Skip to main content

Theoretical Framework of the Algorithm to Thwart MAC Spoofing DoS Attack in Wireless Local Area Infrastructure Network

  • Conference paper
  • First Online:
Artificial Intelligence and Evolutionary Algorithms in Engineering Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 324))

  • 2098 Accesses

Abstract

A major threat in wireless local area infrastructure network is denial-of-service (DoS) attacks. It makes the resources unavailable for its anticipated user which can be accomplished through spoofing legitimate client/AP’s medium access control (MAC) address. Less protection in MAC address led to get easy spoofing. Since the management frame is unencrypted, adversary sends the management frame to the victim using spoofed MAC address. This prerequisite goaded to offer an effective prevention mechanism for DoS attack. Even though several preventing mechanisms are available, no one provides complete solution in preventing MAC layer DoS attack. This paper proposes a theoretical framework of threshold value (ThreV) algorithm, which is based on setting up ThreV for the management frame, to effectively address this issue.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. A. Celik, P. Ding, in Improving the Security of Wireless LANs by Managing 802.1x Disassociation. Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC04) (2004), 53–58

    Google Scholar 

  2. J. Haggerty, Q. Shi, M. Merabti, Early detection and prevention of denial-of- service attacks: a novel mechanism with propagated traced-back attack blocking. IEEE J. Sel. Areas Commun. 23(10), 1994–2002 (2005)

    Article  Google Scholar 

  3. A.A. samra, R. Abed, Enhancement of passive MAC spoofing detection techniques. Int. J. Adv. Comput. Sci. Appl. 1(5) (2010)

    Google Scholar 

  4. P. Ding, A solution to avoid denial of service attacks for wireless LANs. Int. J. Netw. Secur. 4(1), 35–44 (2007)

    Google Scholar 

  5. Y. Sheng, K. Tan, G. Chen, D. Kotz, A. Cambell, in Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. The 27th Conference on Computer Communications IEEE (2008)

    Google Scholar 

  6. S. Sivagowry, A. Persia, B. Vani, L. Arockiam, in A Solution to Prevent Resource Flooding Attacks in 802.11 WLAN. Lecture Notes in Computer Science Communication in Computer and Information Science (CCIS 269) (2012), pp. 607–616

    Google Scholar 

  7. The ns Manual, the VINT Project (2009). http://www.scribd.com/doc/52291274/Network-Simulator-2-Manual

  8. T. Saelim, P. Chumchu, C. Sriklauy, A new MAC address spoofing detection algorithm using PLCP header. IEEE ICOIN. 48–53 (2011)

    Google Scholar 

  9. A. Persia, S. Sivagowry, L. Arockiam, B. Vani, Inhibition of denial of service attack in WLAN using the integrated central manager. Int. J. Comput. Appl. 29(8), 28–33 (2011)

    Google Scholar 

  10. A. Gupta, M. Garg, DoS Attacks on IEEE 802.11 Wireless Networks and its Proposed Solutions. Soc. Sci. Res. Netw. (2010)

    Google Scholar 

  11. A. Persia, S. Sivagowry, M. Durairaj, Study of thwarting DoS attacks by detecting MAC spoof in WLAN infrastructure network. IEEE Xplore 264–268 (2012)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Persia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Durairaj, M., Persia, A. (2015). Theoretical Framework of the Algorithm to Thwart MAC Spoofing DoS Attack in Wireless Local Area Infrastructure Network. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_12

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2126-5_12

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2125-8

  • Online ISBN: 978-81-322-2126-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics