Study an Improvisation Method for Detecting Spoofed Attack in Wireless LAN

Abstract

In terms of network security, spoofing is gaining illegitimate advantage by falsifying data. Spoofing can be done by a person or a program. Popularity of spoofing is increasing because of less precautions taken by application while verifying identity. In case of wireless security, spoofing threats are increasing. If MAC address act as only identification of the wireless devices, the adversary can pretend as any wireless device by changing MAC address using various free available tools over the internet. Therefore detection of presence of the adversary can avoid the launching of other wireless attacks. After lots of research on anomaly detection, still some wireless attacks are undetected. The analysis of possible reasons for generating false positive and false negative in Forge Resistance Relationship (FRR) spoof detection method is explained in this paper. Also on the basis of anomaly detection, the FRR rate analysis (FRR-RA) is compared with parent FRR method of different network scenarios FRR-RA method fails to identify all the spoofing attacks of scenario where attacker is sending the forged sequence numbered spoofed packets of higher signal rate than genuine packet sender. We are proposing a solution to this attack scenario. The proposed algorithm is combination of FRR-RA and Received Signal Strength (RSS), considering there is no change in environmental condition and no multipath effect.

Authors and Affiliations

R. R. Agale, S. V. Athawale

Keywords

Related Articles

A New Single Phase 5- Level Inverter Fed from Hybrid Renewable Energy System with Less Number of Switches

Renewable energy sources such as photovoltaic, wind, and low-head hydro and geothermal are expected to increase greatly their market share of the total power produced in the world. Fuel cell technology is also nearing t...

MATLAB Based Vehicle Number Plate Recognition.

The ANPR (Automatic Number plate Recognition) system has gained much popularity in recent years. It is a technique aimed at the extraction and recognition of license plates using image processing techniques. With the de...

Curvelet Based Image fusion techniques for Medical Images

Image fusion integrates multiple images of the same scene from multiple image sensor data. It has acquired an integral role in medical field. This paper introduces the various means image fusion based on transform domai...

Survey on METASPLOIT Framework

Penetration testing is a uniquely challenging job. Paid to think like a criminal to use guerilla tactics to advantage, and to find the weakest links in a highly intricate net of defenses. The most widely used tool by th...

Effect of Different Sources of Manuring on Growth, Yield and Quality of Capsicum (Capsicum annum) cv. California wonder under Low Cost Poly-House Condition

Bell pepper is a highly priced and choice vegetable, providing rich source of vitamin A, B and C. It is largely grown around urban centre and is often sold at a premium price compared to other vegetables. The crop respo...

Download PDF file
  • EP ID EP22812
  • DOI -
  • Views 219
  • Downloads 4

How To Cite

R. R. Agale, S. V. Athawale (2016). Study an Improvisation Method for Detecting Spoofed Attack in Wireless LAN. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(11), -. https://europub.co.uk./articles/-A-22812