A Sophisticated Solution for Revealing Attacks on Wireless LAN

  • René Neumerkel
  • Stephan Groß
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4083)


The development of the WPA and IEEE 802.11i standards have vastly improved the security of common wireless LAN setups. However, many installations still use the broken WEP protocol or even run with no security settings enabled. Furthermore, several threats are only partially addressed by the new security standards, e.g. rogue access points or denial of service. Specialised wireless intrusion detection systems are promising means to protect wireless networks against these threats. They can further improve the reliability and security of these networks. In our contribution we present such a wireless IDS to reveal common attacks on wireless LAN. We describe the development and evaluation of our prototype solution that seamlessly integrates with approaches for traditional wired networks.


Wireless Network Medium Access Control Access Point Intrusion Detection Intrusion Detection System 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  2. 2.
    KoreK: The KoreK attack – What FMS conveniently forgot to say. netstumbler.org forum (2004) (last visited: February 9, 2006) http://www.netstumbler.org/showthread.php?t=11869
  3. 3.
    KoreK: chopchop – Experimental WEP attacks. netstumbler.org forum (2004) (last visited: February 9, 2006), http://www.netstumbler.org/showthread.php?t=12489
  4. 4.
    Anonymous: Wi-Fi Protected Access: Strong, standards-based, interoperable security for today’s Wi-Fi networks. Technical report, Wi-Fi Alliance (2003) (last visited: June 28, 2005), http://www.wifialliance.com/OpenSection/pdf/Whitepaper_Wi-Fi_Security4-29-03.pdf
  5. 5.
    Anonymous: 802.11i – Amendment 6: Medium Access Control (MAC) Security Enhancements. Technical report, Institute of Electrical and Electronics Engineers, Inc. (2004) (last visited: February 24, 2006), http://standards.ieee.org/getieee802/download/802.11i-2004.pdf
  6. 6.
    Yang, H., Luo, H., Ye, F., Lu, S., Zhang, L.: Security in Mobile Ad Hoc Networks: Challenges and Solutions. IEEE Wireless Communications 11, 38–47 (2004)CrossRefGoogle Scholar
  7. 7.
    Buttyán, L., Hubaux, J.P.: Report on a Working Session on Security in Wireless Ad Hoc Networks. ACM SIGMOBILE Mobile Computing and Communications Review 7(1), 74–94 (2003)CrossRefGoogle Scholar
  8. 8.
    Zhang, Y., Lee, W., Huang, Y.A.: Intrusion Detection Techniques for Mobile Wireless Networks. Wireless Networks 9, 545–556 (2003)CrossRefGoogle Scholar
  9. 9.
    Lim, Y.X., Schmoyer, T., Levine, J., Owen, H.L.: Wireless Intrusion Detection and Response. In: Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY, USA (2003)Google Scholar
  10. 10.
    Schmoyer, T.R., Lim, Y.X., Owen, H.L.: Wireless Intrusion Detection and Response. A case study using the classic man-in-the-middle attack. In: Proceedings of the IEEE Wireless Communications and Networks Conference, Atlanta, Georgia, USA (2004)Google Scholar
  11. 11.
    Branch, J.W., Petroni Jr., N.L., van Doorn, L., Safford, D.: Autonomic 802.11 Wireless LAN Security Auditing. IEEE Security & Privacy, 56–65 (2004)Google Scholar
  12. 12.
    Welch, D.J., Lathrop, S.D.: A Survey of 802.11a Wireless Security Threats and Security Mechanisms. Technical Report IOTC-TR-2003-101, Information Technology and Operations Center, Department of Electrical Engineering and Computer Science, United States Military Academy, West Point, New York 10996, USA (2003)Google Scholar
  13. 13.
    Schneier, B.: Modeling security threats. Dr. Dobbâ’s Journal (1999)Google Scholar
  14. 14.
    Neumerkel, R.: Entwicklung eines Angriffssensors für Wireless LAN. Master’s thesis, Technische Universitäresden (2005)Google Scholar
  15. 15.
    Vladimirov, A., Gavrilenko, K.V., Mikhailovsky, A.A.: WI-FOO. The Secrets of Wireless Hacking. Addison-Wesley Professional, Reading (2004)Google Scholar
  16. 16.
    Paxson, V.: Bro: A System for Detecting Network Intruders in Real-time. Computer Networks 31(23-24), 2435–2463 (1999)CrossRefGoogle Scholar
  17. 17.
    Bellardo, J., Savage, S.: 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In: Proceedings of the 12th USENIX Security Symposium, Washington, D.C., pp. 15–28 (2003)Google Scholar
  18. 18.
    Wright, J.: Detecting Wireless LAN MAC Address Spoofing (2003) (last visited: February 28, 2006), http://home.jwu.edu/jwright/papers/wlan-mac-spoof.pdf
  19. 19.
    Groβ, S.: Selbstschützende mobile Systeme. In: Sicherheit 2006, Beiträge der 3. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V (GI) (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • René Neumerkel
    • 1
  • Stephan Groß
    • 1
  1. 1.Department of Computer Science, Institute for System ArchitectureTechnische Universität DresdenDresdenGermany

Personalised recommendations