Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1151828.1151854dlproceedingsArticle/Chapter ViewAbstractPublication Pagesaus-cswConference Proceedingsconference-collections
Article
Free access

Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks

Published: 01 January 2006 Publication History

Abstract

Current IEEE 802.11 wireless networks are vulnerable to session hijacking attacks as the existing standards fail to address the lack of authentication of management frames and network card addresses, and rely on loosely coupled state machines. Even the new WLAN security standard - IEEE 802.11i does not address these issues. In our previous work, we proposed two new techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. These techniques utilise unspoofable characteristics from the MAC protocol and the physical layer to enhance confidence in the intrusion detection process. This paper extends our earlier work and explores usability, robustness and accuracy of these intrusion detection techniques by applying them to eight distinct test scenarios. A correlation engine has also been introduced to maintain the false positives and false negatives at a manageable level. We also explore the process of selecting optimum thresholds for both detection techniques. For the purposes of our experiments, Snort-Wireless open source wireless intrusion detection system was extended to implement these new techniques and the correlation engine. Absence of any false negatives and low number of false positives in all eight test scenarios successfully demonstrated the effectiveness of the correlation engine and the accuracy of the detection techniques.

References

[1]
Bardwell, J. (2002), Converting Signal Strength Percentage to dBm Values, Whitepaper. Available at http://www.wildpackets.com/elements/ whitepaper/Converting Signal Strength. pdf.
[2]
Bellardo, J. & Savage, S. (2003), 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions, in 'Proceedings of the USENIX Security Symposium. Washington D.C., USA'.
[3]
Gill, R., Smith, J., Looi, M. &Clark, A. (2005), Passive Techniques for Detecting Session Hijacking Attacks in IEEE 802.11 Wireless Networks, in 'Proceedings of AusCERT Asia Pacific Information Technology Security Conference (AusCERT2005), Referred R&D Stream, Clark A., Kerr, K., and Mohay, G. (Eds), University of Queensland', pp. 26-38. Available at http:// www.isrc.qut.edu.au/events/auscert2005/ proceedings/gill05passive.pdf.
[4]
IEEE (1999). IEEE 802.11 Standard. Available at http://standards.ieee.org/getieee802/ download/802.11-1999.pdf.
[5]
Mishra, A. & Arbaugh, W. (2003), An Initial Security Analysis of the IEEE 802.1X Standard, Technical report. Available at http://citeseer.ist. psu.edu/566520.html.
[6]
Schmoyer, T., Lim, Y. X. & Owen, H. (2004), Wireless intrusion detection and response: a classic study using main-in-the-middle attack, inWireless Communications and Networking Conference, WCNC. IEEE, Volume: 2, 21-25 March', pp. 883_888.
[7]
Yeo, J., Banerjee, S. & Agrawala, A. (2002), Measuring traffic on the wireless medium: Experience and pitfalls, Technical report. CS-TR 4421, Department of Computer Science, University of Maryland. Available at http://citeseer.ist. psu.edu/yeo02measuring.html.

Cited By

View all
  • (2017)Fighting against phishing attacksNeural Computing and Applications10.1007/s00521-016-2275-y28:12(3629-3654)Online publication date: 1-Dec-2017
  • (2015)Information security in computer networks with dynamic topologyProceedings of the 8th International Conference on Security of Information and Networks10.1145/2799979.2800023(127-130)Online publication date: 8-Sep-2015
  • (2012)SessionJugglerProceedings of the 21st international conference on World Wide Web10.1145/2187836.2187880(321-330)Online publication date: 16-Apr-2012

Recommendations

Comments

Information & Contributors

Information

Published In

cover image DL Hosted proceedings
ACSW Frontiers '06: Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
January 2006
230 pages

Publisher

Australian Computer Society, Inc.

Australia

Publication History

Published: 01 January 2006

Author Tags

  1. passive monitoring
  2. received signal strength
  3. round trip time
  4. session hi-jacking
  5. wireless intrusion detection

Qualifiers

  • Article

Conference

ACSW Frontiers '06
ACSW Frontiers '06: Grid computing and e-research
January 16 - 19, 2006
Tasmania, Hobart, Australia

Acceptance Rates

Overall Acceptance Rate 204 of 424 submissions, 48%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)60
  • Downloads (Last 6 weeks)11
Reflects downloads up to 07 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2017)Fighting against phishing attacksNeural Computing and Applications10.1007/s00521-016-2275-y28:12(3629-3654)Online publication date: 1-Dec-2017
  • (2015)Information security in computer networks with dynamic topologyProceedings of the 8th International Conference on Security of Information and Networks10.1145/2799979.2800023(127-130)Online publication date: 8-Sep-2015
  • (2012)SessionJugglerProceedings of the 21st international conference on World Wide Web10.1145/2187836.2187880(321-330)Online publication date: 16-Apr-2012

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media