Please use this identifier to cite or link to this item: http://hdl.handle.net/1942/19047
Full metadata record
DC FieldValueLanguage
dc.contributor.authorROBYNS, Pieter-
dc.contributor.authorQUAX, Peter-
dc.contributor.authorLAMOTTE, Wim-
dc.date.accessioned2015-07-28T09:25:59Z-
dc.date.available2015-07-28T09:25:59Z-
dc.date.issued2015-
dc.identifier.citationProceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks-
dc.identifier.isbn9781450336239-
dc.identifier.urihttp://hdl.handle.net/1942/19047-
dc.description.abstractThe ability to inject packets into a network is known to be an important tool for attackers: it allows them to exploit or probe for potential vulnerabilities residing on the connected hosts. In this paper, we present a novel practical methodology for injecting arbitrary frames into wireless networks, by using the Packet-In-Packet (PIP) technique to exploit the frame aggregation mechanism introduced in the 802.11n standard. We show how an attacker can apply this methodology over a WAN -- without physical proximity to the wireless network and without requiring a wireless interface card. The practical feasibility of our injection method is then demonstrated through a number of proof-of-concept attacks. More specifically, in these proof-of-concepts we illustrate how a host scan can be performed on the network, and how beacon frames can be injected from a remote location. We then both analytically and experimentally estimate the success rate of these attacks in a realistic test setup. Finally, we present several defensive measures that network administrators can put in place in order to prevent exploitation of our frame injection methodology.-
dc.language.isoen-
dc.publisherACM-
dc.rightsPermission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from Permissions@acm.org. WiSec’15, June 22–26, 2015, New York, NY, USA. Copyright is held by the owner/author(s). Publication rights licensed to ACM. ACM 978-1-4503-3623-9/15/06 ...$15.00. DOI: http://dx.doi.org/10.1145/2766498.2766513.-
dc.subject.otherwireless security; injection attack; frame aggregation-
dc.titleInjection attacks on 802.11n MAC frame aggregation-
dc.typeProceedings Paper-
local.bibliographicCitation.conferencedateJune 24 - 26, 2015-
local.bibliographicCitation.conferencenameThe 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks-
local.bibliographicCitation.conferenceplaceNew York, NY, USA-
local.format.pages11-
local.bibliographicCitation.jcatC1-
local.publisher.placeNew York, USA-
local.type.refereedRefereed-
local.type.specifiedProceedings Paper-
local.identifier.vabbc:vabb:394441-
dc.identifier.doi10.1145/2766498.2766513-
dc.identifier.urlhttps://robyns.me/docs/robyns2015injection.pdf-
local.bibliographicCitation.btitleProceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks-
item.fulltextWith Fulltext-
item.accessRightsOpen Access-
item.fullcitationROBYNS, Pieter; QUAX, Peter & LAMOTTE, Wim (2015) Injection attacks on 802.11n MAC frame aggregation. In: Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks.-
item.validationvabb 2018-
item.contributorROBYNS, Pieter-
item.contributorQUAX, Peter-
item.contributorLAMOTTE, Wim-
Appears in Collections:Research publications
Files in This Item:
File Description SizeFormat 
probyns-wisec2015-7.pdf
  Restricted Access
Published version479.21 kBAdobe PDFView/Open    Request a copy
robyns2015injection.pdfPeer-reviewed author version476.92 kBAdobe PDFView/Open
Show simple item record

SCOPUSTM   
Citations

1
checked on Sep 2, 2020

Page view(s)

82
checked on Sep 7, 2022

Download(s)

216
checked on Sep 7, 2022

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.