New Approach in Detection MAC Spoofing in a WiFi LAN

Main Article Content

Hamid Mohamed Ali
Ammna Mohamed Abbas

Abstract

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).


SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious
spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.


 

Article Details

How to Cite
“New Approach in Detection MAC Spoofing in a WiFi LAN” (2014) Journal of Engineering, 20(08), pp. 142–155. doi:10.31026/j.eng.2014.08.09.
Section
Articles

How to Cite

“New Approach in Detection MAC Spoofing in a WiFi LAN” (2014) Journal of Engineering, 20(08), pp. 142–155. doi:10.31026/j.eng.2014.08.09.

Publication Dates

References

➢ Bansal, R., etal., 2008, Non-Cryptographic Methods of MAC Spoof Detection in Wireless LAN, Networks. ICON 2008.16th IEEE International Conference on, ISSN 1556-6463.

➢ Chandrasekaran, G., etal., 2009, Detecting Identity Spoofs in IEEE 802.11e Wireless Networks, Global Telecommunications Conference,.Globecom 2009.IEEE , ISSN 1930- 529X.

➢ Chumchu, P., etal., 2011, A new MAC Address Spoofing Detection Algorithm using PLCP Header, Information Networking (ICOIN), 2011 International Conference on, ISSN 1976-7684.

➢ Goel, S., etal., 2009, An Improved Method of Detecting Spoofed Attack in Wireless LAN, Networks and Communications. NETCOM '09.First International Conference on.

➢ Guo, F., etal., 2006, Sequence Number-Based MAC Address Spoof Detection, Recent Advances in Intrusion DetectionLecture Notes in Computer Science, Vol 3858.

➢ Idland, C., June 2011, Detecting MAC Spoofing Attacks in 802.11 Networks Through Fingerprinting on MAC Layer, M.Sc. Thesis, Norwegian University of Science and Technology.

➢ Konings, B., etal., 2009, Channel Switch and Quiet Attack: New DoS Attacks Exploiting The 802.11 Standard, Local Computer Networks. LCN 2009.IEEE 34th Conference on.

➢ Li, Q., etal., December 2007, Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships, Ieee Transection on Information Forensics and Security, VOL. 2, NO. 4.

➢ Madory,D., June 2006, New Methods of Spoof Detection in 802.11b Wireless Networking, M.Sc. thesis, Thayer School of Engineering.

➢ Sheng, Y., etal., April 2008, Detecting 802.11 MAC Layer Spoofing Using Received Signal Strength, NFOCOM 2008. The 27th Conference on Computer Communications. IEEE,ISSN 0743-166X.

Similar Articles

You may also start an advanced similarity search for this article.