Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks
Gill, Rupinder S., Smith, Jason, Looi, Mark H., & Clark, Andrew J. (2005) Passive techniques for detecting session hijacking attacks in IEEE 802.11 wireless networks. In Clark, Andrew J., Kerr, Kathryn, & Mohay, George M. (Eds.) AusCERT Asia Pacific Information Technology Security Conference: Refereed R&D Stream, 22-26 May 2005, Gold Coast, Australia.
Wireless networking technologies based on IEEE 802.11 series of standards are evolving to address many of the security issues that plagued earlier wireless standards. Unfortunately the current standards fail to authenticate management frames and network card addresses, and rely on loosely coupled state machines. This results in serious vulnerabilities that may lead to denial of service, session hijacking, and address masquerading attacks. Until the standards are updated to redress these problems, wireless network deployments must be supported by wireless intrusion detection systems–a challenging and under researched area. This paper presents techniques for improving detection of session hijacking attacks that are passive, computationally inexpensive, reliable, and have minimal impact on network performance. Experimental results are presented to give conﬁdence in the utility of the techniques.
Impact and interest:
Citation countsare sourced monthly fromand citation databases.
These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.
Citations counts from theindexing service can be viewed at the linked Google Scholar™ search.
Full-text downloadsdisplays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.
|Item Type:||Conference Paper|
|Keywords:||intrusion detection, network monitoring, 802.11 wireless network|
|Subjects:||Australian and New Zealand Standard Research Classification > INFORMATION AND COMPUTING SCIENCES (080000) > COMPUTER SOFTWARE (080300) > Computer System Security (080303)|
|Divisions:||Past > QUT Faculties & Divisions > Faculty of Science and Technology|
Past > Institutes > Information Security Institute
|Copyright Owner:||Copyright 2005 Please consult authors|
|Deposited On:||15 Jun 2009 09:29|
|Last Modified:||29 Feb 2012 23:14|
Repository Staff Only: item control page