Detecting IEEE 802.11 MAC Address Spoofing using ACK frames
Main Article Content
Abstract
Detection of IEEE 802.11 MAC address spoofing is very importance for improve security in IEEE 802.11 networks. The detection algorithms comprise of MAC Sequence number abnormal, signal strength analysis and transceiver fingerprint. In this paper, we propose to use the difference of ACK frames sent by the genuine station and attacker stations to detect MAC address spoofing. The experiment results show that the proposed algorithm works better than using MAC sequence number abnormal. The proposed algorithm provides 100% of corection if the number of monitor stations is high enough.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Copyright @2021 Engineering Transactions
Faculty of Engineering and Technology
Mahanakorn University of Technology
References
J. Wright, “Detecting wireless LAN MAC address spoofing,” 2003, technical document. [Online]. Available: http://home.jwu.edu/jwright/papers/wlan-mac-spoof.pdf
F. Guo and T. cker Chiueh, “Sequence number-based MAC address spoof detection,” in Proceedings of the 8th International Symposium on Recent Advances in Intrusion Detection, Seattle, WA, USA, Sept. 2005.
Hall, M. Bareau, and E. Kranakis, “Using transceiverprints for anomaly based intrusion detection,” in Proceedings of 3rd IASTED,CIIT, Nov. 2004, pp. 22–24.
D. B. Faria and D. R. Cheriton, “Detecting identity-based attacks in wireless networks using singalprints,” in Proceedings of WiSe’06: ACM Workshop on Wireless Security, Sept. 2006, pp. 43–52.
D. C. Madory, “New methods of spoof detection in 802.11b wireless networks” Hanover, NH: M. Eng. Thesis, Dartmouth College, 2006.
Y. Chen, W. Trappe, and R. P. Martin, “Detecting and localizing wireless spoofing attacks,” in SECON’07: Proceedings of the 4th Annual IEEE Conference on Sensor, Mesh and Ad Hoc Communications and Networks, June 2007.
Y. Sheng, G. Chen, K. Tan, U. Deshpande, B. Vance, C. McDonald,H. Yin, T. Henderson, D. Kotz, A. Campbell, and J. Wright, “Securing 802.11 wireless networks through fine-grained measurements,” Submitted to IEEE Wireless Communications Magazine.
Changhua He and John C Mitchell, “Security analysis and improvements for IEEE 802.11i (2005)”, In Proceedings of the 12th Annual Network and Distributed System Security Symposium, 2005.
http://linux.die.net/man/1/macchanger
www.gorlani.com/publicprj/macmakeup/macmaeup.asp.
ธนทรรศน์ แซ่ลิ้ม และ ประวิทย์ ชุมชู “การวิเคราะห์กลไกรักษาความปลอดภัยและผลกระทบต่อประสิทธิภาพของเครือข่ายไร้สาย”, IEEE 802.11, Engineering Transactions, Vol. 12, No. 1, pp. 1-8, 2552
ธนทรรศน์ แซ่ลิ้ม และ ประวิทย์ ชุมชู “ระบบเครือข่ายเคลื่อนที่สำหรับยาพาหนะ,” Engineering Transactions, Vol. 9, No. 2, pp. 12-21, 2549