Practical Defenses for Evil Twin Attacks in 802.11

被引:0
|
作者
Gonzales, Harold [1 ]
Bauer, Kevin [1 ]
Lindqvist, Janne [2 ]
McCoy, Damon [3 ]
Sicker, Douglas [1 ]
机构
[1] Univ Colorado, Boulder, CO 80309 USA
[2] Carnegie Mellon Univ, Pittsburgh, PA 15213 USA
[3] Univ Calif San Diego, San Diego, CA 92103 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to deploy, requiring no out-of-band key exchange or prior trust relationships. However, such networks are vulnerable to a variety of threats including the evil twin attack where an adversary clones a client's previously-used access point for a variety of malicious purposes including malware injection or identity theft. We propose defenses that aim to maintain the simplicity, convenience, and usability of open-access networks while offering increased protection from evil twin attacks. First, we present an evil twin detection strategy called context-leashing that constrains access point trust by location. Second, we propose that wireless networks be identified by uncertified public keys and design an SSH-style authentication and session key establishment protocol that fits into the 802.1X standard. Lastly, to mitigate the pitfalls of SSH-style authentication, we present a crowd-sourcing-based reporting protocol that provides historical information for access point public keys while preserving the location privacy of users who contribute reports.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [41] Defenses to Membership Inference Attacks: A Survey
    Hu, Li
    Yan, Anli
    Yan, Hongyang
    Li, Jin
    Huang, Teng
    Zhang, Yingying
    Dong, Changyu
    Yang, Chunsheng
    ACM COMPUTING SURVEYS, 2024, 56 (04)
  • [42] Certified Defenses for Data Poisoning Attacks
    Steinhardt, Jacob
    Koh, Pang Wei
    Liang, Percy
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 30 (NIPS 2017), 2017, 30
  • [43] Speculative attacks and defenses as wars of attrition
    Grier, Kevin
    Lin, Shu
    EUROPEAN JOURNAL OF POLITICAL ECONOMY, 2009, 25 (04) : 540 - 546
  • [44] Attacks and Defenses in the Data Plane of Networks
    Chasaki, Danai
    Wolf, Tilman
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (06) : 798 - 810
  • [45] On Modeling Link Flooding Attacks and Defenses
    Wang, Xin
    Ma, Xiaobo
    Peng, Jiahao
    Li, Jianfeng
    Xue, Lei
    Hu, Wenjun
    Feng, Li
    IEEE ACCESS, 2021, 9 : 159198 - 159217
  • [46] Survey of Attacks and Defenses against SGX
    Zhang, Yahui
    Zhao, Min
    Li, Tingquan
    Han, Huan
    PROCEEDINGS OF 2020 IEEE 5TH INFORMATION TECHNOLOGY AND MECHATRONICS ENGINEERING CONFERENCE (ITOEC 2020), 2020, : 1492 - 1496
  • [47] The Perception of Politicians' Morality Attacks and Defenses
    Catellani, Patrizia
    Bertolotti, Mauro
    SOCIAL PSYCHOLOGY AND POLITICS, 2015, : 113 - 128
  • [48] The Effectiveness of Rocket Attacks and Defenses in Israel
    Armstrong, Michael J.
    JOURNAL OF GLOBAL SECURITY STUDIES, 2018, 3 (02) : 113 - 132
  • [49] Holistic Defenses Against Microarchitectural Attacks
    Kasikci, Baris
    Loughlin, Kevin
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES V, 2021, 11751
  • [50] On Adaptive Attacks to Adversarial Example Defenses
    Tramer, Florian
    Carlini, Nicholas
    Brendel, Wieland
    Madry, Aleksander
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 33, NEURIPS 2020, 2020, 33