Detection of Stealth Man-In-The-Middle Attack in Wireless LAN

被引:0
|
作者
Kumar, Vikas [1 ]
Chakraborty, Sandip [1 ]
Barbhuiya, Ferdous A. [1 ]
Nandi, Sukumar [1 ]
机构
[1] Indian Inst Technol Guwahati, Dept Comp Sci & Engn, Gauhati, Assam, India
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Wireless Local Area Networks (WLANs) are acquiring their hold in all the verticals of life. WLANs have gone through rapid changes with respect to their security standards in near time. Man-in-the-Middle (MITM) attack is one of the most catastrophic attacks in WLAN. Stealth MITM (SMITM) attack is a new way of doing MITM based on Address Resolution Protocol (ARP) poisoning. In this attack, ARP poisoning is done directly to the victim by forging the frame ARP response protocol structure and exploiting WPA2 key management. In this paper we propose a Wireless Intrusion Detection System (WIDS) for SMITM attack. The proposed WIDS successfully detects the SMITM attack and other similar attacks like MITM (using ARP poisoning) and IP Spoofing. The proposed WIDS system is simulated in NS-3 network simulator and the scheme is found to work correctly when the attacker is static and is under the coverage of a single sensor during the complete period of attack.
引用
收藏
页码:290 / 295
页数:6
相关论文
共 50 条
  • [1] Optimal Man-In-The-Middle Stealth Attack
    Faramondi, Luca
    Oliva, Gabriele
    Setola, Roberto
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59
  • [2] Modeling of Man-in-the-Middle Attack in the Wireless Networks
    Chen, Zhe
    Guo, Shize
    Zheng, Kangfeng
    Yang, Yixian
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
  • [3] WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK
    Tang, Huan-Rong
    Sun, Rou-Ling
    Kong, Wei-Qiang
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-6, 2009, : 1464 - 1470
  • [4] Wireless intrusion detection and response - A case study using the classic man-in-the-middle attack
    Schmoyer, TR
    Lim, YX
    Owen, HL
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 883 - 888
  • [5] Man-in-the-Middle Attack in HTTP/2
    Patni, Parth
    Iyer, Kartik
    Sarode, Rohan
    Mali, Amit
    Nimkar, Anant
    PROCEEDINGS OF 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING AND CONTROL (I2C2), 2017,
  • [6] Man-in-the-Middle Attack to the HTTPS Protocol
    Callegati, Franco
    Cerroni, Walter
    Ramilli, Marco
    IEEE SECURITY & PRIVACY, 2009, 7 (01) : 78 - 81
  • [7] Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN
    Nam, Seung Yeob
    Jurayev, Sirojiddin
    Kim, Seung-Sik
    Choi, Kwonhue
    Choi, Gyu Sang
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2012,
  • [8] Mitigating ARP poisoning-based man-in-the-middle attacks in wired or wireless LAN
    Seung Yeob Nam
    Sirojiddin Jurayev
    Seung-Sik Kim
    Kwonhue Choi
    Gyu Sang Choi
    EURASIP Journal on Wireless Communications and Networking, 2012
  • [9] BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection
    Yurdagul, Muhammed Ali
    Sencar, Husrev Taha
    2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 214 - 220
  • [10] Analysis of Traffic Signals on an SDN for Detection and Classification of a Man-in-the-Middle Attack
    D'Orsaneo, Julian
    Tummala, Murali
    McEachen, John
    Martin, Bryan
    2018 12TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2018,