Enhancement of Passive MAC Spoofing Detection Techniques

Abstract

 Failure of addressing all IEEE 802.11i Robust Security Networks (RSNs) vulnerabilities enforces many researchers to revise robust and reliable Wireless Intrusion Detection Techniques (WIDTs). In this paper we propose an algorithm to enhance the performance of the correlation of two WIDTs in detecting MAC spoofing Denial of Service (DoS) attacks. The two techniques are the Received Signal Strength Detection Technique (RSSDT) and Round Trip Time Detection Technique (RTTDT). Two sets of experiments were done to evaluate the proposed algorithm. Absence of any false negatives and low number of false positives in all experiments demonstrated the effectiveness of these techniques

Authors and Affiliations

Aiman Abu Samra , Ramzi Abed

Keywords

Related Articles

Modeling Access Control Policy of a Social Network

Social networks bring together users in a virtual platform and offer them the ability to share -within the Community- personal and professional information’s, photos, etc. which are sometimes sensitive. Although, the maj...

Design and Implementation for Multi-Level Cell Flash Memory Storage Systems

The flash memory management functions of write coalescing, space management, logical-to-physical mapping, wear leveling, and garbage collection require significant on-going computation and data movement. MLC flash memory...

Evaluating the Impact of Critical Factors in Agile Continuous Delivery Process: A System Dynamics Approach

Continuous Delivery is aimed at the frequent delivery of good quality software in a speedy, reliable and efficient fashion – with strong emphasis on automation and team collaboration. However, even with this new paradigm...

Prediction of Mental Health Problems Among Children Using Machine Learning Techniques

Early diagnosis of mental health problems helps the professionals to treat it at an earlier stage and improves the patients’ quality of life. So, there is an urgent need to treat basic mental health problems that prevail...

Evaluation of Different Hypervisors Performance in the Private Cloud with SIGAR Framework

To make cloud computing model Practical and to have essential characters like rapid elasticity, resource pooling, on demand access and measured service, two prominent technologies are required. One is internet and second...

Download PDF file
  • EP ID EP119378
  • DOI -
  • Views 95
  • Downloads 0

How To Cite

Aiman Abu Samra, Ramzi Abed (2010).   Enhancement of Passive MAC Spoofing Detection Techniques. International Journal of Advanced Computer Science & Applications, 1(5), 108-116. https://europub.co.uk/articles/-A-119378