Intelligent Detection of MAC Spoofing Attack in 802.11 Network

Book chapter


Benzaid, Chafika, Boulgheraif, Abderrahman, Dahmane, Fatma Zohra, Al-Nemrat, A. and Zeraoulia, Khaled 2016. Intelligent Detection of MAC Spoofing Attack in 802.11 Network. in: Proceedings of the 17th International Conference on Distributed Computing and Networking ACM.
AuthorsBenzaid, Chafika, Boulgheraif, Abderrahman, Dahmane, Fatma Zohra, Al-Nemrat, A. and Zeraoulia, Khaled
Abstract

In 802.11, all devices are uniquely identified by a Media
Access Control (MAC) address. However, legitimate MAC
addresses can be easily spoofed to launch various forms of
attacks, such as Denial of Service attacks. Impersonating
the MAC address of a legitimate user poses a big challenge
for cyber crime investigators. Indeed, MAC spoofing makes
the task of identifying the source of the attack very diffi-
cult. Sequence number analysis is a common technique used
to detect MAC spoofing attack. Existing solutions relying
on sequence number analysis, adopt a threshold-based approach
where the gap between consecutive sequence numbers
is compared to a threshold to decide the presence of
a MAC spoofing attack. Nevertheless, threshold-based approach
may lead to a high rate of false alerts due to lost or
duplicated frames.
To overcome the limitations of threshold-based approach,
this paper proposes a detection method that relies on a machine
learning approach, namely Artificial Neural Network
(ANN). ANNs provide the potential to identify and classify
network behavior from limited, noisy, incomplete and nonlinear
data sources. The experimentation results showed
the effectiveness of the proposed detection technique. Moreover,
we proposed a user-friendly graphical representation
of information to support the interpretation of quantitative
results.

Book titleProceedings of the 17th International Conference on Distributed Computing and Networking
Year2016
PublisherACM
Publication dates
Print01 Apr 2016
Publication process dates
Deposited27 Feb 2017
Event17th International Conference on Distributed Computing and Networking
ISBN978-1-4503-4032-8
Digital Object Identifier (DOI)doi:10.1145/2833312.2850446
Web address (URL)http://doi.org/10.1145/2833312.2850446
Additional information

© 2016 ACM. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in Benzaïd, C. et al., 2016. Intelligent detection of MAC spoofing attack in 802.11 network. Proceedings of the 17th International Conference on Distributed Computing and Networking - ICDCN ’16. Available at: http://dx.doi.org/10.1145/2833312.2850446.

Accepted author manuscript
License
CC BY-NC
Permalink -

https://repository.uel.ac.uk/item/85194

  • 6
    total views
  • 44
    total downloads
  • 1
    views this month
  • 9
    downloads this month

Related outputs

Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data
Ebenuwa, S., Sharif, M., Alazab, Mamoun and Al-Nemrat, A. 2019. Variance Ranking Attributes Selection Techniques for Binary Classification Problem in Imbalance Data. IEEE Access. 7, pp. 24649-24666.
Deep Learning Approach for Intelligent Intrusion Detection System
Vinayakumar, R., Alazab, Mamoun, Soman, K. P., Poornachandran, Prabaharan, Al-Nemrat, A. and Venkatraman, Sitalakshmi 2019. Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access. 7, pp. 41525-41550.
Content Discovery Advertisements: An Explorative Analysis
Jadhav Balaji, R., Baravalle, Andres, Al-Nemrat, A. and Falcarin, P. 2017. Content Discovery Advertisements: An Explorative Analysis. in: Jahankhani, Hamid, Carlile, Alex, Emmett, David, Hosseinian-Far, Amin, Brown, Guy, Sexton, Graham and Jamal, Arshad (ed.) Global Security, Safety and Sustainability - The Security Challenges of the Connected World Springer Verlag.
Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment
Tawil, Abdel-Rahman H., Taweel, Adel, Naeem, U., Montebello, Matthew, Bashroush, R. and Al-Nemrat, A. 2014. Integration operators for generating RDF/OWL-based user defined mediator views in a grid environment. Journal of Intelligent Information Systems. 43 (1), pp. 1-32.
Security countermeasures in the cyber-world
Bendovschi, Andreea and Al-Nemrat, A. 2016. Security countermeasures in the cyber-world. in: 2016 IEEE International Conference on Cybercrime and Computer Forensic (ICCCF) IEEE. pp. 1-7
Measuring sustainability for an effective Information System audit from public organization perspective
Lope Abdul Rahman, Alifah Aida, Islam, S. and Al-Nemrat, A. 2015. Measuring sustainability for an effective Information System audit from public organization perspective. in: Research Challenges in Information Science (RCIS), 2015 IEEE 9th International Conference on IEEE. pp. 42-51
ARP cache poisoning mitigation and forensics investigation
Mangut, Heman Awang, Al-Nemrat, A., Benzaid, Chafika and Tawil, Abdel-Rahman H. 2015. ARP cache poisoning mitigation and forensics investigation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1392-1397
Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation
Al-Nemrat, A. and Benzaid, Chafika 2015. Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime Victimisation. in: 2015 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1380-1385
A Scalable Malware Classification based on Integrated Static and Dynamic Features
Bounouh, Tewfik, Brahimi, Zakaria, Al-Nemrat, A. and Benzaid, Chafika 2017. A Scalable Malware Classification based on Integrated Static and Dynamic Features. in: Jahankhani, Hamid, Carlile, Alex, Emm, David, Hosseinian-Far, Amin, Brown, Guy, Sexton, Graham and Jamal, Arshad (ed.) Global Security, Safety and Sustainability - The Security Challenges of the Connected World Springer International Publishing.
Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities
Sarantinos, Nikolaos, Benzaid, Chafika, Arabiat, Omar and Al-Nemrat, A. 2017. Forensic Malware Analysis: The Value of Fuzzy Hashing Algorithms in Identifying Similarities. in: 2016 IEEE Trustcom/BigDataSE/ISPA IEEE. pp. 1782-1787
Fast authentication in wireless sensor networks
Benzaid, Chafika, Lounis, Karim, Al-Nemrat, A., Badache, Nadjib and Alazab, Mamoun 2014. Fast authentication in wireless sensor networks. Future Generation Computer Systems. 55, pp. 362-375.
An Analysis of Honeypot Programs and the Attack Data Collected
Moore, Chris and Al-Nemrat, A. 2015. An Analysis of Honeypot Programs and the Attack Data Collected. in: Jahankhani, Hamid, Carlile, Alex, Akhgar, Babak, Taal, Amie, Hessami, Ali G. and Hosseinian-Far, Amin (ed.) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security Springer International Publishing.