Analysis of attacks in IEEE 802.11 networks at different levels of OSI model
- Details
- Category: Content №2 2021
- Last Updated on 29 April 2021
- Published on 30 November -0001
- Hits: 3854
Authors:
R.Yu.Korolkov, orcid.org/0000-0001-5501-4600, National University Zaporizhzhia Polytechnic, Zaporizhzhia, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
S.V.Kutsak, orcid.org/0000-0001-5238-8957, National University Zaporizhzhia Polytechnic, Zaporizhzhia, Ukraine, e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it.
Naukovyi Visnyk Natsionalnoho Hirnychoho Universytetu. 2021, (2): 163 - 169
https://doi.org/10.33271/nvngu/2021-2/163
Abstract:
Purpose. Analysis of the main types of vulnerabilities and definition of weaknesses in 802.11 wireless network security, identification of the causes of information loss or network failure as a result of attacks.
Methodology. Research on attacks at different levels of the OSI network model.
Findings. The main threats and attacks that are implemented at each level of the OSI network model, from the physical to the application level, are identified. 15 different attacks with a detailed description of the consequences of their implementation are considered. The correspondence between the levels of the OSI network model and peculiarities of the implementation of attacks is established.
Originality. The principle of increasing the abstraction level was used to systematize attacks on WLAN. First, the known attacks are compared according to the levels of the OSI network model and the destructive consequences of their implementation are indicated; secondly, four types of attacks (reconnaissance, availability, spoofing, man-in-the-middle) are identified, and thirdly, attacks are divided into categories of passive and active ones. This approach makes it possible to get a more conceptual understanding of security issues in wireless networks.
Practical value. The results obtained can be used to develop effective multi-level systems for detecting and preventing intrusions into WLAN.
Keywords: attack, wireless network, network layer, spoofing, access point
References.
1. Singh, R., & Sharma, T. P. (2014). On the IEEE 802.11i security: a denial-of-service perspective. Security and Communication Networks,8(7), 1378-1407. https://doi.org/10.1002/sec.1079.
2. Farooq, T., Llewellyn-Jones, D., & Merabti, M. (2010). MAC Layer DoS Attacks in IEEE 802.11 Networks. The 11th Annual Conference on the Convergence of Telecommunications, Networking & Broadcasting (PGNet 2010), Liverpool, UK. Retrieved from http://www.cms.livjm.ac.uk/pgnet2010/MakeCD/Papers/2010063.pdf.
3. Singh, P., Mishra, M., & Barwal, P. N. (2014). Analysis of security issues and their solutions in wireless LAN.International Conference on Information Communication and Embedded Systems (ICICES2014), 1-6. https://doi.org/10.1109/icices.2014.7033871.
4. Aung, M., & Thant, K. (2019). IEEE 802.11 Attacks and Defenses. Seventeenth International Conference on Computer Applications (ICCA 2019), 186-191. Retrieved from https://meral.edu.mm/record/3457/files/ICCA%202019%20Proceedings%20Book-pages-197-202.pdf.
5. Waliullah, M., & Gan, D. (2014). Wireless LAN Security Threats & Vulnerabilities. International Journal of Advanced Com-puter Science and Applications, 5(1), 176-183. https://doi.org/10.14569/ijacsa.2014.050125.
6. Zou, Y., Zhu, J., Wang, X., & Hanzo, L. (2016). A Survey on Wireless Security: Technical Challenges, Recent Advances, and Future Trends.Proceedings of the IEEE,104(9), 1727-1765. https://doi.org/10.1109/jproc.2016.2558521.
7. Li, Y., Li, D., Cui, W., & Zhang, R. (2011). Research based on OSI model.2011 IEEE 3rd International Conference on Communication Software and Networks, 554-557. https://doi.org/10.1109/iccsn.2011.6014631.
8. Martinovi, M., Lovakovi, D., & osi, T. (2014). Network Security Issues in Regard to OSI Reference Model Layers. U: Major, A. (ur.) Proceedings of TEAM 2014: 6th International Scientific and Expert Conference of the International TEAM Society, 105-107. Retrieved from http://www.teamsociety.org/_Data/Files/140207115235606.pdf.
9. Cheng, M., Ling, Y., & Wu, W. B. (2017). Time Series Analysis for Jamming Attack Detection in Wireless Networks.GLOBECOM 2017 2017 IEEE Global Communications Conference, 1-7. https://doi.org/10.1109/glocom.2017.8254000.
10. Asharf, J., Moustafa, N., Khurshid, H., Debie, E., Haider, W., & Wahab, A. (2020). A Review of Intrusion Detection Systems Using Machine and Deep Learning in Internet of Things: Challenges, Solutions and Future Directions. Electronics, 9(7), 1177. https://doi.org/10.3390/electronics9071177.
11. Chang, T.-H., Chen, C.-M., Hsiao, H.-W., & Lai, G.-H. (2018). Cracking of WPA & WPA2 Using GPUs and Rule-based Method.Intelligent Automation and Soft Computing, 183-192. https://doi.org/10.31209/2018.100000054.
12. Sabillon, R., Cano M., Jeimy, Serra-Ruiz, Jordi & Cavaller, Vctor (2016). Cybercrime and Cybercriminals: AComprehensive Study. International Journal of Computer Networks and Communications Security, 4, 165-176.
13. Buriachok, V., & Sokolov, V. (2018). Using 2.4 GHz Wireless Botnets to Implement Denial-of-Service Attacks. International Academy Journal Web of Scholar24, 1421. https://doi.org/10.31435/rsglobal_wos/12062018/5734.
14. Mahrach, S., & Haqiq, A. (2020). DDoS Flooding Attack Mitigation in Software Defined Networks.International Journal of Advanced Computer Science and Applications,11(1), 693-700. https://doi.org/10.14569/ijacsa.2020.0110185.
15. Kristiyanto, Y., & Ernastuti Ernastuti (2020). Analysis of Deauthentication Attack on IEEE 802.11 Connectivity Based on IoT Technology Using External Penetration Test. CommIT (Communication and Information Technology) Journal, 14(1), 45-51. https://doi.org/10.21512/commit.v14i1.6337.
16. Cheema, R., Bansal, D., & Sofat, S. (2011). Deauthentication/Disassociation Attack: Implementation and Security in Wireless Mesh Networks. International Journal of Computer Applications, 23(7), 7-15. https://doi.org/10.5120/2901-3801.
17. Sawwashere, S.S., & Nimbhorkar, S.U. (2014). Survey of RTS-CTS Attacks in Wireless Network. 2014 Fourth International Conference on Communication Systems and Network Technologies, 752-755. https://doi.org/10.1109/csnt.2014.158.
18. Ratnayake, D.N., Kazemian, H.B., Yusuf, S.A., & Abdullah, A.B. (2011). An Intelligent Approach to Detect Probe Request Attacks in IEEE 802.11 Networks. Engineering Applications of Neural Networks, 372-381. https://doi.org/10.1007/978-3-642-23957-1_42.
19. Bogdanoski, M., Shuminoski, T., & Risteski, A. (2013). Analysis of the SYN Flood DoS Attack.International Journal of Computer Network and Information Security, 5(8), 15-11. https://doi.org/10.5815/ijcnis.2013.08.01.
20. Kolias, C., Kambourakis, G., Stavrou, A., & Gritzalis, S. (2016). Intrusion Detection in 802.11 Networks: Empirical Evaluation of Threats and a Public Dataset. IEEE Communications Surveys & Tutorials, 18(1), 184-208. https://doi.org/10.1109/comst.2015.2402161.
21. Nenovski, B.,&Mitrevski, P.(2015). Real-World ARP Attacks and Packet Sniffing, Detection and Prevention on Windows and Android Devices. Conference on Informatics and Information Technology 2015, (pp. 186-191). Retrieved from http://ciit.finki.ukim.mk/data/papers/CiitFinal2015.pdf.
22. Lake, J. (n.d.). ARP poisoning/spoofing: How to detect & prevent it. Retrieved from https://www.comparitech.com/blog/vpn-privacy/arp-poisoning-spoofing-detect-prevent/.
23. Cisar, P., & Pinter, R. (2019). Some ethical hacking possibilities in Kali Linux environment. Journal of Applied Technical and Educational Sciences, 9(4), 129-149. https://doi.org/10.24368/jates.v9i4.139.
Newer news items:
- Development of the integrated innovation management approach at industrial enterprises in post conflict transformation - 29/04/2021 02:37
- Analysis of the regression model of the enterprise’s financial activity by research on residual error - 29/04/2021 02:36
- Investing in road construction infrastructure projects under public-private partnership in the form of concession - 29/04/2021 02:36
- Criteria for the management of a sustainable and safe positioning of the fleet in the conditions of globalization - 29/04/2021 02:36
- Modeling of the structural shift impact on economic dynamics of Ukraine's development - 29/04/2021 02:36
Older news items:
- Principles for selecting, training and maintaining skills for safe work of personnel for mining industry enterprises - 29/04/2021 02:36
- Assessment of noise impact on coal mine workers including way to/from workplace - 29/04/2021 02:36
- Assessment of potential dangers of installations at Rhourde Nouss station within the framework of The Law 45/DG (Ouargla, Algeria) - 29/04/2021 02:36
- Assessment of the ecological risk of pollution of soil and bottom sediments in the Ukrainian Danube region - 29/04/2021 02:36
- Analysis and forecast of production and utilization of industrial waste in Ukraine - 29/04/2021 02:36
- Environmental water security policy in the EU, Ukraine and other developing countries - 29/04/2021 02:36
- Mathematical model of steel consumption minimization considering the two-stage billets cutting - 29/04/2021 02:36
- The synthesis of strategies for the efficient performance of sophisticated technological complexes based on the cognitive simulation modelling - 29/04/2021 02:36
- Enhancing energetic and economic efficiency of heating coal mines by infrared heaters - 29/04/2021 02:36
- Mathematical modeling of power supply reliability at low voltage quality - 29/04/2021 02:36