Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure
Wireless networks are very common today because of their flexibi lity, portability and ease of installation. Users working through wireless connections have to be aware o f the environments due to the vulnerability of the infrastructure and various types of attacks that can be made by the intru...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Published: |
Asian Research Publishing Network
2015
|
Subjects: | |
Online Access: | http://eprints.utm.my/id/eprint/58252/ http://www.jatit.org/volumes/Vol71No3/12Vol71No3.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Malaysia |
id |
my.utm.58252 |
---|---|
record_format |
eprints |
spelling |
my.utm.582522021-08-02T14:16:37Z http://eprints.utm.my/id/eprint/58252/ Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure Abdallah, Elhigazi Abdallah Abd. Razak, Shukor Yahaya, Coulibaly QA75 Electronic computers. Computer science Wireless networks are very common today because of their flexibi lity, portability and ease of installation. Users working through wireless connections have to be aware o f the environments due to the vulnerability of the infrastructure and various types of attacks that can be made by the intruders to compromise valuable and critical data. Denial of Service attack (DOS) is t he most significant attack in the wireless 802.11 WLANs. Wired Equivalent Privacy (WEP) and Wi-Fi Protecte d Access (WPA) security protocols are used to protect wireless network infrastructure against intrude rs. Despite remarkable advances, both WEP and WPA protocols still suffer from DOS attack because their management and control frame is not encrypted. Integrated Central Manager (ICM) algorithm was proposed to de tect and prevent DOS attacks. However, in ICM, time needed to detect DOS attack is too long. The alg orithm maintains five tables for observing activities in the network. When a client requests for a conne ction, all the five tables needs to be processed; this is increases both network overhead and latency. In This pa per, we proposed an algorithm called Enhanced Integrated Central Manager (EICM) to enhance DOS dete ction and prevention time. The algorithm was evaluated by gathering MAC addresses using Wire shark software and MATLAB was used for simulation. The obtained results demonstrate that that the proposed algorithm outperforms its predecessor in terms of DOS detection and prevention time by decr easing network overhead. Asian Research Publishing Network 2015 Article PeerReviewed Abdallah, Elhigazi Abdallah and Abd. Razak, Shukor and Yahaya, Coulibaly (2015) Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure. Journal Of Theoretical And Applied Information Technology, 71 (3). pp. 417-423. ISSN 1992-8645 http://www.jatit.org/volumes/Vol71No3/12Vol71No3.pdf |
institution |
Universiti Teknologi Malaysia |
building |
UTM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Malaysia |
content_source |
UTM Institutional Repository |
url_provider |
http://eprints.utm.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Abdallah, Elhigazi Abdallah Abd. Razak, Shukor Yahaya, Coulibaly Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure |
description |
Wireless networks are very common today because of their flexibi lity, portability and ease of installation. Users working through wireless connections have to be aware o f the environments due to the vulnerability of the infrastructure and various types of attacks that can be made by the intruders to compromise valuable and critical data. Denial of Service attack (DOS) is t he most significant attack in the wireless 802.11 WLANs. Wired Equivalent Privacy (WEP) and Wi-Fi Protecte d Access (WPA) security protocols are used to protect wireless network infrastructure against intrude rs. Despite remarkable advances, both WEP and WPA protocols still suffer from DOS attack because their management and control frame is not encrypted. Integrated Central Manager (ICM) algorithm was proposed to de tect and prevent DOS attacks. However, in ICM, time needed to detect DOS attack is too long. The alg orithm maintains five tables for observing activities in the network. When a client requests for a conne ction, all the five tables needs to be processed; this is increases both network overhead and latency. In This pa per, we proposed an algorithm called Enhanced Integrated Central Manager (EICM) to enhance DOS dete ction and prevention time. The algorithm was evaluated by gathering MAC addresses using Wire shark software and MATLAB was used for simulation. The obtained results demonstrate that that the proposed algorithm outperforms its predecessor in terms of DOS detection and prevention time by decr easing network overhead. |
format |
Article |
author |
Abdallah, Elhigazi Abdallah Abd. Razak, Shukor Yahaya, Coulibaly |
author_facet |
Abdallah, Elhigazi Abdallah Abd. Razak, Shukor Yahaya, Coulibaly |
author_sort |
Abdallah, Elhigazi Abdallah |
title |
Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure |
title_short |
Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure |
title_full |
Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure |
title_fullStr |
Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure |
title_full_unstemmed |
Detection and prevention of denial of service attacks (DOS) in WLANs infrastructure |
title_sort |
detection and prevention of denial of service attacks (dos) in wlans infrastructure |
publisher |
Asian Research Publishing Network |
publishDate |
2015 |
url |
http://eprints.utm.my/id/eprint/58252/ http://www.jatit.org/volumes/Vol71No3/12Vol71No3.pdf |
_version_ |
1707765840037806080 |