A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks
- 1 April 2008
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- No. 0743166X,p. 1220-1228
- https://doi.org/10.1109/infocom.2008.178
Abstract
We develop a practical and comprehensive hybrid rogue access point (AP) detection framework for commodity Wi- Fi networks. It is the first scheme that combines the distributed wireless media surveillance and the centralized wired end socket level traffic "fingerprinting" The former is designed not only to detect various types of rogue APs, but also to discover suspicious activities so as to prevent the adversaries from turning victim APs into rogue devices. Moreover, the socket level traffic fingerprinting helps our frame work to achieve a finer granularity on rogue AP detection among the existing schemes. This framework has the following nice properties: i) it requires neither specialized hardware nor modification to existing standards; ii) the proposed mechanism greatly improves the rogue AP detection probability so that network resilience is improved; iii) it provides a cost-effective solution to Wi-Fi network security enhancement by incorporating free but mature software tools; iv) it can protect the network from adversaries capable of using customized equipment and/or violating the IEEE 802.11 standard; v) its open architecture allows extra features to be easily added on in the future. Our analysis and evaluation demonstrate that this hybrid rogue AP protection framework is capable of reliably revealing rogue devices and preempting potential attacks.Keywords
This publication has 15 references indexed in Scilit:
- Passive Classification of Wireless NICs during Rate SwitchingEURASIP Journal on Wireless Communications and Networking, 2007
- Passive Listening and Intrusion Management in Commodity Wi-Fi NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairsPublished by Association for Computing Machinery (ACM) ,2007
- Rogue Access Point Detection by Analyzing Network Traffic CharacteristicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- 802.11 user fingerprintingPublished by Association for Computing Machinery (ACM) ,2007
- Robust location distinction using temporal link signaturesPublished by Association for Computing Machinery (ACM) ,2007
- Internet traffic classification using bayesian analysis techniquesACM SIGMETRICS Performance Evaluation Review, 2005
- Rogue access point detection using temporal traffic characteristicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A framework for wireless LAN monitoring and its applicationsPublished by Association for Computing Machinery (ACM) ,2004
- Agent based intrusion detection and response system for wireless LANsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004