Detecting Beacon Frame Spoofing in Wi-Fi
Detecting Beacon Frame Spoofing in Wi-Fi
net/publication/4339361
CITATIONS READS
27 3,649
7 authors, including:
All content following this page was uploaded by Urko Zurutuza on 15 May 2014.
Abstract—A great variety of well-known attacks exist for the possible [1]–[3]. 802.11i and 802.1X standards have mitigated
IEEE 802.11 protocol. The lack of mechanisms for management the effects of this problem but not all the possible attacks
frame authentication and the complexity of the protocol itself have been tackled and even worse, new ones have arisen [4].
have derived into a considerable number of denial of service and
identity spoofing attacks. As most denial of service attacks are Therefore it is necessary to develop techniques that will allow
based on spoofing of MAC addresses, spoofed frame detection us to detect DoS attacks in 802.11 networks. Most of these
schemes have gained attentions. Currently the most efficient attacks impersonate MAC frames, thus the detection of such
techniques to detect this kind of attacks are based on the creation impersonation could lead us to the detection of a great variety
of profiles for the wireless nodes and behavior based protocol of attacks.
anomaly detection. However, these techniques tend to generate
too many of false positives. This is caused by the unstable nature In this work we propose a new technique to detect the
of the wireless medium and also because of the difficulty to model falsification of management frames in IEEE 802.11 protocol.
the behaviour of the diverse implementations from different More precisely, we give details about how to detect beacon
manufacturers. One way to reduce false positives is to combine frame falsification. These frames are responsible of distribut-
different techniques to carry out the analysis. We propose a novel
method that identifies the impersonation of certain management ing critical information in an 802.11 network. We propose an
frames, which helps to reduce the number of false positives within algorithm that identifies each false beacon frame in order to
other existing MAC spoofing detection techniques. detect DoS attacks in a passive mode. The article contributes
Index Terms—802.11 MAC address spoofing, false positive as follows:
reduction, synchronisation attack detection, wireless intrusion
• We describe beacon frame based attacks.
I. I NTRODUCTION • We develop a method for a false positive-free, single false
beacon frame detection.
Wireless networks have gained much popularity lately, to
• We show experimental results, analysis and a benchmark
such an extent that we can find them in almost any aspect of
of our system implementation compared with a known
our daily life. Mobile phones, PDAs and computers are some
IEEE 802.11 based intrusion detection system.
evident examples. The most popular implementation for local
area networks is the standard IEEE 802.11, also known as Wi- The rest of the document is organised as follows: Sec-
Fi. As Wi-Fi networks proliferated, the security flaws of the tion II gives an overview of MAC address spoofing detection
protocol became notorious. techniques. It focuses on the strong and weak points of each
Management frames carry out critical tasks in those net- technique. Section III-A describes DoS attacks based on de-
works, but unfortunately these frames are not authenticated. synchronisation of nodes. These attacks are carried out by the
This is probably the most important weakness of the protocol. impersonation of beacon frames. A method to detect these
As a consequence, several denial of service (DoS) attacks are spoofed frames is proposed in section IV. After a theoretical
description of our detection method, section V shows the field consists on a counter of the time (in microseconds) that
results of experimental tests over two different scenarios. the access point is active. For example, if the BSSTimestamp
Finally, conclusions extracted from the experimental work are does not increase with time, the value will not be coherent
detailed and summarised in section VI. and an anomaly will be detected. In practice, modeling the
behaviour of a 802.11 network is not a simple task. The
II. R ELATED WORK
unstable nature of the wireless medium and the different
Despite the existence of diverse methods to detect the MAC implementations of the protocol in network cards [6] cre-
frame spoofing in 802.11, widely all of them can be classified ate important deviations between the behaviour of different
into two categories: protocol anomaly detection and anomaly networks [10], [11]. Nevertheless, although getting a general
detection based in the individual characteristics of 802.11 model for every attack seems impossible, sufficiently reliable
nodes. and useful patterns can be obtained.
Techniques belonging to the first category try to model and The creation of profiles with the characteristics of wireless
understand the normal behaviour of a 802.11 network. After nodes is an alternative to protocol modelling. These profiles
modeling this behaviour, the network is monitored looking for are created using measurable attributes of each wireless node.
patterns that do not fit into this model. One of the most popular Characteristics such as hardware [12], [13], software [14]
techniques within this category uses sequence number analysis and firmware [15], [16] fingerprints analysing the behaviour
of 802.11 frames. This number acts as a sequence number of the node could be included. Also attributes referring to
identifier of the frames transmitted from a node. In this sense the physical position of the node can be used. In [17], [18]
Joshua Wright proposes in [5] the use of this sequence number the delay in the transmission of fixed length frames and the
field in the frame. This is a very simple technique that uses a fluctuation of the power in the received signal is used to
threshold representing the maximum difference between each univocally identify each node. More simply, in [19]–[21] the
sequence number. The main disadvantage of this approach is validity of the physical addresses of MAC frames is verified.
the amount of false positives generated. This happens because Unfortunately this will only detect the spoofing of non-existent
the theoretical model on which it is based does not properly nodes and it would be very simple to overcome by generating
fit the real operation of a 802.11 network [6]. Nevertheless valid addresses and thus remain undetected.
this technique has been implemented in some free intrusion
detection tools such as Snort-Wireless1 , WIDZ2 or Garuda3 .
On the other hand, Fanglu Guo et al. [7] model the behaviour III. BEACON BASED ATTACKS
of the sequence field using an empirical method that takes
measures in a 802.11 network for a given time. Although this A. Synchronization attacks
method achieves a more realistic model, it can vary on for
different devices [2], [6] or situations other than those used A beacon frame is used for several functions. To synchronise
when taking the measures. the clocks of the nodes and to announce the existence of the
Also making use of the sequence number field, Dasgupta network as well as to transmit some necessary configuration
et al. [8] propose more precisely fuzzy logic techniques, to parameters to join it [22]. Other important functions of beacon
obtain more flexible patterns with a lower false positive rate. frames are related to the maintenance of the network. Beacon
However, results obtained on tests have not been very encour- frames are transmitted at regular intervals to allow the nodes
aging. LaRoche et al. [9] use machine-learning techniques to find and identify a network. Every wireless network needs a
model the behaviour of the protocol and reduce the number of coordinator in charge of transmitting beacon frames.
false positives. Genetic algorithms are used in this work but 1) Power Saving Mode Attack: PSM allows nodes to save
the false positive ratio obtained does not offer a significant energy while they are waiting for the channel to be available
improvement. for transmission. For example, one node will go to a power
Still within protocol anomaly detection, indirect detection save mode for a period specified by the access point. During
is another approach to detect spoofed frames. Bellardo et this idle time, the access point will buffer the packets destined
al. describe an heuristic technique to detect de-authentication to that node and they will be sent to it when it wakes up. If
attacks in [2]. This kind of attack performs MAC address for any reason, the node wakes up at any other time than
spoofing and therefore the attack can be detected indirectly. that expected by the access point due to desynchronization
Kismet4 is a well-known 802.11 network scanner that caused by spoofed beacon frames, it may loose the buffered
includes intrusion detection features. It is able to model the information. As a result, the victim node can suffer a reduction
behaviour of beacon frames and the detection of spoofed in its capacity for transmitting [3].
frames is based on the coherence of the BSSTimestamp field. 2) PCF attack: In a PCF (Point Coordination Function)
This approach has obtained good results so far. BSSTimestamp mode, the access point serves as a network referee. It provides
1 http://www.snort-wireless.org/
the priority mechanisms for the devices. An attacker could
2 http://www.loud-fat-bloke.co.uk/tools.html spoof beacon frames using false clock values. Those values
3 http://sourceforge.net/projects/garuda/ would produce a maladjustment in the contention periods of
4 http://www.kismetwireless.net/ the stations, causing a DoS [3].
B. 802.11i attacks
The 802.11i standard is also propitious to suffering from
attacks by means of the information contained in the beacon
frames, as described in [23]. A manipulation of the element
of network information of robust security specified in 802.11i
will produce a DoS in the client node, keeping it from joining
the network. If, for some reason, incoherence is detected in
the security method chosen, the network joining process is
aborted. This incoherence can be caused by an attacker who
forges a beacon frame.
The rollback attack also exists, which tries to supplant ne-
gotiated values by the station by weaker encryption methods. Fig. 1. Network diagram of test scenarios.
[24] describe how to use the policies to detect this type of
attacks, but it is not possible to detect the poisoning attack
due to the fact that it modifies some bits that are insignificant
can be considered as malicious. Nevertheless, exceptions for
and variable, causing the DoS without influencing the bits in
this behaviour exist. If a network is congested, the access
charge of encryption or authentication.
point may delay the transmission of the beacon frame. This
C. False Information attacks behaviour is not specified in the standard and using smaller
As previously described attacks do, false information attacks beacon frame periods could be considered as a Hardware error,
transmit manipulated values in the fields necessary for the since an incorrect synchronisation may cause failure of some
stations to connect to the network. An example of this type services. Therefore, the proposed technique is based on the
of attack can be found in the WVE-2006-00505 wireless monitoring of time intervals between beacon frames. In this
vulnerability database. The information field provides the work, we measure this value for each beacon frame transmitted
number of the channels used by the network. If beacon frames and we define a variable called Delta which represents the
are falsified using a wrong channel number, stations will not time gap between two consecutive beacon frames. If Delta is
be able to join the network. smaller than a defined threshold, they will be considered as
anomalous.
IV. P ROPOSED DETECTION METHOD
V. E XPERIMENTAL RESULTS
The simplest way to detect most of the spoofed traffic is To test the validity of the new method proposed in sec-
to modify the firmware of the access points and 802.11 cards tion IV, the intrusion detection system for Wi-Fi networks
in order to log the transmitted data. Knowing which frames Snort-Wireless has been modified. To measure the interval
have been transmitted helps to detect others that do not belong between beacon frames, the MACTime field of Prism [25]
to the device even if they have the same physical address. headers has been used. This field informs about the moment,
This technique is very useful in infrastructure networks as in microseconds, when the wireless card received and stored
the management frames are centralised in the access point. the beacon frame. A more precise measure can be obtained as
However, certain limitations exist in the market. On the one a result rather than simply analysing the time at the host. Two
hand, the technique needs hardware with special firmware. different scenarios have been created to complete the tests.
On the other hand, it has to be taken into account that a lot This was because in practise the beacon frame intervals vary
of hardware without spoofing detection functionality already depending on the network traffic. The tests in the scenario of
exist. External monitoring methods can help to overcome this section V-B were made under low traffic conditions and the
necessity. They should be passive methods because of the lack traffic was incremented for the scenario of section V-C.
of bandwidth that characterises wireless networks.
The technique proposed in this work detects beacon frames A. Network configuration
that have been spoofed in an infrastructure 802.11 network. Figure 1 shows the network configuration used during the
This is a passive technique that does not need a modification of experiments. There are two nodes with Senao 802.11g wireless
the firmware of the existing hardware. We have implemented cards generating traffic and a Linksys WRT54G access point
it in a dedicated monitoring sensor. Spoofing of beacon frames operating in dual mode 802.11 b/g. The wireless sensor is
can cause denial of service attacks as the ones mentioned in located very close to the access point so the measurement of
section III-A. frame transmission times is very precise. The access point was
As said before beacon frames must be transmitted at regular configured with an interval between transmitted beacon frames
intervals. This interval is specified by the access point and of 102.4 ms.
it is announced to the rest of the nodes in the ”beacon
B. Scenario I
interval” field. If a frame does not satisfy this condition, it
In this first scenario, nodes generate moderate traffic by
5 http://www.wirelessve.org/entries/show/WVE-2006-0050 making Internet requests and SSH connexions. The attack was
(a) (b) (a)
Threshold FP FN Threshold FP FN Delta max. 204.808 ms
1% 5 0 1% 118 0 Delta min. 875.06 ms
2% 0 0 2% 4 0 Delta mean 102.451 ms
3% 0 0 3% 2 0 Delta variation 0.05%
6% 0 0 4% 1 0
(b)
10% 0 0 5% 1 0
6% 0 0 Attack frame number 501
Attack frame loss 2
Delta min. 0.804 ms
TABLE I
FALSE POSITIVES AND NEGATIVES , A ) IN A LOW TRAFFIC NETWORK Delta max. 109.376 ms
DURING AN ATTACK B ) IN A HIGH TRAFFIC NETWORK DURING AN ATTACK
Delta mean 88.917 ms
Delta variation 13.16%
TABLE II
D ELTA TIME STATISTICS IN A LOW TRAFFIC NETWORK . ( A ) D URING THE
NORMAL OPERATION . ( B ) D URING AN ATTACK .
(a)
Delta max. 206.220 ms
Delta min. 96.639 ms
Delta mean 102.524 ms
Delta variation 0.122%
(b)
Attack frame number 501
Attack frame loss 29
Delta min. 0.826 ms
Delta max. 203.909 ms
(a) Delta mean 89.615 ms
Delta variation 12.48%
TABLE III
D ELTA TIME STATISTICS IN A HIGH TRAFFIC NETWORK . ( A ) D URING THE
NORMAL OPERATION . ( B ) D URING AN ATTACK .
TABLE IV
S NORT-W IRELESS ALERT RESULTS ( A ) D URING ATTACK WITH LOW
TRAFFIC . ( B ) D URING AN ATTACK WITH HIGH TRAFFIC .