10.17028/rd.lboro.4746844.v1
Kostas Kyriakopoulos
Kostas
Kyriakopoulos
Francisco Aparicio-Navarro
Francisco
Aparicio-Navarro
Man-In-the-Middle, De-authentication and Rogue AP Attacks in 802.11 networks
Loughborough University
2017
network attacks
802.11
testbed
Cybersecurity
Computer networks
Signal Processing and Networks
Computer Communications Networks
Networking and Communications
Computer System Security
2017-03-21 09:05:26
Dataset
https://repository.lboro.ac.uk/articles/dataset/Man-In-the-Middle_De-authentication_and_Rogue_AP_Attacks_in_802_11_networks/4746844
<div>
<p>We would like to share the log files (pcap file, collected with airodump-ng) of
experiments conducted within the Networks team of the Signal Processing and Networks research group at Loughborough University. The
experiments involve a wireless client associated to an AP and an attacker launching
injection attacks (see more details below). The purpose of the experiments is to test our
multi-layer fusion ideas for detection of injection type of attacks. We decided to share the
data with the research community in an effort to help others test whether their
ideas/algorithms can detect the malicious frames and as a platform for comparing results.
Three main types of attacks have been launched using publicly available tools:<br></p><ul>1) Man-In-The-Middle at the Physical Layer attack - using Airpwn tool</ul><ul>2) De-authentication Attack Using Aircrack-ng</ul><ul>3) Rogue Access Point (AP) attack</ul><p></p><p><br></p><p>See attached description PDF file for further details.<br><br></p>
</div>