Man-In-the-Middle, De-authentication and Rogue AP Attacks in 802.11 networks Kostas Kyriakopoulos Francisco Aparicio-Navarro 10.17028/rd.lboro.4746844.v1 https://repository.lboro.ac.uk/articles/dataset/Man-In-the-Middle_De-authentication_and_Rogue_AP_Attacks_in_802_11_networks/4746844 <div> <p>We would like to share the log files (pcap file, collected with airodump-ng) of experiments conducted within the Networks team of the Signal Processing and Networks research group at Loughborough University. The experiments involve a wireless client associated to an AP and an attacker launching injection attacks (see more details below). The purpose of the experiments is to test our multi-layer fusion ideas for detection of injection type of attacks. We decided to share the data with the research community in an effort to help others test whether their ideas/algorithms can detect the malicious frames and as a platform for comparing results. Three main types of attacks have been launched using publicly available tools:<br></p><ul>1) Man-In-The-Middle at the Physical Layer attack - using Airpwn tool</ul><ul>2) De-authentication Attack Using Aircrack-ng</ul><ul>3) Rogue Access Point (AP) attack</ul><p></p><p><br></p><p>See attached description PDF file for further details.<br><br></p> </div> 2017-03-21 09:05:26 network attacks 802.11 testbed Cybersecurity Computer networks Signal Processing and Networks Computer Communications Networks Networking and Communications Computer System Security