A Wireless Intrusion Detection System for 802.11 WPA3 Networks

10/08/2021
by   Neil Dalal, et al.
0

Wi-Fi (802.11) networks have become an essential part of our daily lives; hence, their security is of utmost importance. However, Wi-Fi Protected Access 3 (WPA3), the latest security certification for 802.11 standards, has recently been shown to be vulnerable to several attacks. In this paper, we first describe the attacks on WPA3 networks that have been reported in prior work; additionally, we show that a deauthentication attack and a beacon flood attack, known to be possible on a WPA2 network, are still possible with WPA3. We launch and test all the above (a total of nine) attacks using a testbed that contains an enterprise Access Point (AP) and Intrusion Detection System (IDS). Our experimental results show that the AP is vulnerable to eight out of the nine attacks and the IDS is unable to detect any of them. We propose a design for a signature-based IDS, which incorporates techniques to detect all the above attacks. Also, we implement these techniques on our testbed and verify that our IDS is able to successfully detect all the above attacks. We provide schemes for mitigating the impact of the above attacks once they are detected. We make the code to perform the above attacks as well as that of our IDS publicly available, so that it can be used for future work by the research community at large.

READ FULL TEXT

page 1

page 5

page 8

research
07/06/2022

RIDS : Real-time Intrusion Detection System for WPA3 enabled Enterprise Networks

With the advent of new IEEE 802.11ax (WiFi 6) devices, enabling security...
research
10/06/2022

LGTBIDS: Layer-wise Graph Theory Based Intrusion Detection System in Beyond 5G

The advancement in wireless communication technologies is becoming more ...
research
02/12/2023

Bl0ck: Paralyzing 802.11 connections through Block Ack frames

Despite Wi-Fi is at the eve of its seventh generation, security concerns...
research
06/02/2020

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques – An Experiment

Attacks by Advanced Persistent Threats (APTs) have been shown to be diff...
research
09/03/2021

Understanding and Mitigating Banking Trojans: From Zeus to Emotet

Banking Trojans came a long way in the past decade, and the recent case ...
research
03/25/2021

Near Real-time Learning and Extraction of Attack Models from Intrusion Alerts

Critical and sophisticated cyberattacks often take multitudes of reconna...
research
05/12/2022

Stalloris: RPKI Downgrade Attack

We demonstrate the first downgrade attacks against RPKI. The key design ...

Please sign up or login with your details

Forgot password? Click here to reset