RIPPS
- 1 March 2008
- journal article
- research article
- Published by Association for Computing Machinery (ACM) in ACM Transactions on Information and System Security
- Vol. 11 (2) , 1-23
- https://doi.org/10.1145/1330332.1330334
Abstract
Wireless network access has become an integral part of computing both at home and at the workplace. The convenience of wireless network access at work may be extremely beneficial to employees, but can be a burden to network security personnel. This burden is magnified by the threat of inexpensive wireless access points being installed in a network without the knowledge of network administrators. These devices, termed Rogue Wireless Access Points, may allow a malicious outsider to access valuable network resources, including confidential communication and other stored data. For this reason, wireless connectivity detection is an essential capability, but remains a difficult problem. We present a method of detecting wireless hosts using a local RTT metric and a novel packet payload slicing technique. The local RTT metric provides the means to identify physical transmission media while packet payload slicing conditions network traffic to enhance the accuracy of the detections. Most importantly, the packet payload slicing method is transparent to both clients and servers and does not require direct communication between the monitoring system and monitored hosts.Keywords
Funding Information
- Division of Computer and Network Systems (CNS03-47392)
This publication has 11 references indexed in Scilit:
- Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairsPublished by Association for Computing Machinery (ACM) ,2007
- Work in Progress: Bro-LAN Pervasive Network Inspection and Control for LAN TrafficPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Sequence Number-Based MAC Address Spoof DetectionPublished by Springer Nature ,2006
- Classification of access network types: ethernet, wireless LAN, ADSL, cable modem or dialup?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Rogue access point detection using temporal traffic characteristicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networksPublished by Association for Computing Machinery (ACM) ,2004
- Agent based intrusion detection and response system for wireless LANsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- A technique for counting natted hostsPublished by Association for Computing Machinery (ACM) ,2002
- Fuzzy Reasoning for Wireless AwarenessInternational Journal of Wireless Information Networks, 2001
- Improving round-trip time estimates in reliable transport protocolsACM Transactions on Computer Systems, 1991