BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks

被引:7
|
作者
Lu, Qian [1 ]
Jiang, Ruobing [1 ]
Ouyang, Yuzhan [1 ]
Qu, Haipeng [1 ]
Zhang, Jiahui [1 ]
机构
[1] Ocean Univ China, Dept Comp Sci & Technol, Qingdao 266100, Shandong, Peoples R China
基金
中国博士后科学基金;
关键词
Evil twin attack; Rogue access point detection; WLAN Security; Wi-Fi security; Man-in-the-middle attack;
D O I
10.1016/j.cose.2019.101618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The evil twin attack (ETA) has been a persistent security threat for decades in wireless local area networks (WLANs). An ETA refers to a rogue access point (RAP) impersonating a legal access point (LAP) to allure wireless users' connection. Such attacks give rise to serious privacy leakage and property damages, motivating intensive research on ETA detection in both academic and manufacturing communities. Among existing ETA detection methods, those deployed at client side are superior to the typical admin-side ones because of the particular requirements on dedicated equipments at admin side and the lack of real-time protection. Unfortunately, available client-side ETA detection mechanisms are simply targeted to specific evil twin model and fail to provide adequate detection rate. In this paper, we propose a multi-model ETA detection mechanism at client side, called BiRe. Inspired by the request-response reflection stated in TCP handshake process, BiRe employs a novel Bi-directional TCP SYN Reflection to determine the existence of an ETA and differentiate among various attack models. A pair of wireless adapters are employed to cooperatively initiate TCP handshakes and monitor the absence of the expected TCP SYN-ACK packets. The remarkable feature of BiRe is to make the number of such absences as a feasible indicator for the ETA model identification. The results from extensive real-world experiments demonstrate the distinguishing performance of BiRe, achieving as high as 100% detection rate in multi-model ETA scenarios. Moreover, a free lightweight Linux tool has been developed based on BiRe to automate client-side ETA detection. (C) 2019 Published by Elsevier Ltd.
引用
收藏
页数:11
相关论文
共 4 条
  • [2] Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames
    Lu, Qian
    Qu, Haipeng
    Zhuang, Yuan
    Lin, Xi-Jun
    Ouyang, Yuzhan
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2018, E101D (10): : 2465 - 2473
  • [3] Code Defect Detection Model with Multi-layer Bi-directional Long Short Term Memory based on Self-Attention Mechanism
    Hou, Cong
    Sun, Yue
    Li, Lin
    Chen, Wei
    Xu, Xiaotian
    PROCEEDINGS OF 2023 7TH INTERNATIONAL CONFERENCE ON ELECTRONIC INFORMATION TECHNOLOGY AND COMPUTER ENGINEERING, EITCE 2023, 2023, : 1656 - 1660
  • [4] A performance degradation prediction model for PEMFC based on bi-directional long short-term memory and multi-head self-attention mechanism
    Jia, Chunchun
    He, Hongwen
    Zhou, Jiaming
    Li, Kunang
    Li, Jianwei
    Wei, Zhongbao
    INTERNATIONAL JOURNAL OF HYDROGEN ENERGY, 2024, 60 : 133 - 146