IEEE 802.11 wireless networks are one of the fastest growing network technologies. The users only need to have a mobile device with a wireless network adapter that negotiates with an access point or base station. Once authenticated and associated, the user can seamlessly roam within the coverage area of the access point without losing data or network connection. On the down side, these networks have fuzzy boundaries, making it easy for an attacker to capture the transmitted packets. Also they can send massive volume of illegitimate traffic and utilize system resources in a way that renders the system inoperable, thus denying access to authorized users.