Affiliation:
1. National University "Zaporizhzhia Polytechnic", Zaporizhzhia, Ukraine
Abstract
The article issues related to IEEE 802.11 technology are considered, described in detail the vulnerability that allows an attacker to perform a deauthentication attack. Analysis and practical experiments have shown that the existing vulnerability of Wi-Fi technology still remains dangerous to legitimate users, and using it, an attacker can send deauthentication frames, which results in disruption of communication between clients and the access points to which they are connected. For research were used Kali Linux OS, Aircrack-ng tool to launch attacks and Wireshark to capture and analyze IEEE 802.11 frames. Experimental studies allowed to identify anomalies during the attack and based on them, an algorithm for detecting deauthentication attacks was offered. The proposed solution uses a combination of three parameters (reason code, timestmap, RSSI signal strength level), which in our opinion will reduce the frequency of false positives. It is proposed to use the DDA (Detector of Deauthentication Attack), which will scan and analyze wireless traffic, and issue warnings in the event of an attack.
Publisher
V. N. Karazin Kharkiv National University
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference21 articles.
1. M. Waliullah and D. Gan, "Wireless LAN Security Threats & Vulnerabilities", International Journal of Advanced Computer Science and Applications, vol. 5, no. 1, pp. 176-183, 2014 https://doi.org/10.14569/ijacsa.2014.050125
2. C. Kolias, G. Kambourakis, A. Stavrou and S. Gritzalis, "Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset", IEEE Communications Surveys & Tutorials, vol. 18, no. 1, pp. 184-208, 2016 https://doi.org/10.1109/comst.2015.2402161
3. M. Chan Aung and K. Thant, "Detection and mitigation of wireless link layer attacks", 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA), pp. 173-178, 2017 https://doi.org/10.1109/sera.2017.7965725
4. H. A. Noman, S. M. Abdullah, and H. I. Mohammed, "An automated approach to detect deauthentication and disassociation dos attacks on wireless 802.11 networks", International Journal of Computer Science Issues (IJCSI), vol. 12, no. 4, pp. 107-112, 2015 https://www.ijcsi.org/papers/IJCSI-12-4-107-112.pdf
5. Deep Joshi, Dr. Ved Vyas Dwivedi, K.M.Pattani “De-Authentication attack on wireless network 802.11i using Kali Linux”, International Research Journal of Engineering and Technology (IRJET), Volume, 04 Issue, pp. 1666-1669, 2017 https://www.irjet.net/archives/V4/i1/IRJET-V4I1331.pdf