Download as pdf or txt
Download as pdf or txt
You are on page 1of 9

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/221400238

Two Novel 802.1x Denial of Service Attacks

Conference Paper · September 2011


DOI: 10.1109/EISIC.2011.49 · Source: DBLP

CITATIONS READS
4 2,697

2 authors:

Abdulrahman Alruban Emlyn Everitt


Majmaah University University of South Wales
29 PUBLICATIONS 58 CITATIONS 2 PUBLICATIONS 20 CITATIONS

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

APPLYING BIOMETRICS TO DIGITAL FORENSIC View project

All content following this page was uploaded by Abdulrahman Alruban on 25 May 2015.

The user has requested enhancement of the downloaded file.


2011 European Intelligence and Security Informatics Conference

Two Novel 802.1x Denial of Service Attacks

Abdulrahman Alruban Dr Emlyn Everitt


Master in Computer Systems Security Lecturer in Faculty of Advanced Technology
University of Glamorgan University of Glamorgan
Cardiff, UK Cardiff, UK
amsr9@hotmail.com eeveritt@glam.ac.uk

Abstract—Denial of Service (DoS) attacks are among the type of these vulnerabilities; for instance, exploiting a
most common security issues threatening today’s 802.11 vulnerability that leads to the disruption of the availability
networks. In this paper, we have proposed two 802.1x DoS of a service on the victim network or system. This is known
attacks, EAP-NAK and EAP-Notification flooding attacks. as a Denial of Service (DoS) attack.
These effectively disrupt the authentication process between
the legitimate wireless supplicants and the network In the IEEE 802.1x standard, the network access point
authentication server. The evaluation of these attacks against which acts as a wireless network authenticator, cannot be
EAP is performed using well-suited metrics which highlight authenticated by the network supplicant to verify its
their impact on the targeted network in practice. Furthermore, legitimacy, even when EAP-Transport Layer Security
we discuss possible techniques to detect these attacks, such as (EAP-TLS) is in use, which supplies a two-side
configuring the WIDS to create a performance baseline of the authentication between the supplicant and the authentication
wireless network. Lastly, several techniques and solutions were
server [3]. This vulnerability leaves the wireless network
discussed which can be applied to the 802.11i standard in order
to enhance the security of the 802.1x for dealing with DoS susceptible to an adversary to spoof a wireless node identity
attacks, such as the use of a process delay time technique. and play within the network. Besides this, EAP, which is a
part of the 802.1x standard, is susceptible to many DoS
Keywords-802.11 Denial of Service; IEEE 802.1x Security; attacks, since these attacks take advantage of the
EAP DoS. unprotected EAP and EAPOL messages, such as EAPOL-
Start, EAPOL-Logoff, EAP-Success and EAP-Failure. An
I. INTRODUCTION adversary who exploits these messages could stop the
802.11 wireless networks are continuously evolving to proper functioning of EAP and have a negative impact on
meet the growing demand of modern mobile and internet the functioning of the wireless network, such as preventing
applications for high capacity and advanced features in a legitimate network supplicant from completing the
security and quality of service. In the last few years, authentication process and joining the network.
numerous malicious attacks have already targeted 802.11 In this paper, we proposed two 802.1x DoS attacks,
networks due to their broadcast nature, since access to the EAP-NAK response and EAP-Notification flooding attacks,
radio medium is not restricted by any security means. On which effectively disrupt the authentication process between
the other hand, some security standards, such as 802.1x and a legitimate wireless supplicant and the network
802.11i, have been introduced to the wireless network authentication server.
infrastructure in order to enhance such networks’ access The rest of this paper is structured as follows: In section
control and confidentiality, and to abolish the overall II we present related security research. Section III lists a
security concerns that have been discovered in the early background on 802.1x standards along with a discussion of
versions of the 802.11 standard, such as Wired Equivalent the EAP authentication process, followed by the proposing
Privacy (WEP). of two DoS attacks. Section IV discusses the experimental
However, these security standards focus exclusively on setup, including the hardware and software used in the
confidentiality and authentication (access control), rather experiments. In section V we use live experiments and
than the availability of the service [1]. For instance, the analyse the practicality and efficacy of these attacks. Section
conventional authentication framework frequently used in VI discusses the feasible mitigation and workaround
most organisations today is Extensible Authentication techniques that can be used to prevent or eliminate the
Protocol (EAP). Since the network and security protocols impact of the EAP DoS attacks on the wireless networks.
are the essential components of today’s computer networks Section VII offers our conclusions.
[2], this attracts adversaries to choose such protocols to
perform malicious attacks to achieve their evil purposes, II. RELATED WORK
such as bringing the network down or compromising such Recently, much research has been published which
networks and systems by exploiting the 802.1x exposes several weaknesses and vulnerabilities in 802.11
vulnerabilities. networks [1-2, 4-7].
There are various types of attacks that an adversary can In [1], Bellardo and Savage discovered serious
perform against the vulnerable protocols depending on the weaknesses which exploit the unprotected 802.11

978-0-7695-4406-9/11 $26.00 © 2011 IEEE 183


DOI 10.1109/EISIC.2011.49
management frames, such as deauthentication and A. EAP MESSAGES EXCHANGE
disassociation messages. In their research they successfully The typical procedure for a station joining a WLAN
demonstrated these vulnerabilities by disconnecting and network initially involves it attempting to authenticate and
blocking legitimate wireless network clients from joining associate itself by sending authentication and association
the network for the duration of an attack. Furthermore, in requests with the wireless access point. When 802.11i
[2], Zhao and Vemuri proposed two exception triggered standard is in use for authentication, then the access point
denial-of-service attacks on EAP-TLS. In the first attack, and the supplicant will enter an additional authentication
the attacker spoofs an error message to inform the WLAN process, for example EAP.
supplicant or authenticator that a failure has occurred. In the Figure 2 shows the flowchart process of the EAP
second attack, it sends some deceptive messages to trigger authentication messages exchange between the WLAN
one of the supplicant or authentication servers to send out an supplicant, authenticator and authentication server.
error message. Both methods take advantage of intercepting
unprotected EAP messages sent between the wireless
network supplicant and authentication server. Several
mitigation techniques were proposed in this study to deal
with such vulnerability, for instance, the messages process
time delay technique.
III. BACKGROUND ON 802.1X
802.1X is a Port-based Access Control standard which
divides every physical Ethernet port into two logical
controlled and uncontrolled ports. This means that when a
station is connected into the physical Ethernet port it can
communicate over the uncontrolled port. However, the only
type of communication allowed over the uncontrolled port is
packets that relate to authentication, such as EAP and
EAPOL messages.
Once the network supplicant successfully authenticates
(over the uncontrolled port), data are allowed to pass over
the controlled port. In addition, 802.1X defines a way to
transport EAP packets across Ethernet and other link layer
protocols to an authenticator embedded in an 802.1x-aware
switch or access point. This allows the use of an
authentication server, such as RADIUS based, to
authenticate users before they can use an Ethernet port to
transfer data. When the 802.11 networks use the 802.11i
(WPA enterprise mode), the implementation of the 802.1x is
instead of passing EAP packets (encapsulated within
EAPOL) over Ethernet. Instead, the packets are transmitted
over 802.11 (still encapsulated within EAPOL).
Instead of a switch being the authenticator and
authenticating physical ports, the access point now acts as
Figure 2 Typical 802.1x-EAP Authentication Flowchart
the authenticator and authenticates everyone who associates
[8]. Figure 1 illustrates how the 802.1x is structured when it
is used in 802.11 networks. When the authentication processes are finished, and the
supplicant has been accepted to join the network, it can now
send and receive data to other network nodes. In addition,
when the client wishes to end the authenticated session, it
simply sends an EAPOL-Logoff frame to the authenticator to
end the session. However, this EAPOL-Logoff frame is
transmitted unprotected.
B. POSSIBLE DENIAL OF SERVICE ATTACKS AGAINST EAP
EAP provides a flexible infrastructure to other protocols
to work on top of it, such as TLS, TTLS, PEAP and many
other EAP-Methods which are still vulnerable to EAP DoS
attacks. This is because the EAP acts as an underlying layer
for these methods. Since some of the 802.1x messages are
Figure 1 Authentication using 802.1X on a WLAN
transmitted between the supplicant and the authenticator

184
unprotected, as previously discussed, it is feasible to
perform certain DoS attacks against the WLAN using these
unsecure EAPOL and EAP frames.
In this section two DoS flooding attacks which can be
performed by an attacker against WLAN using EAP
unprotected frames are discussed. The following flooding
attacks are proposed: EAP-NAK response, EAP-Negotiation
floods.
I.B.1 EAP-NAK FLOODING ATTACK
In IEEE 802.1x the EAP-NAK frame indicates an EAP
method that the supplicant can support as a response to the
authentication server request when it does not support the
proposed authentication method that the authentication
server proposed. However, during the EAP negotiation
process, the supplicant should not transmit a legacy or
expanded EAP-NAK as a response to an authentication
server request after an initial non EAP-NAK response has
already been sent [9]. In addition, RFC 3748 states that
whenever the authenticator gets an unexpected EAP-NAK
response it should discard it.
Typically, when the authentication server receives an
EAP-NAK response from the supplicant and the server does
not support the desired EAP method that the supplicant asks
for in its EAP-NAK response, the authentication server
should initiate an EAP-failure message to terminate the
authentication process, as Figure 3 illustrates. However, an
attacker who is able to detect the EAP unprotected frames
may send a fake EAP-NAK frame in response to the
authentication server request. This fake EAP-NAK is
designed for an unsupported EAP method in the
authentication server. In this case, the authentication server Figure 3 EAP Authentication process – EAP-NAK Attack Point
will examine and process this response (faked EAP-NAK) I.B.2 EAP-NOTIFICATION FLOODING ATTACK
as it comes from a legitimate supplicant and initiates an EAP-Notification messages are proposed to supply some
EAP-failure message each time it receives such a spoofed useful information to the wireless network supplicant during
EAP-NAK frame (as Figure 3 illustrates at point 2). As a the authentication process, such as the expiration time of a
result, the authentication process will be terminated between password or cautioning of some authentication failure sent
the two parties. by the authentication server [9]. Therefore, it cannot alter
the state of the supplicant during the authentication process
according to the RFC 3748. However, during security
analysis experiments of the EAP in this paper, it was found
that it is possible to disrupt this authentication process when
the attacker floods the network supplicants using a fake
EAP- Negotiation message where the attacker pretends to be
a legitimate network access point (spoofs its MAC address)
that the victim (legitimate supplicant) tries to authenticate,
as Figure 4 illustrates.

185
conducting the experiments on a network simulation1, which
in the best conditions does not reflect the same results as a
real world experiment.
All the hardware used in our experiments is easily
available on the market. Since the software is open source, it
is freely available online (file2air, Wireshark, FreeRADIUS
and Open1X project) [10-13]
Figure 5 depicts the laboratory of the WLAN used for
the experiments in this research:

Figure 5 Laboratory of the WLAN

C. ATTACK METHODOLOGY
An EAP-NAK flooding attack can be performed by an
Figure 4 EAP Authentication process – Possible EAP-Notification attacker against the access point, targeting the authentication
flooding attacks points. server. The attacker pretends to be the legitimate network
In addition, it was noticed that when a station is flooded supplicant trying to authenticate with the network by
wirelessly using a malicious EAP- Negotiation messages, spoofing its MAC address. In an EAP- Negotiation flooding
and the station is not in the authentication state (as number 1 attack, the attacker floods the network supplicants (entire
in the above figure). It simply discards these messages and BSS) using a forged EAP- Negotiation frame, which the
this is what it is expected to do according to EAP standard attacker pretends to be the legitimate network access point
specifications. However, when a wireless network (spoofs its MAC address), targeting the victims (legitimate
supplicant who is in an authentication state (as number 2 in supplicants).
the above figure) is flooded, this will cause the supplicant to V. EXPERIMENTAL RESULTS AND DISCUSSIONS
respond to each EAP-Notification message it receives, since The aim of this section is to evaluate the techniques used
the authenticator MAC address has been spoofed. The to cause DoS against EAP to conclude whether they
supplicant sends its responses to the authenticator, which in represent a real threat to 802.11 networks or whether they
turn forwards these responses to the authentication server. are only theoretical dangers. In addition, researchers
When the authentication server receives these EAP- involved in DoS experiments normally use several measures
Notification responses, which seems as if they emanate from in order to ascertain the impact of the DoS attacks metrics
a legitimate wireless network supplicant, it will discard such as: overall transaction duration, throughput of TCP
these messages. Additionally, the concept of this attack is connections, attack traffic, and percentage of legitimate
that it keeps the supplicant busy in responding to the fake packets that received no service [14]. For the experiments in
EAP-Notification requests, which delays the authentication this paper, the successful authentication rate was used to
process until the configured time out of the EAP in both measure the impact of the proposed DoS techniques (EAP-
sides is reached; which causes the authentication process to NAK and EAP- Negotiation flooding attacks).
restart.
IV. EXPERIMENTAL TEST SETUP
The framework of the EAP-flooding attacks 1
accomplished in this paper is based on a real hardware and There are many wireless simulations available out there, for
instance, Open Source Wireless Network Simulator (openWNS),
software laboratory setup, which has been designed and OPNET Modeler® Wireless Suite, QualNet simulator, and The
configured to reflect a real life implementation of such Network Simulator - ns-2, all these are software can be used to
scenarios. This design is followed as an alternative to simulate a virtual WLAN to be used for such excremental.
However some of these simulations are freely available and an
open source while others are highly expensive.

186
A. EAP-NAK FLOODING ATTACK RESULT authentication server RADIUS-Access-Authentication and
The aim of this experiment is to inspect the impact of the supplicant RADIUS-Access-Request. When this
floods on a wireless network authenticator using fake EAP- occurred, it responded by issuing an EAP-failure to
NAK messages. As soon as a legitimate supplicant (client 1) terminate the authentication process. However, this attack
was detected, the authentication negotiation began with the is not stealthy. To make it stealthy, an attacker could disrupt
authenticator. Its MAC address (client 1) was spoofed to the authentication process between a legitimate WLAN
pretend the legitimate WLAN supplicant. This supplicant supplicant and the authentication server by sending only one
had just started the EAP authentication negotiation with the forgery EAP-NAK as a response to the authentication server
authenticator. The target (authenticator) was then RADUS-challenge request at the “right time”, which would
continually flooded by sending 30 maliciously modified cause a termination of the authentication process.
EAP-NAK frames per second for 17 minutes. In total,
30,600 frames were transmitted during the attack time as B. EAP-NOTIFICATION FLOODING ATTACK EXPERIMENT
In this experiment, the effects on the authentication
Figure 6 depicts.
process when flooded by a wireless network supplicant
All the transmitted messages generated were maliciously using maliciously modified EAP-Notification requests was
modified to the desired un-assigned (un-supported) EAP- examined. Firstly, a wireless network access point MAC
methods by the authentication server in order to disrupt the address was spoofed and the WLAN supplicants were
authentication process between the two ends. As a result of overwhelmed with forged EAP-Notification messages for
this attack, the legitimate WLAN supplicant failed to 35 minutes. The transmission rate was configured to
authenticate itself with the network for the duration of the generate 30 messages per second. In total, 63,000 frames
attack. During the attack, the authentication process between were transmitted during the attack time as Figure 8
the victim and the authentication server was terminated illustrates.
several times, which makes the legitimate WLAN
supplicants reissue an EAP-Start message, as Figure 7
depicts.

Figure 8 WLAN traffic during EAP- Notifications flooding attack

Figure 6 WLAN traffic during EAP-NAK flooding attack For the duration of the attack, the authentication process
between the supplicant and the authentication server
remains suspended. In this experiment, the victim was
targeted using Windows XP SP3 with a default 802.1x
supplicant agent. However, the attack was also launched on
a different occasion, targeting the same victim, using
XSupplicant 2 (an open source 802.1x supplicant agent)
Figure 7 WLAN Supplicant Transmitting EAPOL-Start instead of the default windows 802.1x supplicant agent [13].
It has been noticed that, once the victim received our
malicious EAP-Notifications messages in the second
It can be concluded that, for every fake EAP-NAK experiment, it silently discarded these messages.
response the authenticator received, it forwarded these Consequently, the legitimate supplicant continued the
responses to the authentication server as an access request authentication process with the authentication server as if
frame. When these access request frames reached the nothing had occurred, as Figure 9 illustrates. We manually
authentication server, it kept discarding these requests until restarted the authentication 3 times to examine the impact of
the EAP timeout was reached, which made the supplicant the EAP-Notification floods, and the client successfully
reissue a new EAP-Start message to start the authentication authenticated itself without any further issue.
process again.
2
However, during the flood, the server only processed the XSupplicant is part of the Open1X project, which is a free, open
message that it expected to receive. In other words, it source IEEE 802.1X/WPA/WPA2/IEEE 802.11i
process frames it only receives any time between the implementation.

187
threshold [15]. As such, it is possible to configure the WIDS
to create a performance baseline of the wireless network.
For instance, an EAP-NAK flooding attack alarm will be
triggered when a precise access point receives more than
“X” EAP-NAK frames per second, since “X” is predefined
based on the normal performance of the wireless network.
However, according to current information none of the
current WIDS can detect a stealthy EAP-NAK attack, where
an attacker could send only one forged EAP-NAK as a
response to the authentication server RADUS-challenge. In
order to spot such an attack, the WIDS needs to realise how
the EAP authentication process works between the WLAN
supplicant and the authentication server, as well as
Figure 9 WLAN traffic during EAP- Notifications flooding attack recognising the attack technique. This can be achieved using
(Victim using XSupplicant) a state-full WIDS, for instance, when the authentication
server receives an EAP-NAK message along with the EAP-
Response-Authentication from the same supplicant within
“1” second, this should be considered an indication of an
In conclusion, EAP-Notification messages were allowed EAP-NAK attack. However, this may generate a false-
by default in the windows 802.1x supplicant agent, which positive 4 alert instead of a true-positive alert when the
caused the legitimate wireless network supplicant to respond WIDS is not configured properly.
to each EAP-Notification request it received by issuing an
EAP-Notification response without performing any sort of B. EAP IMPROVEMENT AGAINST ATTACKS
validation on these messages to check the legitimacy of In [2], Zhao and Vemuri proposed a technique that can
these requests. As a result, this kept the WLAN supplicant be used to mitigate EAP Exception Triggered DoS attacks
and the authentication server busy in responding to and (Error Message and Misleading Message based attacks)
discarding these fake EAP-Notification messages, which in when the 802.1x is used in wireless networks. In addition,
turn delayed the flow of the authentication process until the the concept of their technique is to prioritise the received
configured time out of the EAP in both sides was reached. packets process based on the given cost of those packets.
Each EAP packet will have a known cost that indicates the
However, when EAP- Notification messages were precedence of the packet based on its consequence in the
disabled within the 802.1x supplicant agent, such as in entire protocol flow process. For example, for packets with
XSupplicant, the WLAN supplicant discarded any a lower cost, the receiver must process it prior to packets
notification message it received without any further action. that have a higher cost. By using such an approach the
Subsequently, the supplicant succeeded in authenticating authentication process between the legitimate supplicant and
itself with the authentication server. the authentication server will usually succeed, where other
VI. EAP DOS FLOODING ATTACK COUNTERMEASURES forged attempts, such as EAP-NAK attack, would be
AND MITIGATION TECHNIQUES eliminated.
In this section we research and discuss the feasible I.B.1 EAP-NAK AND EAP-NOTIFICATION DOS ATTACK
mitigation and workaround techniques that can be used to COUNTERMEASURES
prevent or eliminate the impact of the EAP and EAPOL There are several methods of mitigating EAP-NAK and
DoS attacks on the wireless networks. EAP-Notification attacks. One method is the process delay
A. DETECTION OF ATTACKS time technique. This mitigates both the NAK and
Fortunately, most of the current Wireless Intrusion Notification flood attack. Another countermeasure against a
Detection Systems (WIDS) 3 can identify and spot known notification flood attack is to disable the use of these
EAP DoS flooding attacks based on their signatures. Even notification messages using EAP authentication methods.
with the EAP-NAK and EAP-Notification flooding attacks, I.B.2 DELAY TIME TECHNIQUE
their signatures can be added to the WIDS database and be Zhao and Vemuri proposed a technique which requires a
detected. In addition, WIDS is capable of generating an modification on the EAP protocol on both WPA supplicant
alarm to 802.1x DoS flooding, based on a configured rate agent and the authentication server. The modification will
ensure that, each time the authentication server gets an
3 EAP-NAK frame, before processing the frame it will wait
WIDS venders such as AirMagnet, Cisco Systems, Aruba, and for a maximum of 1 second. If the authentication server
AirDefense provide reasonable IDS systems for a wireless
networks (Wanner, 2009). However, the most prohibitive factor receives a legal frame that reflects the typical EAP
that restricts small and medium enterprises form using wireless
4
such WIDSs is the high cost. Where the investment required to IDSs sometimes generate some fake alarms, since it thinks it
deploy such systems is high, and requires a lot of staff training to detects some malicious intrusion. In fact if it spots something it
be able to administrate it. is supposed to trigger an alarm.

188
negotiation process flow from the supplicant, such as an vulnerability of the unprotected EAP messages that are
EAP-Response-Authentication frame, before the given transmitted during the authentication process between the
delayed time has expired (1 second) of the received EAP- network nodes. As was demonstrated in experiments
NAK response, the authentication server should process the conducted, EAP-NAK and EAP-Negotiation flooding
legitimate frame and drop the EAP-NAK response. effectively disrupt the authentication process between the
By applying this approach to the entire protocol at both legitimate wireless supplicants and the authentication server
ends, EAP-Notification flooding can be prevented. The during the attack.
processing time will be delayed for a maximum of 1 second ACKNOWLEDGMENTS
if the supplicant does not receive an expected legitimate The author would like to express his gratitude to his
EAP message, and it will respond to the notification family, Ruqaya (the author’s mother), Mona (the author’s
message. Otherwise, the supplicant should discard the wife), and Alwaleed and Albaraa (the author’s sons) for
received notification. their love, prayers and unfailing support throughout his life.
I.B.3 DISABLING THE USE OF EAP-NOTIFICATION REFERENCES
MESSAGES
For EAP-Notification flood attacks, disabling the use of [1] J. Bellardo and S. Savage, "802.11 denial-of-service attacks:
these notification messages by the EAP authentication real vulnerabilities and practical solutions," presented at the
methods will eliminate the impact of the attack. Proceedings of the 12th conference on USENIX Security
Symposium - Volume 12, Washington, DC, 2003.
EAP-Notification messages are proposed to only supply
some useful information to the supplicant during the [2] Y. Zhao, S. Vemuri, J. Chen, Y. Chen, H. Zhou and Z. Fu,
authentication process, such as the expiration time of a "Exception triggered DoS attacks on wireless networks,"
password or cautioning of some authentication failure. As a presented at the Dependable Systems & Networks. DSN '09.
result of disabling the notification messages, the supplicant IEEE/IFIP International, Lisbon, 2009.
will discard any notification message it receives without any
further action, and continue the authentication process with [3] D. B. Faria and D. R. Cheriton, "DoS and authentication in
the authentication server as if nothing has occurred. wireless public access networks," presented at the
In the RFC 3748 it was suggested that a method-specific Proceedings of the 1st ACM workshop on Wireless security,
Message Integrity Code (MIC) 5 be used to provide some Atlanta, GA, USA, 2002.
sort of integrity to the unprotected EAP messages from
being tampered with by an adversary [9]. [4] W. Li, "Analysis and Improvements over DoS Attacks against
IEEE 802.11i Standard," 2010, pp. 109-113.
Some of the EAP messages, such as NAK, Notification
and Identity, do not have a MIC within the frame. In [5] C. Liu and J. T. Yu., "An analysis of DoS attacks on wireless
addition, they recommend deploying an integrity method LAN," presented at the IASTED International Conference on
such as MIC to protect all the EAP header fields, including Wireless Networks and Emerging Technologies (WNET2006),
the Code, Identifier, Length, Type, and Type-Data fields. 2006.
Nevertheless, by deploying this suggestion to the EAP, any
validation failure which occurs in such MIC protected [6] M. Bernaschi, F. Ferreri and L. Valcamonici, "Access points
frames, on any side (at the authentication server or vulnerabilities to DoS attacks in 802.11 networks," Wirel.
supplicant), will cause a termination of the whole Netw., vol. 14, pp. 159-169, 2008.
negotiation process, which is good for protecting the
integrity of the messages. [7] M. Malekzadeh, A. A. A. Ghani, J. Desa and S. Subramaniam,
This, however, will not prevent an adversary from "Vulnerability Analysis of Extensible Authentication Protocol
conducting Denial of Service attacks against the victim. (EAP) DoS Attack over Wireless Networks," International
Since any malicious modification to the EAP messages that Congress for Global Science and Technology, Computer
have been protected by MIC will cause a fatal error and lead Networks and Internet Research, vol. 9, 2009.
to DoS, such a solution is excluded from use as a
countermeasure to the EAP-NAK and EAP-Notification [8] J. Bock and M. Lynn, Hacking Exposed Wireless: McGraw-
attacks. Hill, Inc., 2007.

VII. CONCLUSIONS [9] B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson and H.


In this paper, two Denial of Service attacks are proposed Levkowetz. (2004, 12 July). Extensible Authentication
against EAP, and these are: EAP-NAK and EAP- Protocol (EAP). Available: http://tools.ietf.org/html/rfc3748
Notification flooding attacks. These attacks exploit the
[10] File2Air. (2010, 20 July). File2Air. Available:
5
Message Integrity Code (MIC) is a cryptographic hash of the http://www.willhackforsushi.com/File2air.html
packet. The MIC is used simultaneously to prevent tampering of
packets and to verily that the supplicant has the network key [11] Wireshark. (2010, 3 July). Available:
(Bock and Lynn, 2007). http://www.wireshark.org/

189
[12] FreeRADIUS. (2010, 3 July). Available: http://freeradius.org/

[13] Open1x. (2010, 3 Septemper). Available:


http://open1x.sourceforge.net/

[14] J. Mirkovic et al., "Measuring impact of DoS attacks," in


Proceedings of the DETER Community Workshop on Cyber
Security Experimentation, 2006.

[15] L. Phifer. (2006, 1 September). Fighting wireless DoS attacks.


Available:
http://searchnetworking.techtarget.com/generic/0,295582,sid7
_gci1169024,00.html

190

View publication stats

You might also like