An Efficient Scheme to Detect Evil Twin Rogue Access Point Attack in 802.11 Wi-Fi Networks

被引:16
|
作者
Agarwal, Mayank [1 ]
Biswas, Santosh [2 ]
Nandi, Sukumar [2 ]
机构
[1] Ben Gurion Univ Negev, Dept ISE, Beer Sheva, Israel
[2] IIT Guwahati, Dept Comp Sci & Engn, Gauhati, India
关键词
Intrusion Detection System; Evil Twin Rogue Access Point Attack; WiFi networks; False alarms;
D O I
10.1007/s10776-018-0396-1
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The MAC layer of 802.11 protocol possess inherent weakness making it vulnerable to various security attacks like denial of service, deauthentication attack, flooding attacks, rogue access point (RAP) etc. In this manuscript we focus on evil twin attack. An evil twin is a RAP setup by cloning the MAC address and the Service Set IDentifier of an existing wireless access point (AP). An evil twin is setup so that the client(s) unknowingly connect to them under the pretext that they are connected to a genuine AP. Once a client is connected, an attacker eavesdrops on its communication to hijack client's communication, re-direct clients to malicious websites, steal credentials of the clients connecting to it. Existing methods to detect the evil twin include maintaining white lists, patching AP/client, timing based solutions, protocol modifications etc. These methods usually require extensive setup and maintenance, have scalability and compatibility issues, require changes in protocol stack making them expensive to deploy and manage. The network conditions under normal and evil twin attack are almost similar thereby crafting a signature or defining an anomaly pattern usually leads to large amount of false positives. In this manuscript, we propose an IDS for detecting the evil twin attack, which addresses most of these issues associated with the existing detection mechanisms. Further the scheme is also proved to detect a single evil twin, multiple evil twins for single AP and multiple evil twins for multiple APs. The proposed IDS has been deployed in a lab environment and its detection rate exceeds 92% mark and the accuracy is 100% in all the runs.
引用
收藏
页码:130 / 145
页数:16
相关论文
共 50 条
  • [41] DES Based IDS for detection Minimal De-authentication DoS Attack in 802.11 Wi-Fi Networks
    Agarwal, Mayank
    2021 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (IEEE ANTS), 2021,
  • [42] Activity patterns mining in Wi-Fi access point logs
    Poucin, Guilhem
    Farooq, Bilal
    Patterson, Zachary
    COMPUTERS ENVIRONMENT AND URBAN SYSTEMS, 2018, 67 : 55 - 67
  • [43] Wi-Fi Access Point Roaming: Challenges and Potential Solutions
    Wang, Lianyuan
    Zhao, Yuxuan
    Afolabi, David
    Man, Ka Lok
    Liang, Hai-Ning
    Liu, Dawei
    Lam, Yiu Fai
    Fleming, Charles
    Tayahi, Moncef
    PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015), 2015, : 158 - 161
  • [44] Designing energy efficient access points with Wi-Fi Direct
    Camps-Mur, Daniel
    Perez-Costa, Xavier
    Sallent-Ribes, Sebastia
    COMPUTER NETWORKS, 2011, 55 (13) : 2838 - 2855
  • [45] A Measurement Study on Internet Access in Vehicular Wi-Fi Networks
    Kim, Younghyun
    Ko, Jaeduck
    Kim, Wonjung
    Pack, Sangheon
    2010 IEEE 72ND VEHICULAR TECHNOLOGY CONFERENCE FALL, 2010,
  • [46] Seamless handoff scheme in Wi-Fi and WiMAX heterogeneous networks
    Shi, Fei
    Li, Keqiu
    Shen, Yanming
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2010, 26 (08): : 1403 - 1408
  • [47] Association optimization based on access fairness for Wi-Fi networks
    Amer, Mohammed
    Busson, Anthony
    Lassous, Isabelle Guerin
    COMPUTER NETWORKS, 2018, 137 : 173 - 188
  • [48] An Experimental Performance Measurement of Implemented Wireless Access Point for Interworking Wi-Fi and HSDPA Networks
    Byun, Tae-Young
    GRID AND DISTRIBUTED COMPUTING, CONTROL AND AUTOMATION, 2010, 121 : 145 - 154
  • [49] AUTOMATED MAN-IN-THE-MIDDLE ATTACK AGAINST WI-FI NETWORKS
    Vondracek, Martin
    Pluskal, Jan
    Rysavy, Ondrej
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2018, 13 (01) : 59 - 80
  • [50] Wi-Fi protected access for secure power network protection scheme
    Eissa, M. M.
    Ali, Ihab A.
    Abdel-Latif, Km.
    INTERNATIONAL JOURNAL OF ELECTRICAL POWER & ENERGY SYSTEMS, 2013, 46 : 414 - 424