Detecting and Blocking Unauthorized Access in Wi-Fi Networks
نویسندگان
چکیده
Academic and commercial 802.11 hotspots often use an SSLsecured captive portal to authenticate clients. Captive portals provide good usability and interoperability, but poor security. After a captive portal has authenticated a client, session hijacking and freeloading allow attackers to capture or use the client’s session. Freeloading does not require special tools and, surprisingly, is strengthened by the (widely recommended) use of personal firewalls. We propose and evaluate novel defenses against these attacks, session id checking and MAC sequence number tracking, both of which are transparent to clients and do not require changes in client computers. Experiments demonstrate that the proposed defenses are effective against the mentioned attacks and have little overhead.
منابع مشابه
Weighted Feature Selection Techniques for Detecting Impersonation Attack in Wi-Fi Networks
As Internet-of-Things (IoT) devices enable pervasive computing in our daily lives, more and more devices are connected to Wi-Fi networks. The public access to Wi-Fi network leads to exploitable vulnerabilities that can be inverted as attacks. Impersonation attack is an active malicious action where unauthorized users masquerade themself as authorized to gain privileges. Detecting impersonation ...
متن کاملAn Android Powered Wi-Fi Network
Computer networks are used for the easy sharing of data and resources within a closed user group. These networks find use in a plethora of scenarios. This paper describes an App in Android which enables the android devices in a particular Wi-Fi network to join a private wireless network such as an office. Users entitled to use this particular app can share messages and data without using any pa...
متن کاملThe Ethical Issues Surrounding Wi-Fi
Introduction In examining wireless-internet technologies (Wi-Fi), several ethical issues are exposed. While the unauthorized use of Wi-Fi is illegal in a few select cases, what is considered permissible still varies from state to state. What does not vary, however, is the fact that individuals are going to great lengths to locate unsecured wireless access points whether it is for their own bene...
متن کاملDetection and Prevention against Evil Twin Attack in Wlan
Wireless technology has developed a significant part of communication and for the data transmission. Wireless LAN effectively fulfills the necessities within buildings and campus environments. Emerging security measures for the WLAN is a foremost issue when compared to the security features of LAN. Wireless access points mainly fall into three categories: minor business and home networks, enter...
متن کاملThe Peer-to-Peer Wireless Network Confederation: Enabling Global Wi-Fi Roaming
Belonging to the same family of standards as Ethernet, it was nicknamed 'Wireless Ethernet' and was considered an appropriate networking technology for offices because it did not rely on cables. Although burdened by inherent insecurity (Fluhrer, 2001) and low bit rates compared to its wired equivalent, IEEE 802.11 was a success. The cost of manufacturing 802.11 chipsets fell quickly and 802.11 ...
متن کامل