An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks

被引:16
|
作者
Agarwal, Mayank [1 ]
Biswas, Santosh [2 ]
Nandi, Sukumar [2 ]
机构
[1] Ben Gurion Univ Negev, Dept ISE, Beer Sheva, Israel
[2] IIT Guwahati, Dept Comp Sci & Engn, Gauhati, India
关键词
Intrusion Detection System; Evil Twin Rogue Access Point Attack; WiFi networks; False alarms;
D O I
10.1007/s10776-018-0396-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The MAC layer of 802.11 protocol possess inherent weakness making it vulnerable to various security attacks like denial of service, deauthentication attack, flooding attacks, rogue access point (RAP) etc. In this manuscript we focus on evil twin attack. An evil twin is a RAP setup by cloning the MAC address and the Service Set IDentifier of an existing wireless access point (AP). An evil twin is setup so that the client(s) unknowingly connect to them under the pretext that they are connected to a genuine AP. Once a client is connected, an attacker eavesdrops on its communication to hijack client's communication, re-direct clients to malicious websites, steal credentials of the clients connecting to it. Existing methods to detect the evil twin include maintaining white lists, patching AP/client, timing based solutions, protocol modifications etc. These methods usually require extensive setup and maintenance, have scalability and compatibility issues, require changes in protocol stack making them expensive to deploy and manage. The network conditions under normal and evil twin attack are almost similar thereby crafting a signature or defining an anomaly pattern usually leads to large amount of false positives. In this manuscript, we propose an IDS for detecting the evil twin attack, which addresses most of these issues associated with the existing detection mechanisms. Further the scheme is also proved to detect a single evil twin, multiple evil twins for single AP and multiple evil twins for multiple APs. The proposed IDS has been deployed in a lab environment and its detection rate exceeds 92% mark and the accuracy is 100% in all the runs.
引用
收藏
页码:130 / 145
页数:16
相关论文
共 50 条
  • [1] Evil Twin Attack Detection using Discrete Event Systems in IEEE 802.11 Wi-Fi Networks
    Selvarathinam, Nirmal S.
    Dhar, Amit Kumar
    Biswas, Santosh
    2019 27TH MEDITERRANEAN CONFERENCE ON CONTROL AND AUTOMATION (MED), 2019, : 316 - 321
  • [2] Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks
    Banakh, Roman
    Nyemkova, Elena
    Justice, Connie
    Piskozub, Andrian
    Lakh, Yuriy
    DATA, 2024, 9 (10)
  • [3] A hybrid rogue access point protection framework for commodity Wi-Fi networks
    Ma, Liran
    Teymorian, Amin Y.
    Cheng, Xiuzhen
    27TH IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), VOLS 1-5, 2008, : 1894 - 1902
  • [4] Wi-Fi Frame Classification and Feature Selection Analysis in Detecting Evil Twin Attack
    Asaduzzaman, Md
    Majib, Mohammad Shahjahan
    Rahman, Md Mahbubur
    2020 IEEE REGION 10 SYMPOSIUM (TENSYMP) - TECHNOLOGY FOR IMPACTFUL SUSTAINABLE DEVELOPMENT, 2020, : 1704 - 1707
  • [5] The Role of the Access Point in Wi-Fi Networks with Selfish Nodes
    Tinnirello, Ilenia
    Giarre, Laura
    Neglia, Giovanni
    2009 INTERNATIONAL CONFERENCE ON GAME THEORY FOR NETWORKS (GAMENETS 2009), 2009, : 631 - +
  • [6] A Novel Traceroute-based Detection Scheme for Wi-Fi Evil Twin Attacks
    Burns, Alex
    Wu, Longfei
    Du, Xiaojiang
    Zhu, Liehuang
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [7] Access Point Selection for Hybrid Li-Fi and Wi-Fi Networks
    Wu, Xiping
    Safari, Majid
    Haas, Harald
    IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (12) : 5375 - 5385
  • [8] A RSSI-based Rogue Access Point Detection Framework for Wi-Fi Hotspots
    Ahmad, Nazrul M.
    Amin, Anang Hudaya Muhamad
    Kannan, Subarmaniam
    Abdollah, Mohd Faizal
    Yusof, Robiah
    2014 IEEE 2ND INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATION TECHNOLOGIES (ISTT), 2014, : 104 - 109
  • [9] Denial of Convenience Attack to Smartphones Using a Fake Wi-Fi Access Point
    Dondyk, Erich
    Zou, Cliff C.
    2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 165 - 170
  • [10] Automation of MitM Attack on Wi-Fi Networks
    Vondracek, Martin
    Pluskal, Jan
    Rysavy, Ondrej
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2017, 2018, 216 : 207 - 220