Research Article Open Access

Effective Authentication Technique for Distributed Denial of Service Attacks in Wireless Local Area Networks

M. Moorthy and S. Sathiyabama

Abstract

Problem statement: In 802.11-based Wireless LAN (WLAN), there is an mproved risk of security attacks. To defeat concealed attacks, there is a necessity to authenticate both access points and wireless stations. Approach: We propose a defensive technique for DDoS attack in WLAN. This authentication technique includes an Authentication Server (AS) in addition to the Wireless Station (WS) and Access Point (AP). Results: The authentication server holds both normal and attacker databases. The attacker database can be constructed from the outcome of fuzzy decision making. After WS and AP registers itself with AS, WS sends authentication request message to AS through the nearest AP. Before granting the session key for the WS, the AS checks the occurrence of WS in the attacker database. If it is found to be an attacker, AS denies the session key for the WS, there by isolating the WS from further communications. In order to prevent the authentication request flooding attacks, traffic pattern filtering rule is implemented. Conclusion/Recommendations: By simulation results, we show that the proposed technique is more efficient defensive mechanism against DDoS attack.

Journal of Computer Science
Volume 8 No. 6, 2012, 828-834

DOI: https://doi.org/10.3844/jcssp.2012.828.834

Submitted On: 28 December 2011 Published On: 14 March 2012

How to Cite: Moorthy, M. & Sathiyabama, S. (2012). Effective Authentication Technique for Distributed Denial of Service Attacks in Wireless Local Area Networks. Journal of Computer Science, 8(6), 828-834. https://doi.org/10.3844/jcssp.2012.828.834

  • 3,730 Views
  • 4,150 Downloads
  • 0 Citations

Download

Keywords

  • Wireless Local Area Networks (WLAN)
  • Authentication Server (AS)
  • Wireless Station (WS)
  • Access Point (AP)
  • Intrusion Detection System (IDS)