10.17028/rd.lboro.4746844.v1 Kostas Kyriakopoulos Kostas Kyriakopoulos Francisco Aparicio-Navarro Francisco Aparicio-Navarro Man-In-the-Middle, De-authentication and Rogue AP Attacks in 802.11 networks Loughborough University 2017 network attacks 802.11 testbed Cybersecurity Computer networks Signal Processing and Networks Computer Communications Networks Networking and Communications Computer System Security 2017-03-21 09:05:26 Dataset https://repository.lboro.ac.uk/articles/dataset/Man-In-the-Middle_De-authentication_and_Rogue_AP_Attacks_in_802_11_networks/4746844 <div> <p>We would like to share the log files (pcap file, collected with airodump-ng) of experiments conducted within the Networks team of the Signal Processing and Networks research group at Loughborough University. The experiments involve a wireless client associated to an AP and an attacker launching injection attacks (see more details below). The purpose of the experiments is to test our multi-layer fusion ideas for detection of injection type of attacks. We decided to share the data with the research community in an effort to help others test whether their ideas/algorithms can detect the malicious frames and as a platform for comparing results. Three main types of attacks have been launched using publicly available tools:<br></p><ul>1) Man-In-The-Middle at the Physical Layer attack - using Airpwn tool</ul><ul>2) De-authentication Attack Using Aircrack-ng</ul><ul>3) Rogue Access Point (AP) attack</ul><p></p><p><br></p><p>See attached description PDF file for further details.<br><br></p> </div>