Loading...
Thumbnail Image
Item

802.11 Fingerprinting to Detect Wireless Stealth Attacks

Venkataraman, Aravind
Citations
Altmetric:
Abstract

We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as a solution for three critical stealth attacks in wireless networks. We focus on extracting traces of the 802.11 medium access control (MAC) protocol from the temporal arrival patterns of incoming traffic streams as seen on the wired side, to identify attacker behavior. Attacks addressed include unauthorized access points, selfish behavior at the MAC layer and MAC layer covert timing channels. We employ the Bayesian binning technique as a means of classifying between delay distributions. The scheme requires no change to the 802.11 nodes or protocol, exhibits minimal computational overhead and offers a single point of discovery. We evaluate our model using experiments and simulations.

Comments
Description
Date
2008-11-20
Journal Title
Journal ISSN
Volume Title
Publisher
Research Projects
Organizational Units
Journal Issue
Keywords
802.11 MAC protocol, Distributed coordination function, Rogue access points, MAC misbehavior, Covert channel.
Citation
Venkataraman, Aravind (2008). "802.11 Fingerprinting to Detect Wireless Stealth Attacks." Thesis, Georgia State University. https://doi.org/10.57709/1059402
Embargo Lift Date
2012-01-25
Embedded videos