The immense growth of wireless network makes it prone to number of security threats. Most prevalent among them are spoof threats, in which one network device changes its network identifiers to that of another network device. One of the possible reasons of spoofing in wireless network is that per-frame source authentication is not provided. Full scale authentication can be provided, but it is not always desirable as it requires reliable key management. The attacker can further launch Denial of Service attacks by spoofing deauthentication/disassociation or power saving frames, can bypass the access control list or can falsely advertise services to wireless clients. This paper discusses some of the non cryptographic techniques to detect MAC spoofing along with their pros and cons and the network scenarios in which they can be used. Analysis of these techniques is done on data captured from live test bed. The information in this paper can help the wireless equipment manufacturers to implement intrusion detection systems capable of detecting MAC address spoofing efficiently with least number of false alarms.
[1]
Averill M. Law,et al.
Simulation Modeling and Analysis
,
1982
.
[2]
David R. Cheriton,et al.
Detecting identity-based attacks in wireless networks using signalprints
,
2006,
WiSe '06.
[3]
Mandy Andress.
Wireless LAN Security
,
2002,
Inf. Secur. J. A Glob. Perspect..
[4]
Wade Trappe,et al.
Light-weight Detection of Spoofing Attacks in Wireless Networks
,
2006,
2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.
[5]
Tzi-cker Chiueh,et al.
Sequence Number-Based MAC Address Spoof Detection
,
2005,
RAID.
[6]
Wade Trappe,et al.
Detecting Spoofing and Anomalous Traffic in Wireless Networks via Forge-Resistant Relationships
,
2007,
IEEE Transactions on Information Forensics and Security.
[7]
Douglas C. Madory,et al.
New Methods of Spoof Detection in 802.11b Wireless Networking
,
2006
.
[8]
Stefan Savage,et al.
802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions
,
2003,
USENIX Security Symposium.