Skip to main content

A Sophisticated Solution for Revealing Attacks on Wireless LAN

  • Conference paper
Trust and Privacy in Digital Business (TrustBus 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4083))

Abstract

The development of the WPA and IEEE 802.11i standards have vastly improved the security of common wireless LAN setups. However, many installations still use the broken WEP protocol or even run with no security settings enabled. Furthermore, several threats are only partially addressed by the new security standards, e.g. rogue access points or denial of service. Specialised wireless intrusion detection systems are promising means to protect wireless networks against these threats. They can further improve the reliability and security of these networks. In our contribution we present such a wireless IDS to reveal common attacks on wireless LAN. We describe the development and evaluation of our prototype solution that seamlessly integrates with approaches for traditional wired networks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)

    Chapter  Google Scholar 

  2. KoreK: The KoreK attack – What FMS conveniently forgot to say. netstumbler.org forum (2004) (last visited: February 9, 2006) http://www.netstumbler.org/showthread.php?t=11869

  3. KoreK: chopchop – Experimental WEP attacks. netstumbler.org forum (2004) (last visited: February 9, 2006), http://www.netstumbler.org/showthread.php?t=12489

  4. Anonymous: Wi-Fi Protected Access: Strong, standards-based, interoperable security for today’s Wi-Fi networks. Technical report, Wi-Fi Alliance (2003) (last visited: June 28, 2005), http://www.wifialliance.com/OpenSection/pdf/Whitepaper_Wi-Fi_Security4-29-03.pdf

  5. Anonymous: 802.11i – Amendment 6: Medium Access Control (MAC) Security Enhancements. Technical report, Institute of Electrical and Electronics Engineers, Inc. (2004) (last visited: February 24, 2006), http://standards.ieee.org/getieee802/download/802.11i-2004.pdf

  6. Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11, 38–47 (2004)

    Article  Google Scholar 

  7. Buttyán, L., Hubaux, J.P.: Report on a Working Session on Security in Wireless Ad Hoc Networks. ACM SIGMOBILE Mobile Computing and Communications Review 7(1), 74–94 (2003)

    Article  Google Scholar 

  8. Zhang, Y., Lee, W., Huang, Y.A.: Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks 9, 545–556 (2003)

    Article  Google Scholar 

  9. Lim, Y.X., Schmoyer, T., Levine, J., Owen, H.L.: Wireless Intrusion Detection and Response. In: Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, USA (2003)

    Google Scholar 

  10. Schmoyer, T.R., Lim, Y.X., Owen, H.L.: Wireless Intrusion Detection and Response. A case study using the classic man-in-the-middle attack. In: Proceedings of the IEEE Wireless Communications and Networks Conference, Atlanta, Georgia, USA (2004)

    Google Scholar 

  11. Branch, J.W., Petroni Jr., N.L., van Doorn, L., Safford, D.: Autonomic 802.11 Wireless LAN Security Auditing. IEEE Security & Privacy, 56–65 (2004)

    Google Scholar 

  12. Welch, D.J., Lathrop, S.D.: A Survey of 802.11a Wireless Security Threats and Security Mechanisms. Technical Report IOTC-TR-2003-101, Information Technology and Operations Center, Department of Electrical Engineering and Computer Science, United States Military Academy, West Point, New York 10996, USA (2003)

    Google Scholar 

  13. Schneier, B.: Modeling security threats. Dr. Dobbâ’s Journal (1999)

    Google Scholar 

  14. Neumerkel, R.: Entwicklung eines Angriffssensors für Wireless LAN. Master’s thesis, Technische Universitäresden (2005)

    Google Scholar 

  15. Vladimirov, A., Gavrilenko, K.V., Mikhailovsky, A.A.: WI-FOO. The Secrets of Wireless Hacking. Addison-Wesley Professional, Reading (2004)

    Google Scholar 

  16. Paxson, V.: Bro: A System for Detecting Network Intruders in Real-time. Computer Networks 31(23-24), 2435–2463 (1999)

    Article  Google Scholar 

  17. Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C., pp. 15–28 (2003)

    Google Scholar 

  18. Wright, J.: Detecting Wireless LAN MAC Address Spoofing (2003) (last visited: February 28, 2006), http://home.jwu.edu/jwright/papers/wlan-mac-spoof.pdf

  19. Groβ, S.: Selbstschützende mobile Systeme. In: Sicherheit 2006, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V (GI) (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Neumerkel, R., Groß, S. (2006). A Sophisticated Solution for Revealing Attacks on Wireless LAN. In: Fischer-Hübner, S., Furnell, S., Lambrinoudakis, C. (eds) Trust and Privacy in Digital Business. TrustBus 2006. Lecture Notes in Computer Science, vol 4083. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11824633_23

Download citation

  • DOI: https://doi.org/10.1007/11824633_23

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37750-4

  • Online ISBN: 978-3-540-37752-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics