Affiliation:
1. University of Jordan
2. Princess Sumaya University for Technology
Abstract
Abstract
Wireless network attacks are some of the most common network security threats dealt with on a daily basis. Their ease of execution and effectiveness make them commonplace within most public networks. The goal of this paper is to develop a tool which provides defenses against these attacks, one which can also generate the attacks to test its own effectiveness in defending against them. The research involved the design, testing, and implementation of an attack/defense tool, one which benefits from a user-friendly user interface that greatly simplifies the testing process. The attacks were generated using existing tools, linked to one central interface. The defense methodology was script-based and created entirely from scratch. It was also linked to a single interface which continuously monitored logs. The results showed that the proposed defenses to the studied wireless attacks were effective at mitigation, or outright prevention. They were also more lightweight than existing solutions, making them more appealing for less powerful hardware.
Publisher
Research Square Platform LLC
Reference10 articles.
1. Tripathi N, Hubballi N, "A probabilistic anomaly detection scheme to detect DHCP starvation attacks," 2016 IEEE International Conference on Advanced Networks and, Systems T (2016) (ANTS), pp. 1–6, 10.1109/ANTS.2016.7947848
2. GitHub - kamorin/DHCPig : DHCP exhaustion script written in python using scapy network library
3. Tripathi N, Hubballi N (2015) "Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack," IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), 2015, pp. 1–3, 10.1109/ANTS.2015.7413661
4. Huawei – DHCP Security - WLAN Security Hardening Guide [Online]. Available: https://support.huawei.com/enterprise/en/doc/EDOC1100096305/40410024/dhcp-security
5. Syed S, Khuhawar F, Talpur S, Memon AA, Luque-Nieto M-A, Narejo S (2022) "Analysis of Dynamic Host Control Protocol Implementation to Assess DoS Attacks," 2022 Global Conference on Wireless and Optical Technologies (GCWOT), pp. 1–7, 10.1109/GCWOT53057.2022.9772887
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献