Abstract
IEEE 802.11 networks are subject to MAC-spoof attacks. An
attacker can easily steal the identity of a legitimate station, even Access
Points, thus enabling him to take full control over network basic mech-
anisms or even access restricted resources. In this paper we propose a
method to detect this kind of attack based on signal power monitoring.
The main contribution of our work is the introduction of a median l-
ter that enables the detection of the attack by looking at the variance
of the signal power. We take into account two types of references for
the samples, time and number of frames, and compare their detection
capabilities. Our experimental results show that the spoong attack is
successfully detected with both type of references. Moreover the median
lter helps to reject false positives.
Original language | English |
---|---|
Title of host publication | Proceedings of the 5th Nordic Workshop on Dependability and Security (NODES’11) |
Publication date | 2011 |
Publication status | Published - 2011 |
Event | 4th Nordic Workshop on Dependability and Security - Copenhagen, Denmark Duration: 22 Apr 2010 → 23 Apr 2010 Conference number: 4 |
Conference
Conference | 4th Nordic Workshop on Dependability and Security |
---|---|
Number | 4 |
Country/Territory | Denmark |
City | Copenhagen |
Period | 22/04/2010 → 23/04/2010 |
Keywords
- Variance
- IEEE 802.11
- Median lter
- Security,Wireless LANs
- Intrusion Detection Systems
- Signal power
- Spoof