[go: up one dir, main page]

Alotaibi et al., 2015 - Google Patents

An empirical fingerprint framework to detect rogue access points

Alotaibi et al., 2015

View PDF
Document ID
4424111351765351779
Author
Alotaibi B
Elleithy K
Publication year
Publication venue
2015 Long Island Systems, Applications and Technology

External Links

Snippet

The aim of this paper is to detect Rogue Access Points (RAPs) that clone some of the characteristics of nearby legitimate Access Points (APs). A new passive approach that takes advantage of the first frame that the RAP sends (ie, Beacon Frame (BF)) when it is planted in …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/12Fraud detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity

Similar Documents

Publication Publication Date Title
Shrivastava et al. EvilScout: Detection and mitigation of evil twin attack in SDN enabled WiFi
Ma et al. A hybrid rogue access point protection framework for commodity Wi-Fi networks
US7970894B1 (en) Method and system for monitoring of wireless devices in local area computer networks
Alotaibi et al. Rogue access point detection: Taxonomy, challenges, and future directions
US7216365B2 (en) Automated sniffer apparatus and method for wireless local area network security
Hwang et al. A study on MITM (Man in the Middle) vulnerability in wireless network using 802.1 X and EAP
US9003527B2 (en) Automated method and system for monitoring local area computer networks for unauthorized wireless access
US8638762B2 (en) System and method for network integrity
Nikbakhsh et al. A novel approach for rogue access point detection on the client-side
US7971253B1 (en) Method and system for detecting address rotation and related events in communication networks
US20150040194A1 (en) Monitoring of smart mobile devices in the wireless access networks
Nakhila et al. User-side wi-fi evil twin attack detection using random wireless channel monitoring
Thankappan et al. A signature-based wireless intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks
Alotaibi et al. An empirical fingerprint framework to detect rogue access points
Nakhila et al. Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients
Alotaibi et al. A passive fingerprint technique to detect fake access points
Anmulwar et al. Rogue access point detection methods: A review
Kitisriworapan et al. Client-side rogue access-point detection using a simple walking strategy and round-trip time analysis
US20080263660A1 (en) Method, Device and Program for Detection of Address Spoofing in a Wireless Network
Hafiz et al. Profiling and mitigating brute force attack in home wireless LAN
Lu et al. Client-side evil twin attacks detection using statistical characteristics of 802.11 data frames
Letsoalo et al. Survey of Media Access Control address spoofing attacks detection and prevention techniques in wireless networks
Ahmad et al. A RSSI-based rogue access point detection framework for Wi-Fi hotspots
Lackner et al. Combating wireless LAN MAC-layer address spoofing with fingerprinting methods
Budhrani et al. Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools