Passive Online Rogue Access Point Detection Using Sequential Hypothesis Testing with TCP ACK-Pairs

被引:0
|
作者
Wei, Wei
Suh, Kyoung
Wang, Bing
Gu, Yu
Kurose, Jim
Towsley, Don
机构
关键词
Rogue access point detection; Sequential hypothesis testing; TCP ACK-pairs;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Rogue (unauthorized) wireless access points pose serious security threats to local networks. In this paper, we propose two online algorithms to detect rogue access points using sequential hypothesis tests applied to packet-header data collected passively at a monitoring point. One algorithm requires training sets, while the other does not. Both algorithms extend our earlier TCP ACK-pair technique to differentiate wired and wireless LAN TCP traffic, and exploit the fundamental properties of the 802.11 CSMA/CA MAC protocol and the half duplex nature of wireless channels. Our algorithms make prompt decisions as TCP ACK-pairs are observed, and only incur minimum computation and storage overhead. We have built a system for online rogue-access-point detection using these algorithms and deployed it at a university gateway router. Extensive experiments in various scenarios have demonstrated the excellent performance of our approach: the algorithm that requires training provides rapid detection and is extremely accurate (the detection is mostly within 10 seconds, with very low false positive and false negative ratios); the algorithm that does not require training detects 60%-76% of the wireless hosts without any false positives; both algorithms are light-weight (with computation and storage overhead well within the capability of commodity equipment).
引用
收藏
页码:365 / 378
页数:14
相关论文
共 21 条
  • [1] Passive Online Detection of 802.11 Traffic Using Sequential Hypothesis Testing with TCP ACK-Pairs
    Wei, Wei
    Suh, Kyoungwon
    Wang, Bing
    Gu, Yu
    Kurose, Jim
    Towsley, Don
    Jaiswal, Sharad
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2009, 8 (03) : 398 - 412
  • [2] A passive approach to rogue access point detection
    Watkins, Lanier
    Beyah, Raheem
    Corbett, Cherita
    GLOBECOM 2007: 2007 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-11, 2007, : 355 - +
  • [3] Detection of Rogue Access Point Using Various Parameters
    Vanjale, Sandeep
    Mane, P. B.
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA ENGINEERING AND COMMUNICATION TECHNOLOGY, ICDECT 2016, VOL 1, 2017, 468 : 699 - 710
  • [4] Wireless Rogue Access Point Detection Using Shadow Honeynet
    Neha Agrawal
    Shashikala Tapaswi
    Wireless Personal Communications, 2015, 83 : 551 - 570
  • [5] Vehicular Rogue Access Point Detection Using Speed of Vehicle
    Yadav, Kaushal Kishor
    Tapaswi, Shashikala
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (02) : 849 - 860
  • [6] Vehicular Rogue Access Point Detection Using Speed of Vehicle
    Kaushal Kishor Yadav
    Shashikala Tapaswi
    Wireless Personal Communications, 2015, 82 : 849 - 860
  • [7] Wireless Rogue Access Point Detection Using Shadow Honeynet
    Agrawal, Neha
    Tapaswi, Shashikala
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 83 (01) : 551 - 570
  • [8] Rogue access point detection using temporal traffic characteristics
    Beyah, R
    Kangude, S
    Yu, G
    Strickland, B
    Copeland, J
    GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2271 - 2275
  • [9] Fast portscan detection using sequential hypothesis testing
    Jung, J
    Paxson, V
    Berger, AW
    Balakrishnan, H
    2004 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2004, : 211 - 225
  • [10] Detecting file fragmentation point using sequential hypothesis testing
    Pal, Anandabrata
    Sencar, Husrev T.
    Memon, Nasir
    DIGITAL INVESTIGATION, 2008, 5 : S2 - S13