Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Secure Framework for DDoS Attack Detection and Defense in IEEE 802.11 WLAN

1S. Suganthi and 2M. Aramudhan
1Tagore Arts College, Govt. of Puducherry, India
2Department of Information Technology, Perunthalivar Kamarajar Institute of Engineering and Technology, Nedungadu, Karikal, India
Research Journal of Applied Sciences, Engineering and Technology  2015  9:1012-1020
http://dx.doi.org/10.19026/rjaset.10.1868  |  © The Author(s) 2015
Received: December ‎29, ‎2014  |  Accepted: April ‎2, ‎2015  |  Published: July 25, 2015

Abstract

Security is one of the most important problems to be considered in the Wireless Local Area Networks (WLANs). Several security techniques were initiated to solve the available security bugs. In this study, we propose to design a detection and defense mechanism against DDoS attacks. Initially GIDA module is deployed, so that DDoS attack is detected using the game theory decision model in the Access Point (AP). A Master Session Key (MSK) is calculated and a hash function is created for security. For the authentication and association of frames a client puzzle based defense mechanism is used in the AP. Here the client solves a puzzle which has been send by the AP. In the next phase, de-authentication or disassociation of frames of AP or client can be protected by the random bit authentication mechanism. It inserts the current 3-bit unit into the unused bit positions of each frame and then advances the index to point to the next unit. The respective frames can be protected by the hash function and master session key. This framework provides a complete solution for the DDoS attacks targeted at both clients and AP.

Keywords:

Access point, authentication, client puzzle, Denial of Service (DoS) attack, detection, framework, IEEE 802.11, Wireless Local Area Networks (WLAN),


References

  1. Anuradha and A. Singhrova, 2011. A host based intrusion detection system for DDoS attack in WLAN. Proceeding of the 2nd International Conference on Computer and Communication Technology (ICCCT, 2011). Allahabad, pp: 433-438.
  2. Bedi, H.S., S. Roy and S. Shiva, 2011. Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows. Proceeding of the IEEE Symposium on Computational Intelligence in Cyber Security (CICS, 2011), Paris, pp: 129-136.
  3. Gupta, B.B., M. Misra and R.C. Joshi, 2008. An ISP level solution to combat DDoS attacks using combined statistical based approach. Int. J. Inform. Assur. Secur., 3(2): 102-110.
  4. Laishun, Z., Z. Minglei and G. Yuanbo, 2010. A client puzzle based defense mechanism to resist DoS attacks in WLAN. Proceeding of the International Forum on Information Technology and Applications (IFITA, 2010). Kunming, pp: 424-427.
    CrossRef    
  5. Lee, Y.S., H.T. Chien and W.N. Tsai, 2009. Using random bit authentication to defend IEEE 802.11 DoS attacks. J. Inf. Sci. Eng., 25: 1485-1500.
  6. Lina, Z. and Z. Dongzhao, 2009. A router-based technique to detect and defend against low-rate denial of service. Proceeding of the International Symposium on Web Information Systems and Applications (WISA’ 09). Nanchang, P.R. China, May 22-24, pp: 257-260.
  7. Liu, C. and J. Yu, 2007. A solution to WLAN authentication and association DoS attacks. Int. J. Comput. Sci., 34: 1-4.
  8. Moorthy, M. and S. Sathiyabama, 2011. Hybrid fuzzy based intrusion detection system for wireless local area networks. Eur. J. Sci. Res., 53(3).
  9. Salem, M., A. Sarhan and M.A. Bakr, 2007. A DOS attack intrusion detection and inhibition technique for wireless computer networks. ICGST-CNIR, 7(1).
    PMid:17270600    
  10. Singh, R. and T.P. Sharma, 2011. Detecting and reducing the denial of service attacks in WLANs. Proceeding of the World Congress on Information and Communication Technologies (WICT). Mumbai, pp: 968-973.
    CrossRef    
  11. Subramani, R., 2011. Denial of Service attacks and mitigation techniques: Real time implementation with detailed analysis. Retrieved from: http://www.sans.org/reading- room/whitepapers/ detection/denial- service-attacks- mitigation-techniques-real-time- implementation-detailed-analysi-33764.
  12. Wu, Q., S. Shiva, S. Roy, C. Ellis and V. Datla, 2010. On modeling and simulation of game theory-based defense mechanisms against DoS and DDoS attacks. Proceeding of the Spring Simulation Multiconference Article No. 159. Society for Computer Simulation International, San Diego, CA, USA, ISBN: 978-1-4503-0069-8.
    CrossRef    
  13. Zheng, X., C. Chen, C. Tser, H. Manton, M. Matthews and N. Santhapuri, 2005. A dual authentication protocol for IEEE 802.11 wireless LANs. Proceeding of the 2nd IEEE International Symposium on Wireless Communication Systems, pp: 1-5.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved