
policy information between each other to obtain
frequent updates. This distributed architecure
provides better robustness for the WLANs. For
example, a roaming attacker can be discovered more
readily though the cooperation of several PBSSs.
5 CONCLUSIONS
The importance of security in a wireless environment
can never be underestimated. Because of the nature
of wireless transmission and the security mechanisms
in 802.11, DDoS attacks can always take place.
Unfortunately, the RSN mechanism doesn’t protect
WLANs against the attacks demonstrated in this
paper. Deficiencies in both the encryption algorithm
and the security protocols have highlighted the
vulnerability of WLANs to DDoS attacks. As a result,
extra security countermeasures are necessary to
protect the network’s resources. Currently firewalls
are the most popular approach for implementing
security in networks. The main mechanism employed
by them is packet filtering. However this approach
has vulnerabilities as it only addresses attacks at one
(the network) level. In this paper, a new approach to
implementing countermeasures based on a
Policy-Based Security Server (PBSS) is presented.
The PBSS construction aims at defeating the attacks
by considering the entire behaviour of the network
system (PBSS, AP, Mobile clients). At the same time
as the clients filter the defined packets, the PBSS
periodically sends probes. It asks the APs about the
current status of the network. If any abnormal
phenomenon is found, the PBSS sends ‘capsules’
(packets encapsulated with programs or pointers) to
the AP. The AP then changes the topology of the
WLAN and cooperates both the AP and wireless
users to defeat the attack. The main feature of the
PBSS framework is that it is designed to organize the
members in the network to defeat viruses rather than
do it solely, so that a single infected machine won’t
affect the whole network’s performance. A number
of typical DDoS attack strategies are identified and
these will be used to define the policy
countermeasure employed. However the approach
can also be applied to other types of attack. A
number of typical DDoS attack strategies are
identified and these will be used to define the policy
countermeasure employed. However the approach
can also be applied to other types of attack.
Future work will focus on the implementation of the
policy-based security server. Our design of the
security architecture aims at the reacting performance
of the wireless LAN, we will use a network
simulation package, OPNET to build up the model
and test its performance over a range of DDoS attack
strategies
REFERENCES
L.Sherriff, “Virus Launches DDOS for mobile phones”,
http://www.theregister.co.uk/content/1/12394.html
Jon Edney, William A. Arbaugh, “Real 802.11
Security----Wi-Fi Protected Access and 802.11i”,
Addison Wesley, July, 2003
The 802.11 Security Web Page
http://www.drizzle.com/~aboba/IEEE/
Nikita Borisov, Ian Goldberg, David Wagner, “Intercepting
Mobile Communications: The Insecurity of 802.11”,
http://www.isaac.cs.berkeley.edu/isaac/mobicom.pdf
CERT Coordination Center, “Denial of Service Attacks”,
http://www.cert.org/tech_tips/denial_of_service.html,
2001
J.Mirkovic, J.Martin, P.Reiher, “A Taxonomy of DDOS
Attacks and DDOS Defense Mechanisms”, ACM CCR,
July, 2002
CERT Coordination Center, “Trends in Denial Of Service
Attack Technology”
http://www.cert.org/archive/pdf/DoS_trends.pdf, Oct,
2001
IEEE 802.11 Tgi, Tim Moore, Bernard Aboba,
“Authenticated fast handoff”,
http://www.drizzle.com/~aboba/IEEE/11-01-TBD-I-Au
thenticated-FastHandoff.ppt
Mishr, A., and W.A.Arbaugh. 2002. “An Initial Security
Analysis of the IEEE 802.1X Standard.” Technical
Report CS-TR-4328. College Park, University of
Maryland.
IEEE. “Standard for local and metropolitan area networks:
Standard for port based network access control”. IEEE
Draft P802.1X/D11, March 2001.
ICETE 2004 - SECURITY AND RELIABILITY IN INFORMATION SYSTEMS AND NETWORKS
112