Lightweight log-monitoring-based mitigation tool against WLAN attacks
Abstract
Wireless network attacks are some of the most common network security threats dealt with daily. Their ease of execution and effectiveness make them commonplace within most public networks. The goal of this paper is to develop a tool which provides defenses against these attacks, one which can also generate the attacks to test its own effectiveness in defending against them. The research involved the design, testing, and implementation of attacks/defenses tool, which benefits from a user-friendly user interface that simplifies the testing process. The attacks were generated using existing tools, linked to one central interface. The defense methodology was script-based and created entirely from scratch. It was also linked to a single interface which continuously monitors logs to detect and prevent attacks in an efficient timely manner. The results showed that the proposed defenses to the studied wireless attacks were effective at mitigation, or outright prevention. They were also more lightweight than existing solutions, making them more appealing for less powerful hardware.
Keywords
Full Text:
PDFDOI: http://doi.org/10.11591/ijeecs.v35.i2.pp1061-1072
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Indonesian Journal of Electrical Engineering and Computer Science (IJEECS)
p-ISSN: 2502-4752, e-ISSN: 2502-4760
This journal is published by the Institute of Advanced Engineering and Science (IAES) in collaboration with Intelektual Pustaka Media Utama (IPMU).