Skip to main content

Sequence Number-Based MAC Address Spoof Detection

  • Conference paper
Book cover Recent Advances in Intrusion Detection (RAID 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3858))

Included in the following conference series:

Abstract

The exponential growth in the deployment of IEEE 802.11-based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that exploit vulnerabilities at the IP layer or above can be readily addressed by intrusion detection systems designed for wired networks. However, attacks exploiting link-layer protocol vulnerabilities require a different set of intrusion detection mechanism. Most link-layer attacks in WLANs are denial of service attacks and work by spoofing either access points (APs) or wireless stations. Spoofing is possible because the IEEE 802.11 standard does not provide per-frame source authentication, but can be effectively prevented if a proper authentication is added into the standard. Unfortunately, it is unlikely that commercial WLANs will support link-layer source authentication that covers both management and control frames in the near future. Even if it is available in next-generation WLANs equipments, it cannot protect the large installed base of legacy WLAN devices. This paper proposes an algorithm to detect spoofing by leveraging the sequence number field in the link-layer header of IEEE 802.11 frames, and demonstrates how it can detect various spoofing without modifying the APs or wireless stations. The false positive rate of the proposed algorithm is zero, and the false negative rate is close to zero. In the worst case, the proposed algorithm can detect a spoofing activity, even though it can only detect some but not all spoofed frames.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. IEEE 802.11 Standard, http://standards.ieee.org/getieee802/download/802.11-1999.pdf

  2. Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proceedings of the USENIX Security Symposium, Washington DC (August 2003)

    Google Scholar 

  3. WEPWedgie, http://sourceforge.net/projects/wepwedgie/

  4. void11, http://www.wlsec.net/void11/

  5. AirJack, http://sourceforge.net/projects/airjack/

  6. Airsnarf, http://airsnarf.shmoo.com/

  7. KisMAC, http://binaervarianz.de/projekte/programmieren/kismac/

  8. dsniff, http://www.monkey.org/~dugsong/dsniff

  9. Borisov, N., Goldberg, I., Wagner, D.: Intercepting Mobile Communications: The Insecurity of 802.11. In: Mobicom 2001 (2001)

    Google Scholar 

  10. Wright, J.: Detecting Wireless LAN MAC Address Spoofing, http://home.jwu.edu/jwright/papers/wlan-mac-spoof.pdf

  11. Cardenas, E.D.: MAC Spoofing–An Introduction, http://www.giac.org/practical/GSEC/Edgar_Cardenas_GSEC.pdf

  12. Dasgupta, D., Gonzalez, F., Yallapu, K., Kaniganti, M.: Multilevel Monitoring and Detection Systems (MMDS). In: The proceedings of the 15th Annual Computer Security Incident Handling Conference (FIRST), Ottawa, Canada, June 22-27 (2003)

    Google Scholar 

  13. Hall, J., Barbeau, M., Kranakis, E.: Using Transceiverprints for Anomaly Based Intrusion Detection. In: Proceedings of 3rd IASTED, CIIT 2004, St. Thomas, US Virgin Islands, November 22-24 (2004)

    Google Scholar 

  14. Yeo, J., Youssef, M., Agrawala, A.: A framework for wireless LAN monitoring and its applications. In: Proceedings of the 2004 ACM workshop on Wireless security, Philadelphia, PA, USA, October 1 (2004)

    Google Scholar 

  15. Robinson, F.: 802.11i and WPA Up Close. Network Computing (2004)

    Google Scholar 

  16. Mishra, A., Arbaugh, W.: An Initial Security Analysis of the IEEE 802.1X Standard. CS-TR 4328, Department of Computer Science, University of Maryland, College Park (December 2002)

    Google Scholar 

  17. AirDefense. Enterprise Wireless LAN Security and WLAN Monitoring, http://www.airdefense.net/

  18. Aruba Wireless Networks. Wireless Intrusion Protection, http://www.arubanetworks.com/pdf/techbrief-IDS.pdf

  19. AirMagnet, http://www.airmagnet.com/products/enterprise.htm

  20. Malinen, J.: Host AP driver for Intersil Prism2/2.5/3, http://hostap.epitest.fi/

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Guo, F., Chiueh, Tc. (2006). Sequence Number-Based MAC Address Spoof Detection. In: Valdes, A., Zamboni, D. (eds) Recent Advances in Intrusion Detection. RAID 2005. Lecture Notes in Computer Science, vol 3858. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11663812_16

Download citation

  • DOI: https://doi.org/10.1007/11663812_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-31778-4

  • Online ISBN: 978-3-540-31779-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics