Detection of Stealth Man-In-The-Middle Attack in Wireless LAN

被引:0
作者
Kumar, Vikas [1 ]
Chakraborty, Sandip [1 ]
Barbhuiya, Ferdous A. [1 ]
Nandi, Sukumar [1 ]
机构
[1] Indian Inst Technol Guwahati, Dept Comp Sci & Engn, Gauhati, Assam, India
来源
2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC) | 2012年
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Local Area Networks (WLANs) are acquiring their hold in all the verticals of life. WLANs have gone through rapid changes with respect to their security standards in near time. Man-in-the-Middle (MITM) attack is one of the most catastrophic attacks in WLAN. Stealth MITM (SMITM) attack is a new way of doing MITM based on Address Resolution Protocol (ARP) poisoning. In this attack, ARP poisoning is done directly to the victim by forging the frame ARP response protocol structure and exploiting WPA2 key management. In this paper we propose a Wireless Intrusion Detection System (WIDS) for SMITM attack. The proposed WIDS successfully detects the SMITM attack and other similar attacks like MITM (using ARP poisoning) and IP Spoofing. The proposed WIDS system is simulated in NS-3 network simulator and the scheme is found to work correctly when the attacker is static and is under the coverage of a single sensor during the complete period of attack.
引用
收藏
页码:290 / 295
页数:6
相关论文
共 50 条
[31]   Detecting Man-in-the-Middle Attack in Fog Computing for Social Media [J].
Aliyu, Farouq ;
Sheltami, Tarek ;
Mahmoud, Ashraf ;
Al-Awami, Louai ;
Yasar, Ansar .
CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01) :1159-1181
[32]   Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution [J].
Alhazmi, Shatha ;
Kandel, Prashanna ;
Sabovik, Jayne ;
Matondo-Mvula, Nadine ;
Elleithy, Khaled .
2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,
[33]   Implementation and Analysis of Penetration Techniques Using the Man-In-The-Middle Attack [J].
Arnaldy, Defiana ;
Perdana, Audhika Rahmat .
2019 2ND INTERNATIONAL CONFERENCE OF COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2019): ARTIFICIAL INTELLIGENCE ROLES IN INDUSTRIAL REVOLUTION 4.0, 2019, :188-192
[34]   Nino Man-In-The-Middle attack on Bluetooth Secure Simple Pairing [J].
Hypponen, Konstantin ;
Haataja, Keijo M. J. .
2007 THIRD IEEE/IFIP INTERNATIONAL CONFERENCE IN CENTRAL ASIA ON INTERNET, 2007, :64-68
[35]   Research on User Authentication Scheme against the Man-in-the-Middle Attack [J].
Zhou, Xiancun ;
Xiong, Yan ;
Liu, Renjin .
INFORMATION COMPUTING AND APPLICATIONS, PT 2, 2012, 308 :1-8
[36]   Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing [J].
Hao, Guo ;
Tao, Guo .
JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2009, 5 (03) :131-134
[37]   A self-confirming engine for preventing man-in-the-middle attack [J].
Kanamori, M ;
Kobayashi, T ;
Yamaguchi, S .
IEICE TRANSACTIONS ON COMMUNICATIONS, 2004, E87B (03) :530-538
[38]   Research on Man-in-the-Middle Denial of Service Attack in SIP VoIP [J].
Chen, Zhe ;
Guo, Shize ;
Zheng, Kangfeng ;
Li, Haitao .
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, :263-+
[39]   Comprehensive Demonstration of Man-in-the-Middle Attack in PDC and PMU Network [J].
Swain, Kamakshi Prashadini ;
Tiwari, Amit ;
Sharma, Ankush ;
Chakrabarti, Saikat ;
Karkare, Amey .
2022 22ND NATIONAL POWER SYSTEMS CONFERENCE, NPSC, 2022,
[40]   Live Demonstration: Man-in-the-Middle Attack on Edge Artificial Intelligence [J].
Hu, Bowen ;
He, Weiyang ;
Wang, Si ;
Liu, Wenye ;
Chang, Chip-Hong .
2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,