Study an Improvisation Method for Detecting Spoofed Attack in Wireless LAN

Abstract

In terms of network security, spoofing is gaining illegitimate advantage by falsifying data. Spoofing can be done by a person or a program. Popularity of spoofing is increasing because of less precautions taken by application while verifying identity. In case of wireless security, spoofing threats are increasing. If MAC address act as only identification of the wireless devices, the adversary can pretend as any wireless device by changing MAC address using various free available tools over the internet. Therefore detection of presence of the adversary can avoid the launching of other wireless attacks. After lots of research on anomaly detection, still some wireless attacks are undetected. The analysis of possible reasons for generating false positive and false negative in Forge Resistance Relationship (FRR) spoof detection method is explained in this paper. Also on the basis of anomaly detection, the FRR rate analysis (FRR-RA) is compared with parent FRR method of different network scenarios FRR-RA method fails to identify all the spoofing attacks of scenario where attacker is sending the forged sequence numbered spoofed packets of higher signal rate than genuine packet sender. We are proposing a solution to this attack scenario. The proposed algorithm is combination of FRR-RA and Received Signal Strength (RSS), considering there is no change in environmental condition and no multipath effect.

Authors and Affiliations

R. R. Agale, S. V. Athawale

Keywords

Related Articles

Content Based Image Retrieval for Lung CT Slices using Texture Features

Content Based Image Retrieval (CBIR) is used to retrieve the relevant CT slices from the database based on the query CT slice. In the proposed method, the database consists of diseased CT slices of Cavitary TB. The proc...

Optimal Design of Low Pass Filter By Parzen, Taylor and Hamming Technique

Digital filtering plays a significant role in the world of technology. Therefore, processing of input signal has to be done to get useful signal. This paper deals with the design of finite impulse response digital filte...

Experimental Study on Fibre Reinforced High Volume Fly Ash Concrete for RCC Construction

Road projects in future have to be environmental friendly and cost effective apart from being safe so that society at large is benefited by the huge investments made in the infrastructure projects. To achieve this, comp...

A Rate Allocation Algorithm in Uplink SC-FDMA Systems for Enhancing Network Throughput

For a cellular system where mobile terminals transmit in the uplink to base stations (BSs) using single carrier- frequency division multiple access (SC-FDMA), we consider mul- ticell processing among BSs. Received signa...

Formability Analysis in Incremental Sheet Forming Of Aluminium Alloy

Non-corrosiveness and lightweight are the characteristics of aluminium due to which it is finding wider application in industries. However, forming aluminium sheet is difficult as compared to steel. Thus, emerging metho...

Download PDF file
  • EP ID EP22812
  • DOI -
  • Views 204
  • Downloads 4

How To Cite

R. R. Agale, S. V. Athawale (2016). Study an Improvisation Method for Detecting Spoofed Attack in Wireless LAN. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(11), -. https://europub.co.uk/articles/-A-22812