WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK

被引:3
|
作者
Tang, Huan-Rong [1 ]
Sun, Rou-Ling [1 ]
Kong, Wei-Qiang [1 ]
机构
[1] Xiangtan Univ, Minist Educ, Key Lab Intelligent Comp & Informat Proc, Xiangtan 411105, Peoples R China
关键词
WLAN; WIDS; Infrastructure; Man-in-the-middle-attack; SYN Flood Attack;
D O I
10.1109/ICMLC.2009.5212317
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more important to solve security problems of wireless local area network (WLAN). In this paper, we propose a new architecture of Wireless Intrusion Detection System (WIDS) for IEEE 802.11 wireless infrastructure networks. The WIDS detect man-in-the-middle-attacks by analyzing the channel gap. Moreover, it can defense the SYN flood attack. The results indicate that the WIDS proposed in this paper is superior at precisely detecting a man-in-the-middle attack and successfully protecting AP from SVN Flood attack than other existing approaches.
引用
收藏
页码:1464 / 1470
页数:7
相关论文
共 50 条
  • [21] BLEKeeper: Response Time Behavior Based Man-In-The-Middle Attack Detection
    Yurdagul, Muhammed Ali
    Sencar, Husrev Taha
    2021 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2021), 2021, : 214 - 220
  • [22] Analysis of Traffic Signals on an SDN for Detection and Classification of a Man-in-the-Middle Attack
    D'Orsaneo, Julian
    Tummala, Murali
    McEachen, John
    Martin, Bryan
    2018 12TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2018,
  • [23] Hybrid Routing for Man-in-the-Middle (MITM) Attack Detection in IoT Networks
    Kang, James Jin
    Fahd, Kiran
    Venkatraman, Sitalakshmi
    Trujillo-Rasua, Rolando
    Haskell-Dowland, Paul
    2019 29TH INTERNATIONAL TELECOMMUNICATION NETWORKS AND APPLICATIONS CONFERENCE (ITNAC), 2019,
  • [24] Defending against SYN Flood attack by Netfilter/iptables
    Zhang, Deng-Yin
    Zhou, Jie-Sheng
    Nanjing Youdian Daxue Xuebao (Ziran Kexue Ban)/Journal of Nanjing University of Posts and Telecommunications (Natural Science), 2007, 27 (01): : 56 - 59
  • [25] Traceback-based Bloomfilter IPS in Defending SYN flooding attack
    Tang, Huan-rong
    Xu, Chao
    Luo, Xin-gao
    Yang, Jian-quan Ou
    2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4589 - 4594
  • [26] Digital-Signature Oriented Steganography Approach against Man-in-the-Middle Attack
    Mwakajwanga, Gwamaka
    Mwambe, Othmar
    International Journal of Interactive Mobile Technologies, 2024, 18 (16) : 158 - 173
  • [27] Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack
    Endo, Kosei
    Kunihiro, Noboru
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 153 - 161
  • [28] A Novel Key Exchange Protocol Provably Secure Against Man-in-the-Middle Attack
    Chowdhury, Abhijit
    Nath, Shubhajit
    Howlader, Jaydeep
    NETWORKS AND COMMUNICATIONS (NETCOM2013), 2014, 284 : 275 - 280
  • [29] Man-in-the-middle Pilot Attack for Physical Layer Authentication
    Wang Shaoyu
    Huang Kaizhi
    Xu Xiaoming
    Ma Keming
    Chen Yajun
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (11) : 3141 - 3148
  • [30] Man-in-the-middle attack on quantum secure communications with authentication
    Lin, Tzu Han
    Hwang, Tzonelish
    QUANTUM INFORMATION PROCESSING, 2014, 13 (04) : 917 - 923