An integrated scheme for intrusion detection in WLAN

Phil Kim Dong, Joo Koh Seok, Wook Kim Sang

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Wireless Local Area Network (WLAN) is susceptible to security provisioning in spite of the solutions such as the Wired Equivalent Protocol (WEP) or IEEE 802.1x. This paper proposes an integrated scheme for intrusion detection in WLAN systems. The proposed scheme operates with one or more Gathering Agents (GAs) and a Master Server (MS). Each GA is used to get security information by collecting the frame packets in WLAN, whereas the MS is purposed to detect and prevent the various attacks by analyzing the packets in the WLAN systems. A detection engine contained in the MS employs OUI list matching for detection of MAC spoofing attacks, sequence number analysis for man-in-the-middle attacks, and Finite State Machine (FSM) analysis for Denial-of-Service (DoS) attacks. By experiments, it is shown that the proposed scheme could effectively detect and prevent the various attacks that could possibly be done in the WLAN systems.

Original languageEnglish
Title of host publicationInformation Networking
Subtitle of host publicationAdvances in Data Communications and Wireless Networks - International Conference, ICOIN 2006. Revised Selected Papers
PublisherSpringer Verlag
Pages723-732
Number of pages10
ISBN (Print)3540485635, 9783540485636
StatePublished - 2006
EventInternational Conference on Information Networking, ICOIN 2006 - Sendai, Japan
Duration: 16 Jan 200619 Jan 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3961 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceInternational Conference on Information Networking, ICOIN 2006
Country/TerritoryJapan
CitySendai
Period16/01/0619/01/06

Fingerprint

Dive into the research topics of 'An integrated scheme for intrusion detection in WLAN'. Together they form a unique fingerprint.

Cite this