Open Access   Article Go Back

A Security Mechanism to Mitigate DDoS Attack on Wireless Local Area Network (WLAN) using MAC with SSID

Feven Teferi1 , J. Sebastian Nixon2

Section:Research Paper, Product Type: Journal Paper
Volume-7 , Issue-4 , Page no. 864-869, Apr-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i4.864869

Online published on Apr 30, 2019

Copyright © Feven Teferi, J. Sebastian Nixon . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Feven Teferi, J. Sebastian Nixon , “A Security Mechanism to Mitigate DDoS Attack on Wireless Local Area Network (WLAN) using MAC with SSID,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.4, pp.864-869, 2019.

MLA Style Citation: Feven Teferi, J. Sebastian Nixon "A Security Mechanism to Mitigate DDoS Attack on Wireless Local Area Network (WLAN) using MAC with SSID." International Journal of Computer Sciences and Engineering 7.4 (2019): 864-869.

APA Style Citation: Feven Teferi, J. Sebastian Nixon , (2019). A Security Mechanism to Mitigate DDoS Attack on Wireless Local Area Network (WLAN) using MAC with SSID. International Journal of Computer Sciences and Engineering, 7(4), 864-869.

BibTex Style Citation:
@article{Teferi_2019,
author = {Feven Teferi, J. Sebastian Nixon },
title = {A Security Mechanism to Mitigate DDoS Attack on Wireless Local Area Network (WLAN) using MAC with SSID},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2019},
volume = {7},
Issue = {4},
month = {4},
year = {2019},
issn = {2347-2693},
pages = {864-869},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4132},
doi = {https://doi.org/10.26438/ijcse/v7i4.864869}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i4.864869}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4132
TI - A Security Mechanism to Mitigate DDoS Attack on Wireless Local Area Network (WLAN) using MAC with SSID
T2 - International Journal of Computer Sciences and Engineering
AU - Feven Teferi, J. Sebastian Nixon
PY - 2019
DA - 2019/04/30
PB - IJCSE, Indore, INDIA
SP - 864-869
IS - 4
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
422 254 downloads 105 downloads
  
  
           

Abstract

In Wireless Local Area Networks (WLANs), the clients can speak each other by using the Access Point [AP] easily. Since it uses wireless medium for words there are lots of security challenges exists. WLANs provide speed equal to wired LANs and allow wireless devices to be mobile. Even though it is very useful, there are lots of security attacks specially it is vulnerable to distributed Denial of Service (DDOS) attacks, this leads to unavailability of a service or resource by how of either crashes a service or by flooding the network with unwanted traffic to slowing down the delivery of service to the client. A distributed denial of service attack is the one in which the attacker attacks the victim by many sources. In this paper, we deployed WLANs in infrastructure mode as the extension of wired local area network. It was done in experimental approach to detect and prevent DDoS attack by using Intrusion Detection and Prevention System (IDPS) and Machine Authentication Code(MAC) with Service Set Identifier (SSID) was studied and simulated utilizing OPNET 17.5 simulator. The IDPS on the server distinguishes legitimate users from the illegal user by the registered MAC. If the client is illegal, then it withdraws the user from the connection. And the access point will not show SSID. The SSID should be hidden by the Admin and will be given to only the registered users with MAC Address. Our Proposed solution can enhance the security of DDoS and can secure the WLAN from the Attackers.

Key-Words / Index Term

Distributed Denial of Service (DDOS), Intrusion Detection and Prevention System( IDPS), OPNET ,Service Set Identifier (SSID), Machine Authentication Code(MAC) and Wireless Local Area Networks (WLANs).

References

[1] D. Tepsic, M. Veinović, and D. Uljarević, “Performance evaluation of WPA2 security protocol in modern wireless networks,” in the Proceedings of the2014 1st International Science Conference on Science, Sintaza, pp. 600–605, 2014.
[2] C. Yang, J. Ma, and X. Dong, “A new evaluation model for security protocols,” Journal of Communication, vol. 6, no. 6, pp. 485–494, 2011.
[3] D. Dhiman, “WLAN Security Issues and Solutions,” IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), vol. 16, no. 1, pp. 67–75, 2014.
[4]. M. D. G. Waliullah, “Wireless LAN Security Threats & Vulnerabilities,” (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 5, No. 1, 2014.
[5] Y. Xiao and X. J. Du, “Security mechanisms , attacks and security enhancements for the IEEE 802 . 11 WLANs Chaitanya,Bandela,Edilbert,Kamal Dass”,International Journal of Wireless and Mobile Computing, vol. 1, pp. 276–288, 2006.
[6] A. B. M. M. and M. S. R. Md Waliullah, “An Experimental Study Analysis of Security Attacks at IEEE 802 . 11 Wireless Local Area Network”, International Journal of Future Generation Communication and Networking Vol. 8, No. 1 (2015), pp. 9-18
[7] “Investigation Of The Impact Of Ddos Attack On Network”, Journal University of Zakho, vol. 3, no. 2, pp. 275–280, 2015.
[8] W. Alosami, M. Alshamrani, and K. Al-Begain, “Simulation-Based Study of Distributed Denial of Service Attacks Counteract in the Cloud Services, WSEAS Transactions on Co Simulation-Based Study of Distributed Denial of Service Atta”,The University of Nattingham,ePrints,vol. 4, no. 7, pp. 19–30, 2016.
[9] Hrishikesh Arun Deshpande, “HoneyMesh: Preventing Distributed Denial of Service Attacks using Virtualized Honeypots”, International Journal of Engineering Research & Technology (IJERT),Vol. 4 ,Issue 08, pp. 263–267, 2015.
[10] Sunil Kumar, Kamalesh Dutta, “Securing Mobile Ad Hoc Networks: Challenges and Solutions”, International Journal of Handheld Computing Research, Vol. 7, Issue 1, PP. 26-76,January 2016
[11] Manmohan Dagar, Rashmi Popli “Honeypots: Virtual Network Intrusion Monitoring System”, International Journal of Science Research in Network Security and Communication(IJSRNSC), Vol.6,Issue 2, April 2018..
[12] A.Prathap and R.Sailaja, “Detection and Prevention of Denial of Service Attacks Using Distributed Denial-of-Service Detection Mechanism”, International Journal of Computer Science and Information Technologies (IJCSIT), vol. 3, no. 6, pp. 5434–5438, 2012.
[13] Usha G, Goudar R H., “ICMPv6 : A Mechanism to Detect and Prevent DDoS Attack”, International Journal of Science Technology & Engineering (IJSTE), Vol. 2 ,Issue 12, pp. 420–423, 2016.
[14] S. Behal and K. Kumar, “Trends in Validation of DDoS Research,” Procedia Comput. Sci., vol. 85, no. Cms, pp. 7–15, 2016.
[15] R. Niranchana, N. Gayathri Devi, H. Santhi, and P. Gayathri, “Securing internet by eliminating DDOS attacks,” IOP Comference Series. Materials Science and Engineering, vol. 263, no. 4, 2017.