Trident: Context-based Reverse Authentication for Phishing AP Detection in Commodity WiFi Networks

被引:0
|
作者
Zhao, Peng [1 ]
Bian, Kaigui [1 ]
Chen, Ping [2 ]
Zhao, Tong [1 ]
Duan, Yichun [1 ]
Yan, Wei [1 ]
机构
[1] Peking Univ, Sch EECS, Beijing, Peoples R China
[2] Peking Univ, Comp Ctr, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In urban areas, WiFi is the most widely-deployed portal for users to acquire the broadband access. Meanwhile, phishing AP (access point)-a rogue AP that falsifies the SSID (or even the BSSID) of a legitimate corporate AP-has caused many security problems in commodity WiFi networks. Existing research on the phishing AP detection can be divided into two categories: (1) the hardware-based approach usually deploys sensors (sniffers and/or USB-based wireless adapters) and conducts radio frequency (RF) sensing at a large scale to detect the anomaly at link and physical layers; and (2) the measurement-based approach enables a laptop to determine the legitimacy of a given AP by monitoring the RTT (round trip time) of data and/or control messages. However, these approaches require the additional cost on either the hardware deployment, or periodic statistical measurements. In this paper, we present Trident, a context-based reverse authentication method for detecting phishing AP in commodity WiFi networks, which requires no extra hardware deployment or periodic statistical measurements. Specifically, Trident employs a challenge-response protocol that allows a user to (reversely) authenticate an AP by two steps: (1) sending the AP a few questions regarding three user-context features (time, location, traffic) during the user-AP interaction procedure, and (2) examining the answers returned by the AP to determine its legitimacy. Our experimental results reveal that Trident achieves a high reliability rate(1) of 95% and a detection rate of 98% when users are connecting rogue APs in the commodity WiFi network on campus.
引用
收藏
页数:5
相关论文
共 50 条
  • [21] A Novel Context-Based Approach of Identifying Congestion Detection
    Dutta, Pratik
    [J]. 2018 FIFTH INTERNATIONAL CONFERENCE ON PARALLEL, DISTRIBUTED AND GRID COMPUTING (IEEE PDGC), 2018, : 488 - 494
  • [22] Context-based profiling for anomaly intrusion detection with diagnosis
    Salem, Benferhat
    Karim, Tabia
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 618 - +
  • [23] A Context-Based Detection Framework for Advanced Persistent Threats
    Giura, Paul
    Wang, Wei
    [J]. 2012 ASE INTERNATIONAL CONFERENCE ON CYBER SECURITY (CYBERSECURITY), 2012, : 69 - 74
  • [24] Object Detection Using Context-Based Cascade Classifier
    Nam, Mi Young
    Rhee, Phill Kyu
    [J]. INTELLIGENT COMPUTING, PART I: INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, ICIC 2006, PART I, 2006, 4113 : 1021 - 1029
  • [25] Context-Based Parking Slot Detection With a Realistic Dataset
    Do, Hoseok
    Choi, Jin Young
    [J]. IEEE ACCESS, 2020, 8 : 171551 - 171559
  • [26] A context-based analysis of intrusion detection for policy violation
    Wan, Kaiyu
    Alagar, Vasu
    Yang, Zhong Yuan
    [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 692 - +
  • [27] Context-Based Masking for Spontaneous Venous Pulsations Detection
    Sheng, Hongwei
    Yu, Xin
    Li, Xue
    Golzan, Mojtaba
    [J]. ADVANCES IN ARTIFICIAL INTELLIGENCE, AI 2023, PT I, 2024, 14471 : 520 - 532
  • [28] CONTEXT-BASED OCCLUSION DETECTION FOR ROBUST VISUAL TRACKING
    Niu, Xiaoguang
    Qiao, Yu
    [J]. 2017 24TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2017, : 3655 - 3659
  • [29] CMPD: Context-Based Malicious Parameter Detection for APIs
    Zhao, Zhangjie
    Zhang, Lin
    Zhang, Xing
    Wang, Ying
    Qin, Yi
    [J]. CYBER SECURITY, CNCERT 2022, 2022, 1699 : 99 - 112
  • [30] Context-based Hierarchical Saliency Detection for Mobile Hotspot
    Siratanila, Sirimamayvadee
    Chamnongthai, Kosin
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON DIGITAL SIGNAL PROCESSING (DSP), 2015, : 1058 - 1061