Abstract
A major threat in wireless local area infrastructure network is denial-of-service (DoS) attacks. It makes the resources unavailable for its anticipated user which can be accomplished through spoofing legitimate client/AP’s medium access control (MAC) address. Less protection in MAC address led to get easy spoofing. Since the management frame is unencrypted, adversary sends the management frame to the victim using spoofed MAC address. This prerequisite goaded to offer an effective prevention mechanism for DoS attack. Even though several preventing mechanisms are available, no one provides complete solution in preventing MAC layer DoS attack. This paper proposes a theoretical framework of threshold value (ThreV) algorithm, which is based on setting up ThreV for the management frame, to effectively address this issue.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
A. Celik, P. Ding, in Improving the Security of Wireless LANs by Managing 802.1x Disassociation. Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC04) (2004), 53–58
J. Haggerty, Q. Shi, M. Merabti, Early detection and prevention of denial-of- service attacks: a novel mechanism with propagated traced-back attack blocking. IEEE J. Sel. Areas Commun. 23(10), 1994–2002 (2005)
A.A. samra, R. Abed, Enhancement of passive MAC spoofing detection techniques. Int. J. Adv. Comput. Sci. Appl. 1(5) (2010)
P. Ding, A solution to avoid denial of service attacks for wireless LANs. Int. J. Netw. Secur. 4(1), 35–44 (2007)
Y. Sheng, K. Tan, G. Chen, D. Kotz, A. Cambell, in Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength. The 27th Conference on Computer Communications IEEE (2008)
S. Sivagowry, A. Persia, B. Vani, L. Arockiam, in A Solution to Prevent Resource Flooding Attacks in 802.11 WLAN. Lecture Notes in Computer Science Communication in Computer and Information Science (CCIS 269) (2012), pp. 607–616
The ns Manual, the VINT Project (2009). http://www.scribd.com/doc/52291274/Network-Simulator-2-Manual
T. Saelim, P. Chumchu, C. Sriklauy, A new MAC address spoofing detection algorithm using PLCP header. IEEE ICOIN. 48–53 (2011)
A. Persia, S. Sivagowry, L. Arockiam, B. Vani, Inhibition of denial of service attack in WLAN using the integrated central manager. Int. J. Comput. Appl. 29(8), 28–33 (2011)
A. Gupta, M. Garg, DoS Attacks on IEEE 802.11 Wireless Networks and its Proposed Solutions. Soc. Sci. Res. Netw. (2010)
A. Persia, S. Sivagowry, M. Durairaj, Study of thwarting DoS attacks by detecting MAC spoof in WLAN infrastructure network. IEEE Xplore 264–268 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Durairaj, M., Persia, A. (2015). Theoretical Framework of the Algorithm to Thwart MAC Spoofing DoS Attack in Wireless Local Area Infrastructure Network. In: Suresh, L., Dash, S., Panigrahi, B. (eds) Artificial Intelligence and Evolutionary Algorithms in Engineering Systems. Advances in Intelligent Systems and Computing, vol 324. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2126-5_12
Download citation
DOI: https://doi.org/10.1007/978-81-322-2126-5_12
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2125-8
Online ISBN: 978-81-322-2126-5
eBook Packages: EngineeringEngineering (R0)