Detection of MAC spoofing attacks in IEEE 802.11 networks using signal strength from attackers’ devices

3Citations
Citations of this article
7Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The main goal of this project is to improve intrusion detection process in IEEE 802.11 based networks in order to provide conditions for further interaction between attackers and honeypot. In order to gather metadata from clients’ devices, part of Wi-Fi Honeypot as a Service model was applied in the experiment, and for the first time ever. MAC addresses of access points and clients’ devices, probe requests, beacons and power of signal were used as basic data for further processing. Gathered metadata was used to detect malicious activities against network which is under defense and its clients. Several modifications of MAC spoofing attack were provided by authors in order to find attacks’ fingerprints in Wi-Fi ether. Besides base MAC spoofing attack authors suggested a method which allows to identify modification of MAC spoofing where attacker uses power antenna. Also, the new synchronization method for external elements of honeypot was proposed. It is based on centralized random message generation and allows to avoid detection from attackers’ side.

Cite

CITATION STYLE

APA

Banakh, R., Piskozub, A., & Opirskyy, I. (2019). Detection of MAC spoofing attacks in IEEE 802.11 networks using signal strength from attackers’ devices. In Advances in Intelligent Systems and Computing (Vol. 754, pp. 468–477). Springer Verlag. https://doi.org/10.1007/978-3-319-91008-6_47

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free