A Review of Online Rogue Access Point Detection
نویسندگان
چکیده
A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator or has been created to allow a hacker to conduct a man-in-themiddle attack. In this paper, we propose two online algorithms to detect rogue access points using sequential hypothesis tests applied to packet-header data collected passively at a monitoring point. One algorithm requires training sets, while the other does not. Both algorithms extend our earlier TCP ACK-pair technique to differentiate wired and wireless LAN TCP traffic, and exploit the fundamental properties of the 802.11 CSMA/CA MAC protocol and the half duplex nature of wireless channels. Keywords—Rogue access point detection, Sequential hypothesis testing, TCP ACK-pairs.
منابع مشابه
Rogue Access Point Detection in WLAN by Analyzing Network Traffic and Behavior
One of the most challenging network security concerns for network administrators is the presence of rogue access points. Rogue access points, if undetected, can be an open door to sensitive information on the network. Many data raiders have taken advantage of the undetected rogue access points to view confidential information. In this paper, we present a rogue access point detection approach. I...
متن کاملRAPD Algorithm: Detection of Rogue Access Point in Wireless Network
The most challenging security concerns for IT industries today is the rogue wireless access point. Now a day’s IEEE 802.11 technologies continue to become more popular, less expensive, and easier for end users to install, the threat to corporate network security are increases rapidly. Most of the current approaches to detecting rogue APs are easily evaded by hackers. In Our paper, we proposed t...
متن کاملAgent based intrusion detection and response system for wireless LANs
Wireless LAN technology, despite the numerous advantages it has over competing technologies, has not seen widespread deployment. A primary reason for markets not adopting this technology is its failure to provide adequate security. Data that is sent over wireless links can be compromised with utmost ease. In this project, we propose a distributed agent based intrusion detection and response sys...
متن کاملDefending Against Vehicular Rogue AP
This paper considers vehicular rogue access points (APs) that rogue APs are set up in moving vehicles to mimic legitimate roadside APs to lure users to associate to them. Due to its mobility, a vehicular rogue AP is able to maintain a long connection with users. Thus, the adversary has more time to launch various attacks to steal users’ private information. We propose a practical detection sche...
متن کاملA Sophisticated Solution for Revealing Attacks on Wireless LAN
The development of the WPA and IEEE 802.11i standards have vastly improved the security of common wireless LAN setups. However, many installations still use the broken WEP protocol or even run with no security settings enabled. Furthermore, several threats are only partially addressed by the new security standards, e.g. rogue access points or denial of service. Specialised wireless intrusion de...
متن کامل