Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/19047
Title: Injection attacks on 802.11n MAC frame aggregation
Authors: ROBYNS, Pieter 
QUAX, Peter 
LAMOTTE, Wim 
Issue Date: 2015
Publisher: ACM
Source: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks
Abstract: The ability to inject packets into a network is known to be an important tool for attackers: it allows them to exploit or probe for potential vulnerabilities residing on the connected hosts. In this paper, we present a novel practical methodology for injecting arbitrary frames into wireless networks, by using the Packet-In-Packet (PIP) technique to exploit the frame aggregation mechanism introduced in the 802.11n standard. We show how an attacker can apply this methodology over a WAN -- without physical proximity to the wireless network and without requiring a wireless interface card. The practical feasibility of our injection method is then demonstrated through a number of proof-of-concept attacks. More specifically, in these proof-of-concepts we illustrate how a host scan can be performed on the network, and how beacon frames can be injected from a remote location. We then both analytically and experimentally estimate the success rate of these attacks in a realistic test setup. Finally, we present several defensive measures that network administrators can put in place in order to prevent exploitation of our frame injection methodology.
Keywords: wireless security; injection attack; frame aggregation
Document URI: http://hdl.handle.net/1942/19047
Link to publication/dataset: https://robyns.me/docs/robyns2015injection.pdf
ISBN: 9781450336239
DOI: 10.1145/2766498.2766513
Rights: Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org. WiSec’15, June 22–26, 2015, New York, NY, USA. Copyright is held by the owner/author(s). Publication rights licensed to ACM. ACM 978-1-4503-3623-9/15/06 ...$15.00. DOI: http://dx.doi.org/10.1145/2766498.2766513.
Category: C1
Type: Proceedings Paper
Validations: vabb 2018
Appears in Collections:Research publications

Files in This Item:
File Description SizeFormat 
probyns-wisec2015-7.pdf
  Restricted Access
Published version479.21 kBAdobe PDFView/Open    Request a copy
robyns2015injection.pdfPeer-reviewed author version476.92 kBAdobe PDFView/Open
Show full item record

SCOPUSTM   
Citations

1
checked on Sep 2, 2020

Page view(s)

82
checked on Sep 7, 2022

Download(s)

216
checked on Sep 7, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.