Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Georgia State University

Computer Science Theses

Theses/Dissertations

802.11 MAC protocol

Articles 1 - 1 of 1

Full-Text Articles in Physical Sciences and Mathematics

802.11 Fingerprinting To Detect Wireless Stealth Attacks, Aravind Venkataraman Nov 2008

802.11 Fingerprinting To Detect Wireless Stealth Attacks, Aravind Venkataraman

Computer Science Theses

We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as a solution for three critical stealth attacks in wireless networks. We focus on extracting traces of the 802.11 medium access control (MAC) protocol from the temporal arrival patterns of incoming traffic streams as seen on the wired side, to identify attacker behavior. Attacks addressed include unauthorized access points, selfish behavior at the MAC layer and MAC layer covert timing channels. We employ the Bayesian binning technique as a means of classifying between delay distributions. The scheme requires no change to the 802.11 nodes or …