An intelligent approach to detect probe request attacks in IEEE 802.11 networks

6Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In Wireless Local Area Networks (WLAN), beacon, probe request and response messages are unprotected, so the information is visible to sniffers. Probe requests can be sent by anyone with a legitimate Media Access Control (MAC) address, as association to the network is not required at this stage. Legitimate MAC addresses can be easily spoofed to bypass Access Point (AP) access lists. Attackers take advantage of these vulnerabilities and send a flood of probe request frames which can lead to a Denial-of-Service (DoS) to legitimate stations. This paper discusses an intelligent approach to recognise probe request attacks in WLANs. The research investigates and analyses WLAN traffic captured on a home wireless network, and uses supervised feedforward neural network with 4 input neurons, 2 hidden layers and an output neuron to determine the results. The computer simulation results demonstrate that this approach improves detection of MAC spoofing and probe request attacks considerably. © 2011 International Federation for Information Processing.

Cite

CITATION STYLE

APA

Ratnayake, D. N., Kazemian, H. B., Yusuf, S. A., & Abdullah, A. B. (2011). An intelligent approach to detect probe request attacks in IEEE 802.11 networks. In IFIP Advances in Information and Communication Technology (Vol. 363 AICT, pp. 372–381). Springer New York LLC. https://doi.org/10.1007/978-3-642-23957-1_42

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free