Study an Improvisation Method for Detecting Spoofed Attack in Wireless LAN

Abstract

In terms of network security, spoofing is gaining illegitimate advantage by falsifying data. Spoofing can be done by a person or a program. Popularity of spoofing is increasing because of less precautions taken by application while verifying identity. In case of wireless security, spoofing threats are increasing. If MAC address act as only identification of the wireless devices, the adversary can pretend as any wireless device by changing MAC address using various free available tools over the internet. Therefore detection of presence of the adversary can avoid the launching of other wireless attacks. After lots of research on anomaly detection, still some wireless attacks are undetected. The analysis of possible reasons for generating false positive and false negative in Forge Resistance Relationship (FRR) spoof detection method is explained in this paper. Also on the basis of anomaly detection, the FRR rate analysis (FRR-RA) is compared with parent FRR method of different network scenarios FRR-RA method fails to identify all the spoofing attacks of scenario where attacker is sending the forged sequence numbered spoofed packets of higher signal rate than genuine packet sender. We are proposing a solution to this attack scenario. The proposed algorithm is combination of FRR-RA and Received Signal Strength (RSS), considering there is no change in environmental condition and no multipath effect.

Authors and Affiliations

R. R. Agale, S. V. Athawale

Keywords

Related Articles

High throughput Architecture of Arithmetic Coder Used in SPIHT

In this paper we propose a high-throughput memory-efficient arithmetic coder architecture for the set partitioning in hierarchical trees(SPIHT) image compression is proposed based on a simple context model in this paper...

Wind Energy Power System Simulation for a Remote Area Power Supply

This work focuses on the designing and analysis of a wind energy power system for a Remote Area Power Supply (RAPS). The system introduces a three phase ac-ac converter with an isolated high frequency-link for a wind en...

A investigative Study about Restructuring of Indian Power Market

This paper is a discussion about the introduction of restructuring and deregulation in Indian Power System. In modern era, deregulation has an important impact on power sector. In this paper, recent use of deregulation...

Harmonic Injection Technique to Reduce Harmonic

A harmonic injection technique, which reduces theline frequency harmonics of the single switch three-phase boost rectifier, has been implemented. In this method, a periodic voltage is injected in the control circuit to...

Design of Brushless DC Motor with Fuzzy Logic Controller

Actually brushless DC motor is the alternate motor for traditional motors and also comparatively brushless DC motor has improved performance in speed, torque, efficiency and electromagnetic torque. In this paper the thr...

Download PDF file
  • EP ID EP22812
  • DOI -
  • Views 211
  • Downloads 4

How To Cite

R. R. Agale, S. V. Athawale (2016). Study an Improvisation Method for Detecting Spoofed Attack in Wireless LAN. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(11), -. https://europub.co.uk/articles/-A-22812