Skip to main content

Deauthentication and Disassociation Detection and Mitigation Scheme Using Artificial Neural Network

  • Conference paper
  • First Online:
Emerging Trends in Intelligent Computing and Informatics (IRICT 2019)

Abstract

Wireless local area networks (WLAN) are increasingly deployed and widespread worldwide due to the convenience and the low cost that characterized it. However, due to the broadcasting and the shared nature of the wireless medium, WLANs are vulnerable to many kinds of attacks. Although there are many efforts to improve the security of a wireless network, some attacks are inevitable. Attackers can send fake de-authentication or disassociation frames to end the session a victim leading to a denial of service, stolen passwords, and leaks of sensitive information among many other cybercrimes. Effectively detecting such attacks is crucial in today’s critical applications. However, the extant security standards are vulnerable to such an attack, and it is still an open research problem. In this paper, a scheme called D3MS is proposed to detect and mitigate de-authentication and disassociation attack effectively. The aim is to construct a model that can distinguish between benign and fake frames by recognizing the normal behavior of the wireless station before sending the authentication and de-authentication frames. The hypothesis is that the emulating the normal behavior of a benign station prior to the authentication and de-authentication attack is useless. The experimentation results showed the effectiveness of the proposed detection technique. The proposed scheme has improved the detection performance by 64.4% comparing to the related work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Ahlawat, R., Dulaney, K.: Magic quadrant for wireless LAN infrastructure 2006. Gartner Research (2006)

    Google Scholar 

  • Arockiam, L., Vani, B.: Framework to detect and prevent medium access control layer denial of service attacks in WLAN. IRACST–Int. J. Comput. Netw. Wirel. Commun. (IJCNWC) 3(2), 152–159 (2013)

    Google Scholar 

  • Aslam, B., Islam, M.H., Khan, S.: Pseudo randomized sequence number based solution to 802.11 disassociation denial of service attack. In: 2006 Proceedings of the First Mobile Computing and Wireless Communication International Conference, MCWC 2006. IEEE (2006)

    Google Scholar 

  • Bahl, P., Padmanabhan, V.N.: RADAR: An in-building RF-based user location and tracking system. In: Proceedings of Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2000. IEEE (2000)

    Google Scholar 

  • Bargh, M.S., Hulsebosch, R., Eertink, E., Prasad, A., Wang, H., Schoo, P.: Fast authentication methods for handovers between IEEE 802.11 wireless LANs. In: Proceedings of the 2nd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots. ACM (2004)

    Google Scholar 

  • Barroso, L.A., Hölzle, U., Ranganathan, P.: The datacenter as a computer: designing warehouse-scale machines. Synth. Lect. Comput. Archit. 13(3), i–i189 (2018)

    Article  Google Scholar 

  • Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. USENIX Security (2003)

    Google Scholar 

  • Bello, L.L., Mariani, R., Mubeen, S., Saponara, S.: Recent advances and trends in on-board embedded and networked automotive systems. IEEE Trans. Ind. Inf. 15(2), 1038–1051 (2018)

    Article  Google Scholar 

  • Bicakci, K., Tavli, B.: Denial-of-service attacks and countermeasures in IEEE 802.11 wireless networks. Comput. Stan. Interfaces 31(5), 931–941 (2009)

    Article  Google Scholar 

  • Bicakci, K., Uzunay, Y.: Pushing the limits of address based authentication: how to avoid MAC address spoofing in wireless LANs. World Acad. Sci. Eng. Technol. 2, 214–223 (2008)

    Google Scholar 

  • Ferrag, M.A., Maglaras, L., Ahmim, A.: Privacy-preserving schemes for ad hoc social networks: a survey. IEEE Commun. Surv. Tutorials 19(4), 3015–3045 (2017)

    Article  Google Scholar 

  • Frankel, S., Eydt, B., Owens, L., Scarfone, K.: Establishing wireless robust security networks: a guide to IEEE 802.11 i. National Institute of Standards and Technology (2007)

    Google Scholar 

  • IW Group: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications (1997)

    Google Scholar 

  • Guo, F., Chiueh, T.-C.: Sequence number-based MAC address spoof detection. In: International Workshop on Recent Advances in Intrusion Detection. Springer (2005)

    Google Scholar 

  • Hogan, M., Newton, E.: Supplemental information for the report on strategic US government engagement in international standardization to achieve US objectives for cybersecurity (2015)

    Google Scholar 

  • Joshua Wright, G., Joshua, C.: Detecting wireless LAN MAC address spoofing. Cisco Certified Network Associate (2003)

    Google Scholar 

  • Lashkari, A.H., Danesh, M.M.S., Samadi, B.: A survey on wireless security protocols (WEP, WPA and WPA2/802.11 i). In: 2nd IEEE International Conference on Computer Science and Information Technology, 2009, ICCSIT 2009. IEEE (2009)

    Google Scholar 

  • Mar, J., Yeh, Y.-C., Hsiao, I.-F.: An ANFIS-IDS against deauthentication DOS attacks for a WLAN. In: 2010 International Symposium on Information Theory & Its Applications. IEEE (2010)

    Google Scholar 

  • Misra, S., Sarkar, S., Chatterjee, S.: Sensors, Cloud, and Fog: The Enabling Technologies for the Internet of Things. CRC Press (2019)

    Google Scholar 

  • Nandan, A., Das, S., Pau, G., Gerla, M., Sanadidi, M.: Co-operative downloading in vehicular ad-hoc wireless networks. In: Second Annual Conference on Wireless On-demand Network Systems and Services. IEEE (2005)

    Google Scholar 

  • Ratnayake, D.N., Kazemian, H.B., Yusuf, S.A.: Identification of probe request attacks in WLANs using neural networks. Neural Comput. Appl. 25(1), 1–14 (2014)

    Article  Google Scholar 

  • Samra, A.A., Abed, R.: Enhancement of passive mac spoofing detection techniques. Int. J. Adv. Comput. Sci. Appl. 1(5) (2010)

    Google Scholar 

  • Simic, D., Prodanovic, R.: A survey of wireless security. CIT J. Comput. Inf. Technol. 15(3), 237–255 (2007)

    Article  Google Scholar 

  • Singh, R., Sharma, T.P.: Detecting and reducing the denial of service attacks in WLANs. In: 2011 World Congress on Information and Communication Technologies (WICT). IEEE (2011)

    Google Scholar 

  • Singh, R., Sharma, T.P.: On the IEEE 802.11 i security: a denial-of-service perspective. Secur. Commun. Netw. 8(7), 1378–1407 (2015)

    Article  Google Scholar 

  • Stubblefield, A., Ioannidis, J., Rubin, A.D.: A key recovery attack on the 802.11 b wired equivalent privacy protocol (WEP). ACM Trans. Inf. Syst. Secur. (TISSEC) 7(2), 319–332 (2004)

    Article  Google Scholar 

  • Wang, L., Srinivasan, B.: Analysis and improvements over DoS attacks against IEEE 802.11 i standard. In: 2010 Second International Conference on Networks Security Wireless Communications and Trusted Computing (NSWCTC). IEEE (2010)

    Google Scholar 

  • Xia, H., Brustoloni, J.: Detecting and blocking unauthorized access in Wi-Fi networks. In: International Conference on Research in Networking. Springer (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Abdallah Elhigazi Abdallah .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Abdallah, A.E., Razak, S.A., Ghalib, F.A. (2020). Deauthentication and Disassociation Detection and Mitigation Scheme Using Artificial Neural Network. In: Saeed, F., Mohammed, F., Gazem, N. (eds) Emerging Trends in Intelligent Computing and Informatics. IRICT 2019. Advances in Intelligent Systems and Computing, vol 1073. Springer, Cham. https://doi.org/10.1007/978-3-030-33582-3_81

Download citation

Publish with us

Policies and ethics