WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK

被引:3
|
作者
Tang, Huan-Rong [1 ]
Sun, Rou-Ling [1 ]
Kong, Wei-Qiang [1 ]
机构
[1] Xiangtan Univ, Minist Educ, Key Lab Intelligent Comp & Informat Proc, Xiangtan 411105, Peoples R China
关键词
WLAN; WIDS; Infrastructure; Man-in-the-middle-attack; SYN Flood Attack;
D O I
10.1109/ICMLC.2009.5212317
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more important to solve security problems of wireless local area network (WLAN). In this paper, we propose a new architecture of Wireless Intrusion Detection System (WIDS) for IEEE 802.11 wireless infrastructure networks. The WIDS detect man-in-the-middle-attacks by analyzing the channel gap. Moreover, it can defense the SYN flood attack. The results indicate that the WIDS proposed in this paper is superior at precisely detecting a man-in-the-middle attack and successfully protecting AP from SVN Flood attack than other existing approaches.
引用
收藏
页码:1464 / 1470
页数:7
相关论文
共 50 条
  • [1] Defending Against Man-In-The-Middle Attack in Repeated Games
    Li, Shuxin
    Li, Xiaohong
    Hao, Jianye
    An, Bo
    Feng, Zhiyong
    Chen, Kangjie
    Zhang, Chengwei
    PROCEEDINGS OF THE TWENTY-SIXTH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, 2017, : 3742 - 3748
  • [2] Detection of Stealth Man-In-The-Middle Attack in Wireless LAN
    Kumar, Vikas
    Chakraborty, Sandip
    Barbhuiya, Ferdous A.
    Nandi, Sukumar
    2012 2ND IEEE INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (PDGC), 2012, : 290 - 295
  • [3] Wireless intrusion detection and response - A case study using the classic man-in-the-middle attack
    Schmoyer, TR
    Lim, YX
    Owen, HL
    2004 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-4: BROADBAND WIRELESS - THE TIME IS NOW, 2004, : 883 - 888
  • [4] Modeling of Man-in-the-Middle Attack in the Wireless Networks
    Chen, Zhe
    Guo, Shize
    Zheng, Kangfeng
    Yang, Yixian
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2255 - 2258
  • [5] SYN flooding attack detection by TCP handshake anomalies
    Bellaiche, Martine
    Gregoire, Jean-Charles
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (07) : 709 - 724
  • [6] A Fuzzy Logic Based Network Intrusion Detection System for Predicting the TCP SYN Flooding Attack
    Mkuzangwe, Nenekazi Nokuthala Penelope
    Nelwamondo, Fulufhelo Vincent
    INTELLIGENT INFORMATION AND DATABASE SYSTEMS (ACIIDS 2017), PT II, 2017, 10192 : 14 - 22
  • [7] On the Security of HB# against a Man-in-the-Middle Attack
    Ouafi, Khaled
    Overbeck, Raphael
    Vaudenay, Serge
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2008, 2008, 5350 : 108 - 124
  • [8] Strengthening Megrelishvili Protocol Against Man-in-The-Middle Attack
    Arzaki, Muhammad
    2018 6TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2018, : 274 - 280
  • [9] Block Link Flooding Algorithm for TCP SYN Flooding Attack
    Nalayini, C. M.
    Katiravan, Jeevaa
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGIES (ICCNCT 2018), 2019, 15 : 895 - 905
  • [10] Optimal Man-In-The-Middle Stealth Attack
    Faramondi, Luca
    Oliva, Gabriele
    Setola, Roberto
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2021, 2021, 13139 : 44 - 59