Who is peeping at your passwords at Starbucks? — To catch an evil twin access point
- 1 June 2010
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- Vol. 52 (15300889) , 323-332
- https://doi.org/10.1109/dsn.2010.5544302
Abstract
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a wireless client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. For example, for traveling users who use wireless networks at airports, hotels, or cafes, they need to protect themselves from evil twin attacks (instead of relying on those wireless network providers, which typically may not provide strong security monitoring/management service). Thus, a lightweight and effective solution for these users is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target wireless networks, nor depend on the types of wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in wireless networks and to design new active, statistical and anomaly detection algorithms. Our preliminary evaluation in real-world widely deployed 802.11b and 802.11g wireless networks shows very promising results. We can identify evil twins with a very high detection rate while keeping a very low false positive rate.Keywords
This publication has 12 references indexed in Scilit:
- A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairsPublished by Association for Computing Machinery (ACM) ,2007
- Detecting 802.11 Wireless Hosts from Remote Passive ObservationsPublished by Springer Nature ,2007
- A Passive Approach to Wireless NIC IdentificationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Identifying 802.11 Traffic from Passive Measurements Using Iterative Bayesian InferencePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Rogue access point detection using temporal traffic characteristicsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Comments on IEEE 802.11 saturation throughput analysis with freezing of backoff countersIEEE Communications Letters, 2005
- An experimental study of throughput for UDP and VoIP traffic in IEEE 802.11b networksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- IEEE 802.11-saturation throughput analysisIEEE Communications Letters, 1998
- Wide-area Internet traffic patterns and characteristicsIEEE Network, 1997