Profiling and mitigating brute force attack in home wireless LAN
Brute force is another dangerous type of cyber attack meant for cracking wireless LAN WPA/WPA2 password. It preludes with several other attacks' attempts namely DeAuthentication, packet sniffing (airodump) and finally aircrack. The successful of a brute force attack is so determined by these at...
Published in: | 2014 International Conference on Computational Science and Technology, ICCST 2014 |
---|---|
Main Author: | |
Format: | Conference paper |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2014
|
Online Access: | https://www.scopus.com/inward/record.uri?eid=2-s2.0-84988268753&doi=10.1109%2fICCST.2014.7045190&partnerID=40&md5=8759f7476e9d589e743bbd87401e9622 |
id |
2-s2.0-84988268753 |
---|---|
spelling |
2-s2.0-84988268753 Hafiz M.Y.M.; Mohd Ali F.H. Profiling and mitigating brute force attack in home wireless LAN 2014 2014 International Conference on Computational Science and Technology, ICCST 2014 10.1109/ICCST.2014.7045190 https://www.scopus.com/inward/record.uri?eid=2-s2.0-84988268753&doi=10.1109%2fICCST.2014.7045190&partnerID=40&md5=8759f7476e9d589e743bbd87401e9622 Brute force is another dangerous type of cyber attack meant for cracking wireless LAN WPA/WPA2 password. It preludes with several other attacks' attempts namely DeAuthentication, packet sniffing (airodump) and finally aircrack. The successful of a brute force attack is so determined by these attempts. This study will analyze DeAuthentication attack traffic pattern, sniffing and aircrack activity and propose two mitigation techniques which are 1) increase beacon time interval 2) mapping user's MAC address. Experimental result shows that deployment of mitigation techniques is efficient to stop these activities and mitigate the brute force attack. © 2014 IEEE. Institute of Electrical and Electronics Engineers Inc. English Conference paper |
author |
Hafiz M.Y.M.; Mohd Ali F.H. |
spellingShingle |
Hafiz M.Y.M.; Mohd Ali F.H. Profiling and mitigating brute force attack in home wireless LAN |
author_facet |
Hafiz M.Y.M.; Mohd Ali F.H. |
author_sort |
Hafiz M.Y.M.; Mohd Ali F.H. |
title |
Profiling and mitigating brute force attack in home wireless LAN |
title_short |
Profiling and mitigating brute force attack in home wireless LAN |
title_full |
Profiling and mitigating brute force attack in home wireless LAN |
title_fullStr |
Profiling and mitigating brute force attack in home wireless LAN |
title_full_unstemmed |
Profiling and mitigating brute force attack in home wireless LAN |
title_sort |
Profiling and mitigating brute force attack in home wireless LAN |
publishDate |
2014 |
container_title |
2014 International Conference on Computational Science and Technology, ICCST 2014 |
container_volume |
|
container_issue |
|
doi_str_mv |
10.1109/ICCST.2014.7045190 |
url |
https://www.scopus.com/inward/record.uri?eid=2-s2.0-84988268753&doi=10.1109%2fICCST.2014.7045190&partnerID=40&md5=8759f7476e9d589e743bbd87401e9622 |
description |
Brute force is another dangerous type of cyber attack meant for cracking wireless LAN WPA/WPA2 password. It preludes with several other attacks' attempts namely DeAuthentication, packet sniffing (airodump) and finally aircrack. The successful of a brute force attack is so determined by these attempts. This study will analyze DeAuthentication attack traffic pattern, sniffing and aircrack activity and propose two mitigation techniques which are 1) increase beacon time interval 2) mapping user's MAC address. Experimental result shows that deployment of mitigation techniques is efficient to stop these activities and mitigate the brute force attack. © 2014 IEEE. |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
issn |
|
language |
English |
format |
Conference paper |
accesstype |
|
record_format |
scopus |
collection |
Scopus |
_version_ |
1809677912159289344 |