2018
DOI: 10.1007/978-3-319-91008-6_47
|View full text |Cite
|
Sign up to set email alerts
|

Detection of MAC Spoofing Attacks in IEEE 802.11 Networks Using Signal Strength from Attackers’ Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 7 publications
0
2
0
1
Order By: Relevance
“…In contrast to [11], where a method of detecting intrusions based on the deviation from the reference value of the signal power is proposed, in this work the detection results are more accurate, and the number of false positives will be smaller. This becomes possible thanks to the implementation of a machine learning algorithm that can detect hidden dependences in data sets, as well as the proposed approach of retraining or retraining the model (Fig.…”
Section: Discussion Of Results and Directions For Further Researchmentioning
confidence: 98%
See 1 more Smart Citation
“…In contrast to [11], where a method of detecting intrusions based on the deviation from the reference value of the signal power is proposed, in this work the detection results are more accurate, and the number of false positives will be smaller. This becomes possible thanks to the implementation of a machine learning algorithm that can detect hidden dependences in data sets, as well as the proposed approach of retraining or retraining the model (Fig.…”
Section: Discussion Of Results and Directions For Further Researchmentioning
confidence: 98%
“…Some attacks have to be identified by methods that are not at all obvious, such as, for example, by collecting data on the signal strength from an access point and comparing it with a reference value. In [11], a method for identifying MAC address substitution in Wi-Fi networks is proposed by detecting a significant deviation in signal strength from the reference signal. However, objectively, the process of such a comparison is not reliable enough since the signal strength is affected by many physical factors, which can lead to a large number of false positives.…”
Section: Literature Review and Problem Statementmentioning
confidence: 99%
“…Lackner et al argumentam que soluções baseadas em características de sinal necessitam de hardware específico. Este argumento também é mencionado por Banakh et al [10]. Hwang et al realizam um estudo das vulnerabilidade de redes 802.1X e propõem um framework para esta análise [11].…”
Section: Trabalhos Relacionadosunclassified