Man-In-the-Middle, De-authentication and Rogue AP Attacks in 802.11 networks
Kostas Kyriakopoulos
Francisco Aparicio-Navarro
10.17028/rd.lboro.4746844.v1
https://repository.lboro.ac.uk/articles/dataset/Man-In-the-Middle_De-authentication_and_Rogue_AP_Attacks_in_802_11_networks/4746844
<div>
<p>We would like to share the log files (pcap file, collected with airodump-ng) of
experiments conducted within the Networks team of the Signal Processing and Networks research group at Loughborough University. The
experiments involve a wireless client associated to an AP and an attacker launching
injection attacks (see more details below). The purpose of the experiments is to test our
multi-layer fusion ideas for detection of injection type of attacks. We decided to share the
data with the research community in an effort to help others test whether their
ideas/algorithms can detect the malicious frames and as a platform for comparing results.
Three main types of attacks have been launched using publicly available tools:<br></p><ul>1) Man-In-The-Middle at the Physical Layer attack - using Airpwn tool</ul><ul>2) De-authentication Attack Using Aircrack-ng</ul><ul>3) Rogue Access Point (AP) attack</ul><p></p><p><br></p><p>See attached description PDF file for further details.<br><br></p>
</div>
2017-03-21 09:05:26
network attacks
802.11
testbed
Cybersecurity
Computer networks
Signal Processing and Networks
Computer Communications Networks
Networking and Communications
Computer System Security