Arunadevi R Journal of Engineering Research and Application www.ijera.com ISSN : 2248-9622, Vol. 8, Issue 8 (Part -III) Aug 2018, pp 51-55 www.ijera.com DOI: 10.9790/9622-0808035155 51 | Page Experimentation Of Denial Of Service Attack In Wireless Local Area Infrastructure Network Using Loic Tool Arunadevi R Assistant Professor, Department of Computer Science, Vidhya Sagar Women's College, Chengalpattu ABSTRACT Denial of Service attack (DoS) is a major issue prevailing in wireless local area infrastructure network. It occurs by spoofing Medium Access Control (MAC). In past, a person who skilled in technology only can exploit attacks. But now, tiny knowledge is enough to hack the network. Any person can launch DoS attacks and becomes hacker easily by downloading hacking tools from the internet. To launch DoS attacks, there are numbers of open source tools available which leads to increase the number of hackers. One of the well known open source tool for making DoS attack is LOIC (Low Orbit Ion Cannon). This paper presents an experimentation of DoS attack using LOIC tool. The performance of LOIC tool measured using wireshark which is a protocol analyzer. Finally, the performance of DoS attack under LOIC is analyzed with graph. Keywords - DoS attack, LOIC, Wireshark, MAC address, wireless network. --------------------------------------------------------------------------------------------------------------------------------------- DATE OF SUBMISSION:17-08-2018 DATE OF ACCEPTANCE: 31-08-2018 --------------------------------------------------------------------------------------------------------------------------------------------------- I. INTRODUCTION As wireless network popularity increases, the risk of security attacks increases as well. DoS attack is one of the most common types of security threats against wireless network. There are number of attacks possible in WLAN. But many people are not aware about the Denial of Service attack. Wireless network are more vulnerable to DoS attacks. Most link layer attacks in WLANs are denial of service attacks and work by spoofing either access points (APs) or wireless stations. Sending a continuous stream of forgery frames by an attacker can easily flow down the network so that the network cannot be available for its authenticated clients. 802.1x is a security protocol based on the frame structure of 802.11. It attempts to provide strong authentication, access control, and WEP key management for Wireless LANs. Unfortunately, 802.1x misses its goals in Denial of Service (DoS) attacks. At present, there are no IEEE official ways to resolve the security hole. Wireless Local Area Networks (WLAN) are popular due to easy installation and it offers increased wireless access to the client with the help of Access Point (AP). WLAN or Wi-Fi is divided into three main parts such as infrastructure mode, adhoc mode and mixed mode. WLAN are designed by attaching a device referred to as AP to the sting of the wired network. Infrastructure local area network consists of AP and wireless stations. Access Point combined with the distributed system. The AP is not only gives communications with the wired network however additionally mediate wireless network traffic within the immediate neighborhood. In infrastructure network, there is no operation can be takes place without Access Point. Infrastructure network do not have firewall to protect the entire network. Physical protection of wired medium such as firewalls and shields cannot be applied to wireless networks. This paves the way for the intruders to easily enter into the network and do malicious harm to the network. The effect of the DoS attack is extremely dangerous. In recent days, small scale and mid level industries and Government websites are significantly at risk of DoS attack, inflicting a major social impact[1]. Microsoft, EBay, Amazon [2], Buy.com, Capital one bank, SunTrust bank and online artificial Jewelry sites have become a victim for Dos attack. Recent survey says, In 8 th October 2012, Capital one and SunTrust banks have become the targets of the attackers in U.S. These sites have suffered an eight hours attack [3, 4]. Due to this, Capital one website is frequently unreachable for eight hours. In 3rd July 2013, an online artificial jewelry was a victim of DoS attack. Under DoS attack, a system starts running terribly slow and also the user is unable to access the targeted website or the site is shown as inaccessible. There may even be a windfall of spam mails [4]. The above reports shows that protecting the network from the DoS attack is an important issue. This research concentrated on DoS in wireless local area infrastructure network. In this paper section II presents the background review and related work which are important for the understanding of the paper. Section III explains about the prevention mechanisms presented in wireless infrastructure network. Section IV presents RESEARCH ARTICLE OPEN ACCESS