{"title":"802.11网络中信道交换公告攻击检测研究","authors":"Constantinos Louca, A. Peratikou, S. Stavrou","doi":"10.1109/CSR51186.2021.9527971","DOIUrl":null,"url":null,"abstract":"During Channel Switch Announcement attacks [1][2], a malicious individual sends a forged channel switch announcement to manipulate a device to connect to a rogue access point (AP) or cause a Denial of Service (DoS). In this work we demonstrate with off-the shelf devices, a MiTM 802.11 detection mechanism which can detect if the channel switch announcement is triggered by the legitimate presence of a radar system, or by an attacker aiming to perform a Wi-Fi Evil Twin attack. The attack could be detected either operating in Dynamic Frequency Selection (DFS) or non DFS channels and the proposed detection mechanism can be integrated into an 802.11 intrusion detection system.","PeriodicalId":253300,"journal":{"name":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"On the detection of Channel Switch Announcement Attack in 802.11 networks\",\"authors\":\"Constantinos Louca, A. Peratikou, S. Stavrou\",\"doi\":\"10.1109/CSR51186.2021.9527971\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"During Channel Switch Announcement attacks [1][2], a malicious individual sends a forged channel switch announcement to manipulate a device to connect to a rogue access point (AP) or cause a Denial of Service (DoS). In this work we demonstrate with off-the shelf devices, a MiTM 802.11 detection mechanism which can detect if the channel switch announcement is triggered by the legitimate presence of a radar system, or by an attacker aiming to perform a Wi-Fi Evil Twin attack. The attack could be detected either operating in Dynamic Frequency Selection (DFS) or non DFS channels and the proposed detection mechanism can be integrated into an 802.11 intrusion detection system.\",\"PeriodicalId\":253300,\"journal\":{\"name\":\"2021 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"volume\":\"48 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-07-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Conference on Cyber Security and Resilience (CSR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSR51186.2021.9527971\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR51186.2021.9527971","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On the detection of Channel Switch Announcement Attack in 802.11 networks
During Channel Switch Announcement attacks [1][2], a malicious individual sends a forged channel switch announcement to manipulate a device to connect to a rogue access point (AP) or cause a Denial of Service (DoS). In this work we demonstrate with off-the shelf devices, a MiTM 802.11 detection mechanism which can detect if the channel switch announcement is triggered by the legitimate presence of a radar system, or by an attacker aiming to perform a Wi-Fi Evil Twin attack. The attack could be detected either operating in Dynamic Frequency Selection (DFS) or non DFS channels and the proposed detection mechanism can be integrated into an 802.11 intrusion detection system.