WIRELESS INTRUSION DETECTION FOR DEFENDING AGAINST TCP SYN FLOODING ATTACK AND MAN-IN-THE-MIDDLE ATTACK

被引:3
|
作者
Tang, Huan-Rong [1 ]
Sun, Rou-Ling [1 ]
Kong, Wei-Qiang [1 ]
机构
[1] Xiangtan Univ, Minist Educ, Key Lab Intelligent Comp & Informat Proc, Xiangtan 411105, Peoples R China
关键词
WLAN; WIDS; Infrastructure; Man-in-the-middle-attack; SYN Flood Attack;
D O I
10.1109/ICMLC.2009.5212317
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of wireless communication application in a wide range of industry and daily life, it is more and more important to solve security problems of wireless local area network (WLAN). In this paper, we propose a new architecture of Wireless Intrusion Detection System (WIDS) for IEEE 802.11 wireless infrastructure networks. The WIDS detect man-in-the-middle-attacks by analyzing the channel gap. Moreover, it can defense the SYN flood attack. The results indicate that the WIDS proposed in this paper is superior at precisely detecting a man-in-the-middle attack and successfully protecting AP from SVN Flood attack than other existing approaches.
引用
收藏
页码:1464 / 1470
页数:7
相关论文
共 50 条
  • [41] Detection and prevention of man-in-the-middle attack in iot network using regression modeling
    Sivasankari, N.
    Kamalakkannan, S.
    ADVANCES IN ENGINEERING SOFTWARE, 2022, 169
  • [42] Lightweight wireless intrusion detection systems against DDoS attack
    Lee, Hyung-Woo
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 5, 2006, 3984 : 294 - 302
  • [43] SYN Flooding Attack Detection Based on Entropy Computing
    Bellaiche, Martine
    Gregoire, Jean-Charles
    GLOBECOM 2009 - 2009 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-8, 2009, : 1079 - 1084
  • [44] SD-OVS: SYN Flooding Attack Defending Open vSwitch for SDN
    Liu, Xinyu
    Cho, Beumjin
    Kim, Jong
    INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 29 - 41
  • [45] Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement
    Yao Z.
    Zhu Z.
    Ye G.
    Tongxin Xuebao/Journal on Communications, 2021, 42 (08): : 103 - 110
  • [46] Effective Detection and Mitigation of SYN Flooding Attack in SDN
    Oo, Nan Haymarn
    Maw, Aung Htein
    ISCIT 2019: PROCEEDINGS OF 2019 19TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT), 2019, : 300 - 305
  • [47] Analog Man-in-the-Middle Attack Against Link-Based Packet Source Identification
    Tung, Yu-Chih
    Shin, Kang G.
    Kim, Kyu-Han
    MOBIHOC '16: PROCEEDINGS OF THE 17TH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2016, : 331 - 340
  • [48] Defense against man-in-the-middle attack in client-server systems with secure servers
    Serpanos, DN
    Lipton, RJ
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2003, E86B (10) : 2966 - 2970
  • [49] Detecting Man-in-the-Middle Attack in Fog Computing for Social Media
    Aliyu, Farouq
    Sheltami, Tarek
    Mahmoud, Ashraf
    Al-Awami, Louai
    Yasar, Ansar
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1159 - 1181
  • [50] Mitigating Man-In-The-Middle Attack Using Quantum Key Distribution
    Alhazmi, Shatha
    Kandel, Prashanna
    Sabovik, Jayne
    Matondo-Mvula, Nadine
    Elleithy, Khaled
    2023 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE, LISAT, 2023,