Alotaibi et al., 2015 - Google Patents
An empirical fingerprint framework to detect rogue access pointsAlotaibi et al., 2015
View PDF- Document ID
- 4424111351765351779
- Author
- Alotaibi B
- Elleithy K
- Publication year
- Publication venue
- 2015 Long Island Systems, Applications and Technology
External Links
Snippet
The aim of this paper is to detect Rogue Access Points (RAPs) that clone some of the characteristics of nearby legitimate Access Points (APs). A new passive approach that takes advantage of the first frame that the RAP sends (ie, Beacon Frame (BF)) when it is planted in …
- 238000001514 detection method 0 abstract description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shrivastava et al. | EvilScout: Detection and mitigation of evil twin attack in SDN enabled WiFi | |
Ma et al. | A hybrid rogue access point protection framework for commodity Wi-Fi networks | |
US7970894B1 (en) | Method and system for monitoring of wireless devices in local area computer networks | |
Alotaibi et al. | Rogue access point detection: Taxonomy, challenges, and future directions | |
US7216365B2 (en) | Automated sniffer apparatus and method for wireless local area network security | |
Hwang et al. | A study on MITM (Man in the Middle) vulnerability in wireless network using 802.1 X and EAP | |
US9003527B2 (en) | Automated method and system for monitoring local area computer networks for unauthorized wireless access | |
US8638762B2 (en) | System and method for network integrity | |
Nikbakhsh et al. | A novel approach for rogue access point detection on the client-side | |
US7971253B1 (en) | Method and system for detecting address rotation and related events in communication networks | |
US20150040194A1 (en) | Monitoring of smart mobile devices in the wireless access networks | |
Nakhila et al. | User-side wi-fi evil twin attack detection using random wireless channel monitoring | |
Thankappan et al. | A signature-based wireless intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks | |
Alotaibi et al. | An empirical fingerprint framework to detect rogue access points | |
Nakhila et al. | Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients | |
Alotaibi et al. | A passive fingerprint technique to detect fake access points | |
Anmulwar et al. | Rogue access point detection methods: A review | |
Kitisriworapan et al. | Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis | |
US20080263660A1 (en) | Method, Device and Program for Detection of Address Spoofing in a Wireless Network | |
Hafiz et al. | Profiling and mitigating brute force attack in home wireless LAN | |
Lu et al. | Client-side evil twin attacks detection using statistical characteristics of 802.11 data frames | |
Letsoalo et al. | Survey of Media Access Control address spoofing attacks detection and prevention techniques in wireless networks | |
Ahmad et al. | A RSSI-based rogue access point detection framework for Wi-Fi hotspots | |
Lackner et al. | Combating wireless LAN MAC-layer address spoofing with fingerprinting methods | |
Budhrani et al. | Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools |