A framework for detecting MAC and IP spoofing attacks with network Characteristics

Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

18 Scopus citations

Abstract

This paper presents a spoofing attack detection framework based on physical network characteristics (e.g., received signal strength indicator round trip time and link quality indicator) that cannot easily be mimicked by artificial means. Unlike most previous studies that are sensitive to changes in network conditions, we propose a spoofing attack detection method, which is highly robust to the changes of network conditions over time. The proposed framework can monitor devices' physical network characteristics in real time and check if any significant changes have been made in the monitored measurements to effectively detect device spoofing attacks. To demonstrate the feasibility of the proposed framework, we analyzed how the RSSI values of packets were changed with varying physical distances in a real ZigBee (IEEE 802.15.4) network environment.

Original languageEnglish
Title of host publicationProceedings - 2016 International Conference on Software Security and Assurance, ICSSA 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages49-53
Number of pages5
ISBN (Electronic)9781509043880
DOIs
StatePublished - 21 Feb 2017
Event2016 International Conference on Software Security and Assurance, ICSSA 2016 - St. Polten, Austria
Duration: 24 Aug 201625 Aug 2016

Publication series

NameProceedings - 2016 International Conference on Software Security and Assurance, ICSSA 2016

Conference

Conference2016 International Conference on Software Security and Assurance, ICSSA 2016
Country/TerritoryAustria
CitySt. Polten
Period24/08/1625/08/16

Keywords

  • Received signal strength indicator (RSSI)
  • Spoofing detection
  • Zigbee

Fingerprint

Dive into the research topics of 'A framework for detecting MAC and IP spoofing attacks with network Characteristics'. Together they form a unique fingerprint.

Cite this