Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames

被引:4
|
作者
Lu, Qian [1 ]
Qu, Haipeng [1 ]
Zhuang, Yuan [1 ]
Lin, Xi-Jun [1 ]
Ouyang, Yuzhan [1 ]
机构
[1] Ocean Univ China, Dept Comp Sci & Technol, Qingdao 266100, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
evil twins detection; rogue access point; man-in-the-middle attack; WLAN security;
D O I
10.1587/transinf.2018EDP7030
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of wireless network technology and popularization of mobile devices, the Wireless Local Area Network (WLAN) has become an indispensable part of our daily life. Although the 802.11-based WLAN provides enormous convenience for users to access the Internet, it also gives rise to a number of security issues. One of the most severe threat encountered by Wi-Fi users is the evil twin attacks. The evil twin, a kind of rogue access points (RAPs), masquerades as a legitimate access point (AP) to lure users to connect it. Due to the characteristics of strong concealment, high confusion, great harmfulness and easy implementation, the evil twin has led to significant loss of sensitive information and become one of the most prominent security threats in recent years. In this paper, we propose a passive client-based detection solution that enables users to independently identify and locate evil twins without any assistance from a wireless network administrator. Because of the forwarding behavior of evil twins, proposed method compares 802.11 data frames sent by target APs to users to determine evil twin attacks. We implemented our detection technique in a Python tool named ET-spotter. Through implementation and evaluation in our study, our algorithm achieves 96% accuracy in distinguishing evil twins from legitimate APs.
引用
收藏
页码:2465 / 2473
页数:9
相关论文
共 33 条
  • [31] User-Side Evil Twin Attack Detection Using Time-Delay Statistics of TCP Connection Termination
    Kuo, En-Chun
    Chang, Ming-Sang
    Kao, Da-Yu
    2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 211 - 216
  • [32] Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients
    Nakhila, Omar
    Amjad, Muhammad Faisal
    Dondyk, Erich
    Zou, Cliff
    COMPUTERS & SECURITY, 2018, 74 : 41 - 54
  • [33] A Novel Change Detection Method Based on Statistical Distribution Characteristics Using Multi-Temporal PolSAR Data
    Zhao, Jinqi
    Chang, Yonglei
    Yang, Jie
    Niu, Yufen
    Lu, Zhong
    Li, Pingxiang
    SENSORS, 2020, 20 (05)