Skip to main content
Top

2021 | OriginalPaper | Chapter

Lightweight De-authentication DoS Attack Detection Methodology for 802.11 Networks Using Sniffer

Authors : Zakir Ahmad Sheikh, Yashwant Singh

Published in: Proceedings of Second International Conference on Computing, Communications, and Cyber-Security

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Wireless networks are prone to many types of attacks. The open access of wireless technology puts the whole wireless environment into a threat. The new wireless technologies like wireless sensor networks (WSN) and the Internet of Things (IoT) face the challenges of security. The Internet of Things is yet to be standardized because of the unavailability of security solutions to certain wireless threats. Internet of Things uses different technologies for communication such as Bluetooth, Wi-Fi, Li-Fi, and 6LoPAN. Of all, Wi-Fi is mainly preferred. But Wi-Fi itself possesses certain security issues. One of the issues of Wi-Fi is the nature of Management Frames in its 802.11 standard. The Management Frames in 802.11 standard are unencrypted, hence easily interpretable. This very nature of Wi-Fi leads to many attacks like De-authentication attacks and Dis-association attacks. This paper provides an approach to detect De-authentication DoS attacks in Wi-Fi-based IoT networks, using the sniffing concept. For network sniffing, a Python-based tool known as Scapy is used. Attacks and Detection are done in a real-time environment. We used Kali Linux tools and Scapy for real-time attacks. The De-authentication DoS attacks are performed on a Wi-Fi-based IoT network, and the detections are triggered on a Scapy-based Sniffer program. Our algorithm also detects spoofed De-authentication DoS attacks.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Cheema R (2011)Deauthentication/disassociation attack: implementation and security in wireless mesh networks. Int J Comput Appl 23(7):7–15 Cheema R (2011)Deauthentication/disassociation attack: implementation and security in wireless mesh networks. Int J Comput Appl 23(7):7–15
2.
go back to reference Noman HA, Abdullah SM, Kama N, Noman SA (2016) A lightweight scheme to mitigate deauthentication and disassociation DoS attacks in wireless 802.11 networks Noman HA, Abdullah SM, Kama N, Noman SA (2016) A lightweight scheme to mitigate deauthentication and disassociation DoS attacks in wireless 802.11 networks
3.
go back to reference Agarwal M, Biswas S, Nandi S (2013) Detection of de-authentication denial of service attack in 802.11 networks Agarwal M, Biswas S, Nandi S (2013) Detection of de-authentication denial of service attack in 802.11 networks
4.
go back to reference Rohith Raj S (2018) SCAPY—a powerful interactive packet manipulation program. In: 2018 international conference on networking, embedded and wireless systems (ICNEWS), pp 1–5 Rohith Raj S (2018) SCAPY—a powerful interactive packet manipulation program. In: 2018 international conference on networking, embedded and wireless systems (ICNEWS), pp 1–5
5.
go back to reference Kaur I, Kaur H, Singh EG (2014) Analysing various packet sniffing tools. Int J Electr Electron Comput Sci Eng 1(5):65–69 Kaur I, Kaur H, Singh EG (2014) Analysing various packet sniffing tools. Int J Electr Electron Comput Sci Eng 1(5):65–69
6.
go back to reference Verma A, Singh A (2013) An approach to detect packets using packet sniffing. Int J Comput Sci Eng Surv 4(3):21–33 Verma A, Singh A (2013) An approach to detect packets using packet sniffing. Int J Comput Sci Eng Surv 4(3):21–33
7.
go back to reference Noman HA, Abdullah SM, Mohammed HI (2015) An automated approach to detect deauthentication and disassociation dos attacks on wireless 802.11 networks Noman HA, Abdullah SM, Mohammed HI (2015) An automated approach to detect deauthentication and disassociation dos attacks on wireless 802.11 networks
8.
go back to reference Aung MAC, Thant KP (2017) Detection and mitigation of wireless link layer attacks. In: 2017 IEEE 15th international conference on software engineering research, management and applications (SERA), pp 173–178 Aung MAC, Thant KP (2017) Detection and mitigation of wireless link layer attacks. In: 2017 IEEE 15th international conference on software engineering research, management and applications (SERA), pp 173–178
9.
go back to reference Kaur J (2020) Wired LAN and wireless LAN attack detection using signature based and machine learning tools Kaur J (2020) Wired LAN and wireless LAN attack detection using signature based and machine learning tools
10.
go back to reference Analyzing deauthentication packets with wireshark (2020), pp 1–11 Analyzing deauthentication packets with wireshark (2020), pp 1–11
11.
go back to reference Linux H, Paython W, Point A (2020) Wireless sniffing: how to build a simple WiFi sniffer in Python Linux H, Paython W, Point A (2020) Wireless sniffing: how to build a simple WiFi sniffer in Python
12.
go back to reference Sweigart C (2003) Interested in learning more? Institute, Author retain full rights. Security 401:1–39 Sweigart C (2003) Interested in learning more? Institute, Author retain full rights. Security 401:1–39
13.
go back to reference Jo C, Barros P, Tavares M Vulnerabilities in IoT Devices for smart home environment Jo C, Barros P, Tavares M Vulnerabilities in IoT Devices for smart home environment
14.
go back to reference Visoottiviseth V, Akarasiriwong P, Chaiyasart S, Chotivatunyu S (2017) PENTOS: penetration testing tool for Internet of Thing devices, pp 2279–2284 Visoottiviseth V, Akarasiriwong P, Chaiyasart S, Chotivatunyu S (2017) PENTOS: penetration testing tool for Internet of Thing devices, pp 2279–2284
15.
go back to reference Williams R, Mcmahon E, Samtani S, Patton M, Chen H (2017) Identifying vulnerabilities of consumer Internet of Things (IoT) devices : a scalable approach, pp 179–181 Williams R, Mcmahon E, Samtani S, Patton M, Chen H (2017) Identifying vulnerabilities of consumer Internet of Things (IoT) devices : a scalable approach, pp 179–181
16.
go back to reference Arora A Preventing wireless deauthentication attacks over Arora A Preventing wireless deauthentication attacks over
17.
go back to reference Divya, Kumar S (2010) Analysis of denial of service attacks in IEEE 802.11s wireless mesh networks. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering (LNICST), vol 41, pp 1–10 Divya, Kumar S (2010) Analysis of denial of service attacks in IEEE 802.11s wireless mesh networks. Lecture notes of the institute for computer sciences, social informatics and telecommunications engineering (LNICST), vol 41, pp 1–10
19.
go back to reference Kamble A, Bhutad S (2018) Survey on Internet of Things (IOT). In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp 307–312 Kamble A, Bhutad S (2018) Survey on Internet of Things (IOT). In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), pp 307–312
20.
go back to reference Madory D (2020) New methods of spoof detection in 802.11b wireless networking Madory D (2020) New methods of spoof detection in 802.11b wireless networking
21.
go back to reference Vaidya A, Jaiswal S, Motghare M (2016) A review paper on spoofing detection methods in wireless LAN. In: Proceedings of the 10th international conference on intelligent systems and control (ISCO 2016) Vaidya A, Jaiswal S, Motghare M (2016) A review paper on spoofing detection methods in wireless LAN. In: Proceedings of the 10th international conference on intelligent systems and control (ISCO 2016)
Metadata
Title
Lightweight De-authentication DoS Attack Detection Methodology for 802.11 Networks Using Sniffer
Authors
Zakir Ahmad Sheikh
Yashwant Singh
Copyright Year
2021
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-16-0733-2_5