Evil Twin Attack Mitigation Techniques in 802.11 Networks

被引:0
|
作者
Muthalagu R. [1 ]
Sanjay S. [1 ]
机构
[1] Department of Computer Science, Birla Institute of Technology and Science Pilani – Dubai Campus, Dubai
关键词
DNS spoofing; Evil twin Wi-Fi attack; IP spoofing; SSL strip;
D O I
10.14569/IJACSA.2021.0120605
中图分类号
学科分类号
摘要
Evil Twin Wi-Fi attack is an attack on the 802.11 IEEE standard. The attack poses a threat to wireless connections. Evil Twin Wi-Fi attack is one of the attacks which has been there for a long time. Once the Evil Twin Wi-Fi attack is performed this acts as a gateway to many other attacks such as DNS spoofing, SSL Strip, IP Spoofing, and many more attacks. Thus, preventing the attack is essential for privacy and data security. This paper will be going through in detail how the attack is performed and different measures to prevent the attack. The proposed algorithm sniffs for fake AP using the whitelist in all the channels, once an unauthorized AP is detected the user has an option to de-authenticate any user in the unauthorized network in case any clients do connect to it by accident also the algorithm will be checking if any de-authentication frame is being sent to any of the AP to know which of the AP is being compromised. The efficiency of proposed approach is verified by simulating and mitigating the evil-twin attack. © 2021
引用
收藏
页码:38 / 41
页数:3
相关论文
共 50 条
  • [31] Beacon frame spoofing attack detection in IEEE 802.11 networks
    Martinez, Asier
    Zurutuza, Urko
    Uribeetxeberria, Roberto
    Fernandez, Miguel
    Lizarraga, Jesus
    Serna, Ainhoa
    Velez, Inaki
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 520 - +
  • [32] Parallel Active Dictionary Attack on IEEE 802.11 Enterprise Networks
    Nakhila, Omar
    Zou, Cliff
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 265 - 270
  • [33] FRID: Flood Attack Mitigation Using Resources Efficient Intrusion Detection Techniques in Delay Tolerant Networks
    Khalid, Waqar
    Ahmed, Naveed
    Khalid, Muhammad
    Din, Aziz Ud
    Khan, Aurangzeb
    Arshad, Muhammad
    IEEE ACCESS, 2019, 7 : 83740 - 83760
  • [34] High-Power Jamming Attack Mitigation Techniques in Spectrally-Spatially Flexible Optical Networks
    Savva, Giannis
    Manousakis, Konstantinos
    Rak, Jacek
    Tomkos, Ioannis
    Ellinas, Georgios
    IEEE ACCESS, 2021, 9 : 28558 - 28572
  • [35] Interference Mitigation Techniques for Femtocell Networks
    Bak, Jueun
    Lee, Wookbong
    Park, Haewook
    Lee, Inkyu
    2013 INTERNATIONAL SYMPOSIUM ON INTELLIGENT SIGNAL PROCESSING AND COMMUNICATIONS SYSTEMS (ISPACS), 2013, : 251 - 256
  • [36] Implementation of DoS Attack and Mitigation Strategies in IEEE 802.11b/g WLAN
    Deng, Julia
    Meng, Ke
    Xiao, Yang
    Xu, Roger
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C3I) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE IX, 2010, 7666
  • [37] Jamming ACK Attack to Wireless Networks and a Mitigation Approach
    Zhang, Zhiguo
    Wu, Jingqi
    Deng, Jing
    Qiu, Meikang
    GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [38] DDoS Flooding Attack Mitigation in Software Defined Networks
    Mahrach, Safaa
    Haqiq, Abdelkrim
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (01) : 693 - 700
  • [39] Reuse-Attack Mitigation in Wireless Sensor Networks
    Shafiei, H.
    Khonsari, Ahmad
    Mirzasoleiman, B.
    Ould-Khaoua, Mohamed
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [40] CINDAM: Customized Information Networks for Deception and Attack Mitigation
    Robertson, Seth
    Alexander, Scott
    Micallef, Josephine
    Pucci, Jonathan
    Tanis, James
    Macera, Anthony
    2015 IEEE NINTH INTERNATIONAL CONFERENCE ON SELF-ADAPTIVE AND SELF-ORGANIZING SYSTEMS WORKSHOPS (SASOW), 2015, : 114 - 119