Frame resolution and physical layer (PHY) protocol type detection are the basis of research and development of intrusion prevention systems for IEEE 802.11 wireless network. Aiming at the problems which cannot be solved by the specifications export, this paper proposed a MAC frame analytical method and a PHY protocol type detection algorithm based on parsing the IEEE 802.11packets captured by the library Libpcap. The packet structure and the length of the frame preamble (18 or 26 bytes) are presented. Then the methods of transforming byte-order and resolving sub-fields are given. A detection algorithm of PHY protocol type is proposed based on the experiments and examples are given to verify these methods. This work can be a reference for the R & D related to link layer frame analysis.
References
[1]
Gan, Y. (2012) Analysis on Military Application Pro- spects and Development of WLAN. Communications Technology, 45, 1-9.
[2]
You, T. and Liu, J. (2010) Research on Application of Wireless Local Area Network in Smart Power Grid. Jilin Electric Power, 38, 20-23.
[3]
Lai, Y., Wang, C., Tong, W. and Wang, X. (2014) Research on the Key Technology and Main Issues of Power Wireless Communication Network. Electric Power Information and Communication Technology, 12, 10-14.
[4]
Cai, Z. (2012) Discussion on the Application of Wireless Network Technology in Substation. China New Technologies and Products, 4, 144.
[5]
Boland, H. and Mousavi, H. (2004) Security Issues of the IEEE 802.11b Wireless LAN. Electrical and Computer Engi-neering, 1, 333-336.
https://doi.org/10.1109/ccece.2004.1345023
[6]
Feng, P. (2012) Wireless LAN Security Issues and Solutions. The Proceedings of IEEE Symposium on Robotics and Applications (ISRA), Kuala Lumpur, 921-924.
https://doi.org/10.1109/isra.2012.6219343
[7]
Singh, P., Mishra, M. and Barwal, P.N. (2014) Analysis of Security Issues and Their Solutions in Wireless LAN. Information Communication and Embedded Systems (ICICES), Chennai, 1-6. https://doi.org/10.1109/icices.2014.7033871
[8]
Arockiam, L. and Vani, B. (2010) A Survey of Denial of Service Attacks and It’s Countermeasures on Wireless Network. International Journal on Computer Science and Engineering, 2, 1563-1571.
[9]
Wu, K., Zhang, W. and Zhu, W. (2011) A Study on the Application of Intrusion Detection Technology to WLAN. Communication Software and Networks (ICCSN), Xi’an, 344-346.
[10]
Overlay vs. Integrated Wireless Security—The Pros and Cons of Different Approaches to Wireless Intrusion Prevention. http://www.flukenetworks.com
[11]
IEEE Std 802.11-2007 (2007) IEEE Standard for Information Technology—Tele- communications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific Requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
[12]
IEEE Std 802.11-2012 (2012) IEEE Standard for Information Technology—Tele- communications and Information Exchange between Systems—Local and Metropolitan Area Networks—Specific Requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications.
[13]
Gast, M.S. (2005) 802.11 Wireless Networks: The Definitive Guide. O’Reilly Media.