Kim et al., 2019 - Google Patents
A technical survey on methods for detecting rogue access pointsKim et al., 2019
- Document ID
- 197762628106978807
- Author
- Kim M
- Kwon S
- Elmazi D
- Lee J
- Barolli L
- Yim K
- Publication year
- Publication venue
- International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
External Links
Snippet
These days, wireless networks have become an indispensable environment in our life. Wireless broadcasting APs (Access Points) are deployed all around and a user can easily connect to the public network anytime and anywhere. In this situation, an attacker can steal …
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/12—Fraud detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Agarwal et al. | An efficient scheme to detect evil twin rogue access point attack in 802.11 Wi-Fi networks | |
US7710933B1 (en) | Method and system for classification of wireless devices in local area computer networks | |
US7970894B1 (en) | Method and system for monitoring of wireless devices in local area computer networks | |
RU2546610C1 (en) | Method of determining unsafe wireless access point | |
Hongsong et al. | Security and trust research in M2M system | |
US20150040194A1 (en) | Monitoring of smart mobile devices in the wireless access networks | |
US12160742B2 (en) | Zero trust wireless monitoring—system and method for behavior based monitoring of radio frequency environments | |
CN105681272B (en) | The detection of mobile terminal fishing WiFi a kind of and resist method | |
CN110326314A (en) | Security architecture for machine type communication | |
FI130942B1 (en) | A system and method for network entity assisted honeypot access point detection | |
Kim et al. | A technical survey on methods for detecting rogue access points | |
Cabaj et al. | Network threats mitigation using software‐defined networking for the 5G internet of radio light system | |
Lu et al. | SLFAT: Client‐Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames | |
CN106878992B (en) | Wireless network security detection method and system | |
Thankappan et al. | A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks | |
US20140245441A1 (en) | Apparatus for analyzing vulnerability of wireless local area network | |
Letsoalo et al. | Survey of Media Access Control address spoofing attacks detection and prevention techniques in wireless networks | |
CN105792216A (en) | Authentication-based wireless phishing access point detection method | |
Hsu et al. | A passive user‐side solution for evil twin access point detection at public hotspots | |
Shrestha et al. | Access point selection mechanism to circumvent rogue access points using voting‐based query procedure | |
Ahadi et al. | Public Wi-Fi security threat evil twin attack detection based on signal variant and hop count | |
Lee et al. | Man-in-the-middle Attacks Detection Scheme on Smartphone using 3G network | |
Thakur et al. | RAPD algorithm: detection of rogue access point in wireless network | |
Aggrawal et al. | Analysis and rendering of deauthentication attack using IoT technology | |
Oh et al. | Security Elements and Threat Analysis of 5G Mobile Network Based on 3GPP 5G NR Standard |