (using ARP poisoning) and IP Spoofing. The proposed WIDS system is simulated in NS-3 network simulator and the scheme is found to work correctly when the attacker is static and is under the coverage of a single sensor during the complete period of attack.
引用
收藏
页码:290 / 295
页数:6
相关论文
共 50 条
  • [21] Man-in-the-Middle Attack Mitigation in Internet of Medical Things
    Salem, Osman
    Alsubhi, Khalid
    Shaafi, Aymen
    Gheryani, Mostafa
    Mehaoua, Ahmed
    Boutaba, Raouf
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) : 2053 - 2062
  • [22] A stealthy man-in-the-middle attack strategy for switched systems
    Sun, Dawei
    Hwang, Inseok
    Goppert, James
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024, 55 (06) : 1206 - 1223
  • [23] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack
    Arzaki, Muhammad
    2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
  • [24] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack
    Zhai, Li
    Wu, ChuanKun
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47
  • [25] Toward a hardware man-in-the-middle attack on PCIe bus
    Khelif, Mohamed Amine
    Lorandel, Jordane
    Romain, Olivier
    Regnery, Matthieu
    Baheux, Denis
    Barbu, Guillaume
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 77
  • [26] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack
    Han, Song
    Liu, Wanquan
    Chang, Elizabeth
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
  • [27] Analyzing the technique of a man-in-the-middle attack based on Bluetooth
    Qin, Xiang-Lin
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
  • [28] Detection of man-in-the-middle attacks using physical layer wireless security techniques
    Wang, Le
    Wyglinski, Alexander M.
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2016, 16 (04) : 408 - 426
  • [29] Man-in-the-Middle Attack Detection and Localization Based on Cross-Layer Location Consistency
    Yang, Yaoqi
    Wei, Xianglin
    Xu, Renhui
    Peng, Laixian
    Zhang, Lei
    Ge, Lin
    IEEE ACCESS, 2020, 8 : 103860 - 103874
  • [30] An Optimized Machine Learning Model for the Detection of Man-in-the-Middle Attack in Mobile Edge Computing
    Moila, Ramahlapane Lerato
    Velempini, Mthulisi
    2024 IST-AFRICA CONFERENCE, 2024,