Abstract
This work summarizes various attacks performed on Wi-Fi networks and their impacts of it with mitigations. Attacks are classified based on WPA2 and WPA3. Different detection methods, including signature and anomaly-based, are used to prevent Wi-Fi attacks. Attack and detection methods are examined with a Wi-Fi Intrusion Detection system for various possible scenarios. A Wi-Fi auditing framework that can perform all Wi-Fi network-based attacks for testing the network and its features are investigated. Finally, future trends in Wi-Fi Intrusion Detection systems are studied and discussed.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Abbreviations
- Wi-Fi:
-
Wireless Fidelity
- AP:
-
Access Point
- IDS:
-
Intrusion Detection System
- IPS:
-
Intrusion Prevention System
- WIDS:
-
Wi-Fi Intrusion Detection System
- SDN:
-
Software Define Network
- SAE:
-
Simultaneous Authentication of Equals
- WPA:
-
Wireless Protected Access
- TCP:
-
Transmission Control Protocol
- IP:
-
Internet Protocol
- MAC:
-
Medium access control
- WLAN:
-
Wireless Local Area Network
- SYN:
-
TCP Synchronization
- ACK:
-
Acknowledgement
- ARP:
-
Address Resolution Protocol
- SSID:
-
Service Set Identifier
- DOS:
-
Denial of Service
- DDOS:
-
Distributed Denial of Service
- IOT:
-
Internet of Things
- EAPOL:
-
Extensible Authentication Protocol over LAN
References
https://datatracker.ietf.org/doc/html/rfc7494, last accessed 18 June 2023
https://datatracker.ietf.org/doc/rfc5416/, last accessed 18 June 2023
MartÃnez A et al (2008) Beacon frame spoofing attack detection in IEEE 802.11 networks. In: 2008 third international conference on availability, reliability, and security. IEEE
Thomas AM et al (2021) Evaluation of wireless AP security and best practices for mitigation. In: 2021 5th international conference on electrical, electronics, communication, computer technologies and optimization techniques (ICEECCOT). IEEE
Al-Nuaimi MAS, Ibrahim AA (2023) Analyzing and detecting the de-authentication attack by creating an automated scanner using Scapy
Sudar C, Arjun SK, Deepthi LR (2017) Time-based one-time password for Wi-Fi authentication and security. In: 2017 international conference on advances in computing, communications and informatics (ICACCI). IEEE
Shrivastava P, Jamal MS, Kataoka K (2020) EvilScout: detection and mitigation of evil twin attack in SDN enabled WiFi. IEEE Trans Netw Service Manag 17(1):89–102
Vanhoef M et al (2023) Testing and improving the correctness of Wi-Fi frame injection. In: Proceedings of the 16th ACM conference on security and privacy in wireless and mobile networks. ACM
Vanhoef M (2021) Fragment and forge: breaking Wi-Fi through frame aggregation and fragmentation. In: 30th USENIX security symposium (USENIX security 21), USENIX Association, pp 161–178. https://www.usenix.org/conference/usenixsecurity21/presentation/vanhoef
Vanhoef M, Piessens F (2017) Key reinstallation attacks: forcing nonce reuse in WPA2. In: Proceedings of the 24th ACM conference on computer and communications security (CCS). ACM
Vanhoef M, Ronen E (2020) Dragonblood: analyzing the dragonfly handshake of WPA3 and EAP-pwd. In: IEEE symposium on security and privacy (SP). IEEE.
Feng X et al (2022) Man-in-the-middle attacks without rogue AP: when WPAs meet ICMP redirects. In: 2023 IEEE symposium on security and privacy (SP). IEEE Computer Society
Fung CJ, Boutaba R (2013) Design and management of collaborative intrusion detection networks. In: 2013 IFIP/IEEE international symposium on integrated network management (IM 2013). IEEE
Pleskonjic D (2003) Wireless intrusion detection systems (WIDS). In: 19th annual computer security applications conference
Baharudin N et al (2015) Wireless intruder detection system (WIDS) in detecting de-authentication and disassociation attacks in IEEE 802.11. In: 2015 5th international conference on IT convergence and security (ICITCS). IEEE
Satam P, Hariri S (2021) WIDS: an anomaly based intrusion detection system for Wi-Fi (IEEE 802.11) protocol. IEEE Trans Netw Serv Manag 18(1):1077–1091. https://doi.org/10.1109/TNSM.2020.3036138
Satam P, Hariri S (2020) WIDS: an anomaly based intrusion detection system for Wi-Fi (IEEE 802.11) protocol. IEEE Trans Netw Serv Manag 18(1):1077–1091
Abilesh Raja G et al (2022) Detection of Log4j attack in SDN environment. In: International conference on information and communication technology for competitive strategies. Springer Nature Singapore, Singapore
Abhiram D, Harish R, Praveen K (2022) Zero-trust security implementation using SDP over VPN. In: Inventive communication and computational technologies: proceedings of ICICCT 2021. Springer, Singapore
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Harish, R., Praveen, K. (2024). Review on Wi-Fi Attacks and Detection Methods. In: Gountia, D., Dalei, D.K., Mishra, S. (eds) Information Technology Security. Springer Tracts in Electrical and Electronics Engineering. Springer, Singapore. https://doi.org/10.1007/978-981-97-0407-1_5
Download citation
DOI: https://doi.org/10.1007/978-981-97-0407-1_5
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-97-0406-4
Online ISBN: 978-981-97-0407-1
eBook Packages: Computer ScienceComputer Science (R0)