A Review of Online Rogue Access Point Detection

نویسندگان

  • K. Tejaswi
  • K. Bhavana
چکیده

A rogue access point is a wireless access point that has either been installed on a secure company network without explicit authorization from a local network administrator or has been created to allow a hacker to conduct a man-in-themiddle attack. In this paper, we propose two online algorithms to detect rogue access points using sequential hypothesis tests applied to packet-header data collected passively at a monitoring point. One algorithm requires training sets, while the other does not. Both algorithms extend our earlier TCP ACK-pair technique to differentiate wired and wireless LAN TCP traffic, and exploit the fundamental properties of the 802.11 CSMA/CA MAC protocol and the half duplex nature of wireless channels. Keywords—Rogue access point detection, Sequential hypothesis testing, TCP ACK-pairs.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rogue Access Point Detection in WLAN by Analyzing Network Traffic and Behavior

One of the most challenging network security concerns for network administrators is the presence of rogue access points. Rogue access points, if undetected, can be an open door to sensitive information on the network. Many data raiders have taken advantage of the undetected rogue access points to view confidential information. In this paper, we present a rogue access point detection approach. I...

متن کامل

RAPD Algorithm: Detection of Rogue Access Point in Wireless Network

The most challenging security concerns for IT industries today is the rogue wireless access point. Now a day’s IEEE 802.11 technologies continue to become more popular, less expensive, and easier for end users to install, the threat to corporate network security are increases rapidly. Most of the current approaches to detecting rogue APs are easily evaded by hackers. In Our paper, we proposed t...

متن کامل

Agent based intrusion detection and response system for wireless LANs

Wireless LAN technology, despite the numerous advantages it has over competing technologies, has not seen widespread deployment. A primary reason for markets not adopting this technology is its failure to provide adequate security. Data that is sent over wireless links can be compromised with utmost ease. In this project, we propose a distributed agent based intrusion detection and response sys...

متن کامل

Defending Against Vehicular Rogue AP

This paper considers vehicular rogue access points (APs) that rogue APs are set up in moving vehicles to mimic legitimate roadside APs to lure users to associate to them. Due to its mobility, a vehicular rogue AP is able to maintain a long connection with users. Thus, the adversary has more time to launch various attacks to steal users’ private information. We propose a practical detection sche...

متن کامل

A Sophisticated Solution for Revealing Attacks on Wireless LAN

The development of the WPA and IEEE 802.11i standards have vastly improved the security of common wireless LAN setups. However, many installations still use the broken WEP protocol or even run with no security settings enabled. Furthermore, several threats are only partially addressed by the new security standards, e.g. rogue access points or denial of service. Specialised wireless intrusion de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013