With the advent of new IEEE 802.11ax (WiFi 6) devices, enabling security is a priority. Since previous versions were found to have security vulnerabilities, to fix the most common security flaws, the WiFi Protected Access 3 (WPA3) got introduced. Although WPA3 is an improvement over its predecessor in terms of security, recently it was found that WPA3 has a few security vulnerabilities as well. In this paper, we have mentioned the previously known vulnerabilities in WPA3 and WPA2. In addition to that, we have created our own dataset based on WPA3 attacks (Section III). We have proposed a two-stage solution for the detection of an intrusion in the network. The two-stage approach will help ease computational processing burden of an AP and WLAN Controller. First, AP will perform a lightweight simple operation for some duration (say 500ms) at certain time interval. Upon discovering any abnormality in the flow of traffic an ML-based solution at the controller will detect the type of attack. Our approach is to utilize resources on AP as well as the back-end controller with certain level of optimization. We have achieved over 99% accuracy in attack detection using an ML-based solution. We have also publicly provided our code and dataset for the open-source research community, so that it can contribute for future research work.
翻译:随着新的 IEEE 802.11ax (WiFi 6) 装置的出现,使安全成为优先事项。自前几个版本发现存在安全弱点,以弥补最常见的安全缺陷以来,引入了无线保护3号(WPA3),尽管WPA3在安全方面比其前身有所改进,但最近发现WPA3在安全方面也有一些弱点。在本文件中,我们提到WPA3 和 WPA2 中的已知弱点。此外,我们还根据WPA3 攻击建立了我们自己的数据集(第三节)。我们提出了发现网络入侵的两阶段解决办法。两阶段办法将有助于减轻AP和WLAN主计长的计算处理负担。首先,AP3在一定时间间隔内将执行一个较轻的简单操作(比如500米)。在发现交通流量中存在任何异常情况后,控制器的ML解决方案将检测攻击类型。我们的做法是利用AP 资源以及后端控制器,以某种程度的优化。我们已经在99%以上的社区研究中实现了一个公开的精确度研究,我们用M-smainal work for the rodicial rodition for the sal roduction for the sal resubal resubal roduction roducal roduction roduction roducal roducal roducal roduction roduction.