Abstract
The development of the WPA and IEEE 802.11i standards have vastly improved the security of common wireless LAN setups. However, many installations still use the broken WEP protocol or even run with no security settings enabled. Furthermore, several threats are only partially addressed by the new security standards, e.g. rogue access points or denial of service. Specialised wireless intrusion detection systems are promising means to protect wireless networks against these threats. They can further improve the reliability and security of these networks. In our contribution we present such a wireless IDS to reveal common attacks on wireless LAN. We describe the development and evaluation of our prototype solution that seamlessly integrates with approaches for traditional wired networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)
KoreK: The KoreK attack – What FMS conveniently forgot to say. netstumbler.org forum (2004) (last visited: February 9, 2006) http://www.netstumbler.org/showthread.php?t=11869
KoreK: chopchop – Experimental WEP attacks. netstumbler.org forum (2004) (last visited: February 9, 2006), http://www.netstumbler.org/showthread.php?t=12489
Anonymous: Wi-Fi Protected Access: Strong, standards-based, interoperable security for today’s Wi-Fi networks. Technical report, Wi-Fi Alliance (2003) (last visited: June 28, 2005), http://www.wifialliance.com/OpenSection/pdf/Whitepaper_Wi-Fi_Security4-29-03.pdf
Anonymous: 802.11i – Amendment 6: Medium Access Control (MAC) Security Enhancements. Technical report, Institute of Electrical and Electronics Engineers, Inc. (2004) (last visited: February 24, 2006), http://standards.ieee.org/getieee802/download/802.11i-2004.pdf
Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11, 38–47 (2004)
Buttyán, L., Hubaux, J.P.: Report on a Working Session on Security in Wireless Ad Hoc Networks. ACM SIGMOBILE Mobile Computing and Communications Review 7(1), 74–94 (2003)
Zhang, Y., Lee, W., Huang, Y.A.: Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks 9, 545–556 (2003)
Lim, Y.X., Schmoyer, T., Levine, J., Owen, H.L.: Wireless Intrusion Detection and Response. In: Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, USA (2003)
Schmoyer, T.R., Lim, Y.X., Owen, H.L.: Wireless Intrusion Detection and Response. A case study using the classic man-in-the-middle attack. In: Proceedings of the IEEE Wireless Communications and Networks Conference, Atlanta, Georgia, USA (2004)
Branch, J.W., Petroni Jr., N.L., van Doorn, L., Safford, D.: Autonomic 802.11 Wireless LAN Security Auditing. IEEE Security & Privacy, 56–65 (2004)
Welch, D.J., Lathrop, S.D.: A Survey of 802.11a Wireless Security Threats and Security Mechanisms. Technical Report IOTC-TR-2003-101, Information Technology and Operations Center, Department of Electrical Engineering and Computer Science, United States Military Academy, West Point, New York 10996, USA (2003)
Schneier, B.: Modeling security threats. Dr. Dobbâ’s Journal (1999)
Neumerkel, R.: Entwicklung eines Angriffssensors für Wireless LAN. Master’s thesis, Technische Universitäresden (2005)
Vladimirov, A., Gavrilenko, K.V., Mikhailovsky, A.A.: WI-FOO. The Secrets of Wireless Hacking. Addison-Wesley Professional, Reading (2004)
Paxson, V.: Bro: A System for Detecting Network Intruders in Real-time. Computer Networks 31(23-24), 2435–2463 (1999)
Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C., pp. 15–28 (2003)
Wright, J.: Detecting Wireless LAN MAC Address Spoofing (2003) (last visited: February 28, 2006), http://home.jwu.edu/jwright/papers/wlan-mac-spoof.pdf
Groβ, S.: Selbstschützende mobile Systeme. In: Sicherheit 2006, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V (GI) (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Neumerkel, R., Groß, S. (2006). A Sophisticated Solution for Revealing Attacks on Wireless LAN. In: Fischer-Hübner, S., Furnell, S., Lambrinoudakis, C. (eds) Trust and Privacy in Digital Business. TrustBus 2006. Lecture Notes in Computer Science, vol 4083. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11824633_23
Download citation
DOI: https://doi.org/10.1007/11824633_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-37750-4
Online ISBN: 978-3-540-37752-8
eBook Packages: Computer ScienceComputer Science (R0)