Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks

被引:0
|
作者
Banakh, Roman [1 ]
Nyemkova, Elena [1 ]
Justice, Connie [2 ]
Piskozub, Andrian [1 ]
Lakh, Yuriy [1 ]
机构
[1] Lviv Polytech Natl Univ, Dept Informat Technol Secur, UA-79013 Lvov, Ukraine
[2] Purdue Univ Indianapolis, Purdue Sch Engn & Technol, Indiana Univ, Indianapolis, IN 46202 USA
关键词
data; machine learning model; KNN; generative algorithm; intrusion detection; IEEE; 802.11; Evil Twin attack;
D O I
10.3390/data9100119
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recent cyber security solutions for wireless networks during internet open access have become critically important for personal data security. The newest WPA3 network security protocol has been used to maximize this protection; however, attackers can use an Evil Twin attack to replace a legitimate access point. The article is devoted to solving the problem of intrusion detection at the OSI model's physical layers. To solve this, a hardware-software complex has been developed to collect information about the signal strength from Wi-Fi access points using wireless sensor networks. The collected data were supplemented with a generative algorithm considering all possible combinations of signal strength. The k-nearest neighbor model was trained on the obtained data to distinguish the signal strength of legitimate from illegitimate access points. To verify the authenticity of the data, an Evil Twin attack was physically simulated, and a machine learning model analyzed the data from the sensors. As a result, the Evil Twin attack was successfully identified based on the signal strength in the radio spectrum. The proposed model can be used in open access points as well as in large corporate and home Wi-Fi networks to detect intrusions aimed at substituting devices in the radio spectrum where IEEE 802.11 networking equipment operates.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Evil Twin Attack Detection using Discrete Event Systems in IEEE 802.11 Wi-Fi Networks
    Selvarathinam, Nirmal S.
    Dhar, Amit Kumar
    Biswas, Santosh
    2019 27TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2019, : 316 - 321
  • [2] An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks
    Agarwal, Mayank
    Biswas, Santosh
    Nandi, Sukumar
    INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2018, 25 (02) : 130 - 145
  • [3] Wi-Fi Frame Classification and Feature Selection Analysis in Detecting Evil Twin Attack
    Asaduzzaman, Md
    Majib, Mohammad Shahjahan
    Rahman, Md Mahbubur
    2020 IEEE REGION 10 SYMPOSIUM (TENSYMP) - TECHNOLOGY FOR IMPACTFUL SUSTAINABLE DEVELOPMENT, 2020, : 1704 - 1707
  • [4] Automation of MitM Attack on Wi-Fi Networks
    Vondracek, Martin
    Pluskal, Jan
    Rysavy, Ondrej
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2017, 2018, 216 : 207 - 220
  • [5] User-Side Wi-Fi Evil Twin Attack Detection Using SSL/TCP Protocols
    Nakhila, Omar
    Dondyk, Erich
    Amjad, Muhammad Faisal
    Zou, Cliff
    2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 239 - 244
  • [6] User-Side Wi-Fi Evil Twin Attack Detection Using Random Wireless Channel Monitoring
    Nakhila, Omar
    Zou, Cliff
    MILCOM 2016 - 2016 IEEE MILITARY COMMUNICATIONS CONFERENCE, 2016, : 1243 - 1248
  • [7] Wi-Fi Network Testing Using an Integrated Evil-Twin Framework
    Esser, Andre
    Serrao, Carlos
    2018 FIFTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY, 2018, : 216 - 221
  • [8] Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients
    Nakhila, Omar
    Amjad, Muhammad Faisal
    Dondyk, Erich
    Zou, Cliff
    COMPUTERS & SECURITY, 2018, 74 : 41 - 54
  • [9] A data clustering approach to discriminating impersonating devices in Wi-Fi networks
    Tao, Zhiqi
    Nath, Baikunth
    Lonie, Andrew
    SECURITY AND COMMUNICATION NETWORKS, 2010, 3 (01) : 44 - 57
  • [10] Wi-Fi Handshake: analysis of password patterns in Wi-Fi networks
    Carballal, Adrian
    Galego-Carro, J. Pablo
    Rodriguez- Fernandez, Nereida
    Fernandez-Lozano, Carlos
    PEERJ COMPUTER SCIENCE, 2022, 8