Lightweight log-monitoring-based mitigation tool against WLAN attacks

Ramzi Saifan, Mohammad Radi, Hamsa Al-Dabbagh, Badr Mansour


Wireless network attacks are some of the most common network security threats dealt with daily. Their ease of execution and effectiveness make them commonplace within most public networks. The goal of this paper is to develop a tool which provides defenses against these attacks, one which can also generate the attacks to test its own effectiveness in defending against them. The research involved the design, testing, and implementation of attacks/defenses tool, which benefits from a user-friendly user interface that simplifies the testing process. The attacks were generated using existing tools, linked to one central interface. The defense methodology was script-based and created entirely from scratch. It was also linked to a single interface which continuously monitors logs to detect and prevent attacks in an efficient timely manner. The results showed that the proposed defenses to the studied wireless attacks were effective at mitigation, or outright prevention. They were also more lightweight than existing solutions, making them more appealing for less powerful hardware.


ARP poisoning; Defense tool; DHCP starvation; Log monitoring; Wi-Fi deauthentication

Full Text:




  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

The Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).

shopify stats IJEECS visitor statistics