Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames

被引:4
|
作者
Lu, Qian [1 ]
Qu, Haipeng [1 ]
Zhuang, Yuan [1 ]
Lin, Xi-Jun [1 ]
Ouyang, Yuzhan [1 ]
机构
[1] Ocean Univ China, Dept Comp Sci & Technol, Qingdao 266100, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
evil twins detection; rogue access point; man-in-the-middle attack; WLAN security;
D O I
10.1587/transinf.2018EDP7030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless network technology and popularization of mobile devices, the Wireless Local Area Network (WLAN) has become an indispensable part of our daily life. Although the 802.11-based WLAN provides enormous convenience for users to access the Internet, it also gives rise to a number of security issues. One of the most severe threat encountered by Wi-Fi users is the evil twin attacks. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Due to the characteristics of strong concealment, high confusion, great harmfulness and easy implementation, the evil twin has led to significant loss of sensitive information and become one of the most prominent security threats in recent years. In this paper, we propose a passive client-based detection solution that enables users to independently identify and locate evil twins without any assistance from a wireless network administrator. Because of the forwarding behavior of evil twins, proposed method compares 802.11 data frames sent by target APs to users to determine evil twin attacks. We implemented our detection technique in a Python tool named ET-spotter. Through implementation and evaluation in our study, our algorithm achieves 96% accuracy in distinguishing evil twins from legitimate APs.
引用
收藏
页码:2465 / 2473
页数:9
相关论文
共 33 条
  • [1] SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames
    Lu, Qian
    Qu, Haipeng
    Ouyang, Yuzhan
    Zhang, Jiahui
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [2] Client-Side Detection of Clickjacking Attacks
    Shahriar, Hossain
    Haddad, Hisham M.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2015, 9 (01) : 1 - 25
  • [3] A client-side detection mechanism for evil twins
    Hsu, Fu-Hau
    Wang, Chuan-Sheng
    Hsu, Yu-Liang
    Cheng, Yung-Pin
    Hsneh, Yu-Hsiang
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 59 : 76 - 85
  • [4] Detection of Malicious Servers for Preventing Client-Side Attacks
    Bux, Khuda
    Yousaf, Muhammad
    Jalbani, Akhtar Hussain
    Batool, Komal
    MEHRAN UNIVERSITY RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY, 2021, 40 (01) : 230 - 240
  • [5] HProxy Client-Side Detection of SSL Stripping Attacks
    Nikiforakis, Nick
    Younan, Yves
    Joosen, Wouter
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, 2010, 6201 : 200 - 218
  • [6] BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks
    Lu, Qian
    Jiang, Ruobing
    Ouyang, Yuzhan
    Qu, Haipeng
    Zhang, Jiahui
    COMPUTERS & SECURITY, 2020, 88
  • [8] Review of SQL injection attacks: Detection, to enhance the security of the website from client-side attacks
    AL-Maliki, Manar Hasan Ali
    Jasim, Mahdi Nsaif
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 3773 - 3782
  • [9] Shielding Collaborative Learning: Mitigating Poisoning Attacks Through Client-Side Detection
    Zhao, Lingchen
    Hu, Shengshan
    Wang, Qian
    Jiang, Jianlin
    Shen, Chao
    Luo, Xiangyang
    Hu, Pengfei
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (05) : 2029 - 2041
  • [10] Possibilities of using raster data in client-side web maps
    Farkas, Gabor
    TRANSACTIONS IN GIS, 2020, 24 (01) : 72 - 84