Clear channel assessment attack
A clear channel assessment attack or Queensland attack is a physical layer DoS attack against Wi-Fi networks. The attack focuses the need of a wireless network to receive the "clear channel assessment"; which is a function within CSMA/CA to determine whether the wireless medium is ready and able to receive data, so that the transmitter may start sending it. The attack makes it appear that the airwaves are busy, which basically puts the entire system on hold.
The attack works only on 802.11b, and is not effective on the OFDM-based protocols 802.11g and 802.11a. However, some hybrid 802.11b/g access points will hinder the 802.11g network when the 802.11b network is attacked.[1]
Discovery
The attack was originally discovered by researchers at Queensland University of Technology's Information Security Research Center,[2] thus it is where the name Queensland attack comes from.
In practice
The signal telling the system the airwaves are busy is of course sent through the attacker's NIC, by placing it in continuous transmit mode. The attack can be set up through the use of the Intersil's Prism Test Utility (PrismTestUtil322.exe).
References
- ↑ Bo Chen, Vallipuram Muthukkumarasamy. "Denial of Service Attacks Against 802.11 DCF". Griffith University. http://www98.griffith.edu.au/dspace/bitstream/10072/12207/1/41331.pdf.
- ↑ "AusCERT Advisory: Denial of Service Vulnerability in IEEE 802.11 Wireless Devices". AusCERT. http://www.auscert.org.au/render.html?it=4091.
Original source: https://en.wikipedia.org/wiki/Clear channel assessment attack.
Read more |