CFP last date
20 May 2024
Reseach Article

Inhibition of Denial of Service Attack in WLAN using the Integrated Central Manager

by B. Vani, L. Arockiam, A. Persia, S. Sivagowry
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 29 - Number 8
Year of Publication: 2011
Authors: B. Vani, L. Arockiam, A. Persia, S. Sivagowry
10.5120/3582-4961

B. Vani, L. Arockiam, A. Persia, S. Sivagowry . Inhibition of Denial of Service Attack in WLAN using the Integrated Central Manager. International Journal of Computer Applications. 29, 8 ( September 2011), 28-33. DOI=10.5120/3582-4961

@article{ 10.5120/3582-4961,
author = { B. Vani, L. Arockiam, A. Persia, S. Sivagowry },
title = { Inhibition of Denial of Service Attack in WLAN using the Integrated Central Manager },
journal = { International Journal of Computer Applications },
issue_date = { September 2011 },
volume = { 29 },
number = { 8 },
month = { September },
year = { 2011 },
issn = { 0975-8887 },
pages = { 28-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume29/number8/3582-4961/ },
doi = { 10.5120/3582-4961 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:15:17.405931+05:30
%A B. Vani
%A L. Arockiam
%A A. Persia
%A S. Sivagowry
%T Inhibition of Denial of Service Attack in WLAN using the Integrated Central Manager
%J International Journal of Computer Applications
%@ 0975-8887
%V 29
%N 8
%P 28-33
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Denial of Service (DoS) attack is a major problem prevalent in Wireless Local Area Network (WLAN). Many security techniques were introduced to prevent the DoS attacks in WLAN. However, there are still many weaknesses which provide interest and way for hackers to do such attacks. This research mainly deals with the two types of DoS attacks, namely EAPOL (Extensible Authentication Protocol over LAN) start and EAPOL logoff frame over Access Point (AP) and wireless client. The experimental test bed is taken and the solutions are simulated using NS-2, a Linux based simulator, to analyze how far it prevents the DoS attacks in WLAN. The Central Manager (CM) along with Intruder Database (IDB) is proposed to defend the two different types of attacks targeted on Access Point and Client. The CM and IDB can be combined together and called as Integrated Central Manager (ICM). It acts as an Authenticated Server (AS) which manages the communication between the client and the Access Point. The proposed solution increases the throughput. When there is a chance of the failure of the ICM, maintaining a duplicate ICM is proposed which secure the client and Access Point from the attacks.

References
  1. Abhishek Gupta and Manish Garg, “DoS Attacks on IEEE 802.11 Wireless Networks and its Proposed Solutions”, http://ssrn.com/abstract, April 2010.
  2. Arash Habibi Lashkari, Mir Mohammad Seyed Danesh, Behrang Samadi, “A Survey on Wireless Security protocols (WEP,WPA and WPA2/802.11i)”, 2nd IEEE International Conference on Computer Science and Information Technology (ICCSIT),Beijing, China, pp. 48-52, August 8-11,2009.
  3. Arockiam .L. and Vani .B, “A Survey of Denial of Service Attacks and its Countermeasures on Wireless Network”, International Journal on Computer Science and Engineering, Vol.02, No. 05, pp. 1563-1571, 2010.
  4. Arockiam. L and Vani .B “A Comparative Study of the available Solutions to Minimize Denial of Service Attacks in WLAN”, International Journal of Computer Technology and Application, Vol 2 (3), pp. 619-625, 2011.
  5. Jalil Desa, Mina Malekzadeh, Abdul Azim Abdul Ghani and Shamala Subramaniam, “An Experimental Evaluation of DoS Attack and Its Impact on Throughput of IEEE 802.11 Wireless Networks”, International Journal of Computer Science and Network Security, Vol. 8, No. 8, pp. 1-5, August 2008.
  6. Radomir Prodanovic and Dejan Simic, “A Survey of Wireless Security”, Journal of Computing and Information Technology, CIT 15, 3, pp. 237-255, 2007.
  7. John Bellardo and Stefan Savage, “802.11 denial-of-service attacks: real vulnerabilities and practical solutions”, USENIX Security Symposium, Washington D.C., 2003.
  8. Kemal Bicakci and Bulent Tavli, “Denial-of-Service attacks and countermeasures in IEEE 802.11 wireless networks”, Computer Standards & Interfaces, pp. 931–941, 2009.
  9. F. Ferreri and M. Bernaschi, L. Valcamonici, “Access points vulnerabilities to DoS attacks in 802.11 networks”,Wireless Networks, vol 14, pp. 159-169, 2008.
  10. Nancy Cam-Winget, Russ Housley, David Wagner and Jesse Walker, “Security flaws in 802.11 data link protocols”, Communications of the ACM, Vol.46, Issue. 5, May 2003.
  11. Stanley Wong, “The Evolution of Wireless Security in 802.11 Networks: WEP, WPA and 802.11 Standards”, GSEC Practical v1.4b, May 2003.
  12. Mina Malekzadeh, Abdul Azim Abdul Ghani, Shamala Subramaniam, and Jalil Desa, “Validating Reliability of OMNeT++ Wireless Networks DoS Attacks: Simulations vs. Testbed”, International Journal of Network Security, Vol-13, No. 1, pp. 13-21, 2011.
  13. Mina Malekzadeh, Abdul Azim Abdul Ghani, Shamala Subramaniam, and Jalil Desa, “Emprical Analysis of Virtual Carrier Sense Flooding Attacks Over Wireless Local Area Network”, Journal of Computer science 5 (3), pp. 214-220, 2009.
  14. Ping Ding, “Central Manager: A Solution to Avoid Denial of Service Attacks for Wireless LANs”, International Journal of Network Security, Vol.4, No.1, pp. 35-44, January 2007.
  15. Shamala Subramaniam, Mina Malekzadeh, Abdul Azim Abdul Ghani and Jalil Desa “Vulnerability Analysis of extensible Authentication Protocol (EAP) DoS Attack over Wireless Networks”, The International Journal on Computer Network and Internet Research, CNIR, Vol 9, Iss. 1, pp. 39-46, July 2009.
  16. Mofreh Salem, Amany Sarhan and Mostafa Abu-Bakr “A DOS Attack Intrusion Detection and Inhibition Technique for Wireless Computer Networks”, The International Congress for global Science and Technology-CSIR, Volume (7), Issue (1),pp. 17-24 , July 2007.
  17. Aslihan Celik and Ping Ding, “Improving The Security of Wireless LANs By Managing 802.1x Disassociation” Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC04), Las Vegas , NV , pp. 53-58, January 2004.
  18. http://www.scribd.com/doc/52291274/Network-Simulator-2-Manual. The ns Manual, the VINT Project, January 6, 2009.
  19. Baber Aslam, Monis Akhlaq and Shoad A. Khan, “802.11 disassociation DoS attack simulation using Verilog”, World Scientific and Engineering Academy and Society, Vol 7, pp. 198-206, March 2008.
  20. Tuttorial for the Netwrok Simulator "ns", available at http://www.isi.edu/nsnam/ns/tutorial/
Index Terms

Computer Science
Information Sciences

Keywords

WLAN Security Denial of Service MAC Spoofing Central Manager Intruder Database