Sequence Number-Based MAC Address Spoof Detection

@inproceedings{Guo2005SequenceNM,
  title={Sequence Number-Based MAC Address Spoof Detection},
  author={F. Guo and T. Chiueh},
  booktitle={RAID},
  year={2005}
}
  • F. Guo, T. Chiueh
  • Published in RAID 2005
  • Computer Science
  • The exponential growth in the deployment of IEEE 802.11-based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that exploit vulnerabilities at the IP layer or above can be readily addressed by intrusion detection systems designed for wired networks. However, attacks exploiting link-layer protocol vulnerabilities require a different set of intrusion detection mechanism. Most link-layer attacks in WLANs are denial of service attacks and work by… CONTINUE READING
    210 Citations
    Non-cryptographic methods of MAC spoof detection in wireless LAN
    • 19
    • Highly Influenced
    MAC Layer DoS Attacks in IEEE 802 . 11 Networks
    • 11
    • PDF
    Detecting Identity Spoofs in 802 . 11 e Wireless Networks
    • 7
    • Highly Influenced
    • PDF
    Detecting Identity Spoofs in IEEE 802.11e Wireless Networks
    • 35
    • PDF
    Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks
    • 13
    • PDF
    De-Authentication Attack Detection using Discrete Event Systems in 802.11 Wi-Fi Networks
    Study of thwarting DoS attacks by detecting MAC spoof in WLAN infrastructure networks
    • A. Persia, M. Durairaj, S. Sivagowry
    • Computer Science
    • 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT)
    • 2012
    • 5
    Pseudo Randomized Sequence Number Based Solution to 802.11 Disassociation Denial of Service Attack
    • Baber Aslam, M.H. Islam, S. Khan
    • Engineering
    • 2006 Proceedings of the First Mobile Computing and Wireless Communication International Conference
    • 2006
    • 26

    References

    SHOWING 1-10 OF 15 REFERENCES
    Detecting Wireless LAN MAC Address Spoofing
    • 142
    802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
    • 788
    • PDF
    Intercepting mobile communications: the insecurity of 802.11
    • 1,065
    • PDF
    802.11i and WPA
    • Up Close. Network Computing,
    • 2004
    11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
    • Proceedings of the USENIX Security Symposium
    • 2003
    Host AP driver for Intersil Prism2/2.5/3
    • Host AP driver for Intersil Prism2/2.5/3
    IEEE 802.11 Standard
    • IEEE 802.11 Standard
    MAC Spoofing–An Introduction
    • MAC Spoofing–An Introduction