logo
    Wired LAN and Wireless LAN Attack Detection Using Signature Based and Machine Learning Tools
    10
    Citation
    8
    Reference
    20
    Related Paper
    Citation Trend
    Keywords:
    Spoofing attack
    Ping (video games)
    IP address spoofing
    Signature (topology)
    ARP spoofing
    The attacks that exploit the Address Resolution Protocol (ARP) are considered as the most dangerous for the security of networks. Indeed, this attack poisons the cache ARP of the machine and makes possible all the actions of Man In the Middle (reading, modification, denial-of-service). For this, it becomes very important to prevent against this type of attack, by setting up systems able to detect it, known as Intrusion Detection Systems, and to react consequently. Among the existing IDS, we find SNORT which is the most used; but its reactions are generally in a passive way (Log, sending message ...). In this paper, we propose an approach by introducing a Plug-In making SNORT react against ARPSpoofing's attack in real-time.
    ARP spoofing
    Spoofing attack
    Address Resolution Protocol
    Citations (10)
    Wireless LANs are quite popular and have found wide spread usage amongst various segments. The issue of spoofing, and its detection, in Wireless LANs has been a matter of serious debate and received wide spread attention in research community as well. Spoofing is a potent weapon in the hands of a Cyber Criminal. The very characteristics of spoofing makes the task of identification and tracking back of the perpetrator / initiator in Cyber Crimes very difficult, e.g. those relating to denial of service, session hijacking, and address masquerading attacks by changing its network identifiers in WLANs. One way to overcome the problem of spoofing is to authenticate the frames. However, in 802.11 WLANs, authentication and encryption for management and control frames is not provided. It is also observed that present MAC spoofing detection techniques bring out large number of false positives. This paper analyses the various spoofing detection methods in WLANs bringing out their pros and cons including the different level of security provided ranging from low to high. The analysis in the paper also brings out as to which particular method could be more suitable in a particular scenario and how one can easily get the reduced false positives, which has been a bane of current detection methods. The paper also presents two case scenarios, particularly highlighting the victim Silent case scenario not discussed much thus far in the current literature on the topic, to validate the results. By way of retrospect, an outline of future work is also suggested in the concluding remarks.
    Spoofing attack
    IP address spoofing
    MAC address
    Identification
    Wireless ad hoc networks are defenceless to uniqueness based assaults because they don't have the centralized server to control the communication nodes in the network, so many attacks like injecting the malicious nodes by adversaries, false identity creation for nodes and also including spoofing attacks, such that drastically collision or reduce the overall routine of wireless networks. Conservatively, make confident the uniqueness of the conversationalist and perceiving an adversarial or attackers presence is executed through cryptographic validation. Unfortunately, verification of the uniqueness or identity is not constantly enviable as it necessitates key service management, and also coupled with extra infrastructural visual projection and more general calculations. So that it has been proposed, which are corresponding to validate and can perceive wireless device spoofing with diminutive or no dependency on cryptographic technique i.e., without using the digital signature. So that we proposed the efficient algorithm to identify the spoofing or mockery of information and these kind of attacks in the wireless networks. There are many techniques proposed previously to tackle the false information injection, Identity theft attacks and IP spoofing in the wireless networks. In order to overcome the obstacles in the previously proposed methods, we implement effective algorithm for the authentication process or verification and filtering of the MAC addresses of the Roger wireless devices. Our proposed method has consisted of two main implementation parts to address the spoofing attacks. One part is to identify the uniqueness of the client address and other is to make the modification access point control list in each client. Through our proposed technique, recognize of spoofing or mockery of information attacks in wireless networks in the effective way and also helps to identify the adversaries using same uniqueness of the nodes in the wireless networks. Our proposed model can be explored added to get better the accuracy of determining the attacks in the wireless networks, by using non cryptographic technique when compared to others. Our proposed scheme works effectively when compared to the previous system is shown through our implementation and results.
    Spoofing attack
    IP address spoofing
    The spoofing threats in wireless network increases with its popularity. They are the generator of all other attacks in wireless network. Free availability of MAC address changing tools over internet makes adversary ease in changing its identity as legitimate user. Detection of adversary presence avoids the launching of other wireless attacks. Presently known anomaly detection methods leave some attacks undetected. This paper analyze the possible reasons for generating false positive and false negative in Forge Resistance Relationship spoof detection method and proposed an improved method with reduced false alarms. The comparison of detecting the anomalous packet between improved method and its parent Forge Resistance Relationship Method is done in various network scenarios.
    Spoofing attack
    IP address spoofing
    Citations (10)
    Local Area Network (LAN) security is a critical and mandatory element that network administrators must master. It is often thought of network security as protecting the network from external attacks and intrusions. However, internal attacks can also be as damaging and malicious as external ones. One of the well known attacks in networking is packet spoofing at the different network layers. This paper discusses how spoofed ARP packets can be used by malicious users to redirect and use network's traffic to launch an attack against users' hosts. Limitations of current Intrusion Detection Systems (IDSs) in detecting traffic redirection attacks are also discussed. The paper then proposes practical and efficient mechanisms for detecting such malicious attacks in a switched LAN environment. In addition, the effect of the proposed techniques on network performance is shown to be minimal given the gained benefits.
    Spoofing attack
    ARP spoofing
    IP address spoofing
    Network administrator
    Citations (16)
    Wireless Networks collect and disseminate data from the fields where ordinary networks are unreachable.Wireless network system is prone to various types of attacks. Various attacks are Eavesdropping, DoS, Spoofing, etc. Among the common attacks, spoofing attacks has large impact on system's security. Conventional methods using cryptography introduces overhead problems. Spoofing Attacks can be launched with little effort as the wireless medium is shared. Spoofing attack affect the system performance. Spoofing attack on mobile wireless devices may inflict security and privacy damages on social life of Spoofing are also called IP address Forgery. In the context of network security, a spoofing Attack is a situation which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage. In this project SILENCE mechanism is used to find number of attackers. GADE technique is used to find presence of attacker in wireless network. IDOL system is to localize attackers. Simulation is performed in Network Simulator.
    Spoofing attack
    Aiming at wireless network attacks such as DoS attacks, rouge STA, rouge AP, War Driving attacks and brute force attacks, a Lightweight Intrusion Detection System(IDS) for Wireless Lan(WLAN) is implemented by combining the misuse detection and anomaly detection. In this system, the user can define attack rule set, authorization AP/STA list, illegal AP/STA list, the sensitivity and the threshold value of detection can adjust according to the circumstance and user requirement. The test shows that this system has a better detecting effect than other WLAN intrusion detection in market.
    Citations (5)
    Network Intrusion Detection System (NIDS) can help administrators of a server in detecting attacks by analyzing packet data traffic on the network in real-time. If an attack occurs, an alert to the administrator is provided by NIDS so that the attack can be known and responded immediately. On the other hand, the alerts cannot be monitored by administrators all the time. Therefore, a system that automatically sends notifications to administrators in real-time by utilizing social media platforms is needed. This paper provides an analysis of the notification system built using Snort as NIDS with WhatsApp and Telegram as a notification platform. There are three types of attacks that are simulated and must be detected by Snort, which are Ping of Death attacks, SYN flood attacks, and SSH brute force attacks. The results obtained indicate that the system successfully provided notification in the form of attack time, IP source of the attack, source of attack port and type of attack in real-time.
    Ping (video games)
    Notification system
    Network administrator