WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK

被引:3
|
作者
Tang, Huan-Rong [1 ]
Sun, Rou-Ling [1 ]
Kong, Wei-Qiang [1 ]
机构
[1] Xiangtan Univ, Minist Educ, Key Lab Intelligent Comp & Informat Proc, Xiangtan 411105, Peoples R China
关键词
WLAN; WIDS; Infrastructure; Man-in-the-middle-attack; SYN Flood Attack;
D O I
10.1109/ICMLC.2009.5212317
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more important to solve security problems of wireless local area network (WLAN). In this paper, we propose a new architecture of Wireless Intrusion Detection System (WIDS) for IEEE 802.11 wireless infrastructure networks. The WIDS detect man-in-the-middle-attacks by analyzing the channel gap. Moreover, it can defense the SYN flood attack. The results indicate that the WIDS proposed in this paper is superior at precisely detecting a man-in-the-middle attack and successfully protecting AP from SVN Flood attack than other existing approaches.
引用
收藏
页码:1464 / 1470
页数:7
相关论文
共 50 条
  • [31] Man-in-the-middle attack on quantum secure communications with authentication
    Tzu Han Lin
    Tzonelish Hwang
    Quantum Information Processing, 2014, 13 : 917 - 923
  • [32] Man-in-the-Middle Attack Mitigation in Internet of Medical Things
    Salem, Osman
    Alsubhi, Khalid
    Shaafi, Aymen
    Gheryani, Mostafa
    Mehaoua, Ahmed
    Boutaba, Raouf
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (03) : 2053 - 2062
  • [33] A stealthy man-in-the-middle attack strategy for switched systems
    Sun, Dawei
    Hwang, Inseok
    Goppert, James
    INTERNATIONAL JOURNAL OF SYSTEMS SCIENCE, 2024, 55 (06) : 1206 - 1223
  • [34] RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack
    Zhai, Li
    Wu, ChuanKun
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT II, 2015, 153 : 41 - 47
  • [35] Toward a hardware man-in-the-middle attack on PCIe bus
    Khelif, Mohamed Amine
    Lorandel, Jordane
    Romain, Olivier
    Regnery, Matthieu
    Baheux, Denis
    Barbu, Guillaume
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 77
  • [36] An active detecting method against SYN flooding attack
    Xiao, B
    Chen, W
    He, YX
    Sha, EHM
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL I, PROCEEDINGS, 2005, : 709 - 715
  • [37] An Effective Defense Against SYN Flooding Attack in SDN
    Kim, DongHyuk
    Dinh, Phuc Trinh
    Noh, Sichul
    Yi, Junmin
    Park, Minho
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 369 - 371
  • [38] Deniable Authentication Protocol Resisting Man-in-the-Middle Attack
    Han, Song
    Liu, Wanquan
    Chang, Elizabeth
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 3, 2005, 3 : 161 - 164
  • [39] Analyzing the technique of a man-in-the-middle attack based on Bluetooth
    Qin, Xiang-Lin
    Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2005, 37 (08): : 1159 - 1162
  • [40] Blockchain-Based Man-in-the-Middle (MITM) Attack Detection for Photovoltaic Systems
    Choi, Jinchun
    Ahn, Bohyun
    Bere, Gomanth
    Ahmad, Seerin
    Mantooth, Homer Alan
    Kim, Taesic
    2021 IEEE DESIGN METHODOLOGIES CONFERENCE (DMC), 2021,