Performance analysis of DoS attack at MAC layer in WLAN / Muhammad Naufal Abdul Rahim and Ahmad Yusri Dak

Abdul Rahim, Muhammad Naufal and Dak, Ahmad Yusri (2023) Performance analysis of DoS attack at MAC layer in WLAN / Muhammad Naufal Abdul Rahim and Ahmad Yusri Dak. In: Research Exhibition in Mathematics and Computer Sciences (REMACS 5.0). College of Computing, Informatics and Media, UiTM Perlis, pp. 263-264. ISBN 978-629-97934-0-3

Abstract

Wireless LAN are based on the most widely used computer networks, the IEEE 802.11 standards – commonly known as Wi-Fi. The MAC layer of IEEE 802.11 provides a protocol that specifies the set of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network computer communication. In IEEE 802.11 protocol, many vulnerabilities are present at the MAC layer which give rise to a lot of Denial of Service (DoS) attacks. Furthermore, 802.11 standards use frames for communication between NICs and APs and for controlling and managing wireless links. The three main types of frames are data, control and management. Data frames are authenticated and encrypted but control and management frames are neither authenticated nor encrypted. So, they can be easily spoofed by the attacker to perform denial of service attacks. The goal of this article is to study various types of DoS attack at the MAC layer in WLAN and to evaluate the performance of the network using throughput and packet loss ratio (PLR). In addition, this project will be conducted in a real testbed environment with 3 different scenarios, each with a different type of layer 2 DoS attack. Finally, the result shows that deauthentication attack and ARP spoofing attack to be very successful as it manages to cripple the victim's connection to the AP or the internet. Both attacks result in a steep decline of packet loss and network throughput during the attack. On the other hand, the authentication flooding attack seems to show no result on the packet loss ratio and network throughput whatsoever. In conclusion, de-authentication and ARP spoofing attacks are very much capable of disrupting any WLAN network connection.

Metadata

Item Type: Book Section
Creators:
Creators
Email / ID Num.
Abdul Rahim, Muhammad Naufal
UNSPECIFIED
Dak, Ahmad Yusri
UNSPECIFIED
Subjects: T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Computer networks. General works. Traffic monitoring > Intrusion detection systems (Computer security). Computer network security. Hackers
Divisions: Universiti Teknologi MARA, Perlis > Arau Campus > Faculty of Computer and Mathematical Sciences
Page Range: pp. 263-264
Keywords: MAC Layer, WLAN, DoS, Performance Analysis
Date: 2023
URI: https://ir.uitm.edu.my/id/eprint/100813
Edit Item
Edit Item

Download

[thumbnail of 100813.pdf] Text
100813.pdf

Download (1MB)

ID Number

100813

Indexing

Statistic

Statistic details