METDS - A Self-contained, Context-Based Detection System for Evil Twin Access Points

نویسندگان

  • Christian Szongott
  • Michael Brenner
  • Matthew Smith
چکیده

Mobile Evil Twin attacks stem from the missing authentication of open WiFi access points. Attackers can trick users into connecting to their malicious networks and thereby gain the capability to mount further attacks. Although some recognition and prevention techniques have been proposed, they have been impractical and thus have not seen any adoption. To quantify the scale of the threat of evil twin attacks we performed a field study with 92 participants to collect their WiFi usage patterns. With this data we show how many of our participants are potentially open to the evil twin attack. We also used the data to develop and optimize a context-based recognition algorithm, that can help mitigate such attacks. While it cannot prevent the attacks entirely it gives users the chance to detect them, raises the amount of effort for the attacker to execute such attacks and also significantly reduces the amount of vulnerable users which can be targeted by a single attack. Using simulations on real-world data, we evaluate our proposed recognition system and measure the impact on both users and attackers. Unlike most other approaches to counter evil twin attacks our system can be deployed autonomously and does not require any infrastructure changes and offers the full benefit of the system to early adopters.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection and Prevention against Evil Twin Attack in Wlan

Wireless technology has developed a significant part of communication and for the data transmission. Wireless LAN effectively fulfills the necessities within buildings and campus environments. Emerging security measures for the WLAN is a foremost issue when compared to the security features of LAN. Wireless access points mainly fall into three categories: minor business and home networks, enter...

متن کامل

Who is peeping at your passwords at Starbucks? - To catch an evil twin access point

In this paper, we consider the problem of “evil twin” attacks in wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on wireless communications of users’ Internet access. Existing evil twin detection solutions are mostly for wireles...

متن کامل

Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

Evil-Twin is becoming a common attack in smart home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-Twin attacks all rely on information such as SSIDs, theMAC address of the genuine AP, or network traffic patterns. However, such information can be faked by the attacker, of...

متن کامل

Detecting Evil-twin Attacks in Smart Homes Using The Received Signal Strength Indicator

Evil-twin is a common attack in WIFI environments, with which an attacker can set up a fake AP to steal sensitive information from the connected devices. The current approaches of detecting Evil-twin AP use some identities or fingerprints (such as SSIDs, MAC address and network traffic patterns) to verify the identify of the AP. However, such information can be easily obtained and faked by the ...

متن کامل

6 Wireless Threats to Your Business

If you think a promiscuous client is a scantily-dressed customer, you're in trouble. And I'm not talking about having an affair. Think an evil twin is a horror-movie villain? Wrong again. The horror you should be bracing yourself for is not on the silver screen — and it's not from a rolling pin flung at you from across the kitchen, for that matter. Rather, the trouble is in the airwaves and tar...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015