Trident: Context-based Reverse Authentication for Phishing AP Detection in Commodity WiFi Networks

被引:0
|
作者
Zhao, Peng [1 ]
Bian, Kaigui [1 ]
Chen, Ping [2 ]
Zhao, Tong [1 ]
Duan, Yichun [1 ]
Yan, Wei [1 ]
机构
[1] Peking Univ, Sch EECS, Beijing, Peoples R China
[2] Peking Univ, Comp Ctr, Beijing, Peoples R China
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In urban areas, WiFi is the most widely-deployed portal for users to acquire the broadband access. Meanwhile, phishing AP (access point)-a rogue AP that falsifies the SSID (or even the BSSID) of a legitimate corporate AP-has caused many security problems in commodity WiFi networks. Existing research on the phishing AP detection can be divided into two categories: (1) the hardware-based approach usually deploys sensors (sniffers and/or USB-based wireless adapters) and conducts radio frequency (RF) sensing at a large scale to detect the anomaly at link and physical layers; and (2) the measurement-based approach enables a laptop to determine the legitimacy of a given AP by monitoring the RTT (round trip time) of data and/or control messages. However, these approaches require the additional cost on either the hardware deployment, or periodic statistical measurements. In this paper, we present Trident, a context-based reverse authentication method for detecting phishing AP in commodity WiFi networks, which requires no extra hardware deployment or periodic statistical measurements. Specifically, Trident employs a challenge-response protocol that allows a user to (reversely) authenticate an AP by two steps: (1) sending the AP a few questions regarding three user-context features (time, location, traffic) during the user-AP interaction procedure, and (2) examining the answers returned by the AP to determine its legitimacy. Our experimental results reveal that Trident achieves a high reliability rate(1) of 95% and a detection rate of 98% when users are connecting rogue APs in the commodity WiFi network on campus.
引用
收藏
页数:5
相关论文
共 50 条
  • [31] Accuracy versus speed in context-based object detection
    Bergboer, Nick
    Postma, Eric
    van den Herik, Jaap
    [J]. PATTERN RECOGNITION LETTERS, 2007, 28 (06) : 686 - 694
  • [32] Ethereum phishing detection based on graph neural networks
    Xiong A.
    Tong Y.
    Jiang C.
    Guo S.
    Shao S.
    Huang J.
    Wang W.
    Qi B.
    [J]. IET Blockchain, 2024, 4 (03): : 226 - 234
  • [33] Context-based influence maximization with privacy protection in social networks
    Dong Jing
    Ting Liu
    [J]. EURASIP Journal on Wireless Communications and Networking, 2019
  • [34] Context-Based Applications in Converged Networks: Beyond SIMPLE Presence
    Acharya, Arup
    Banerjee, Nilankan
    Chakarborty, Dipanjan
    Sharma, Shachi
    [J]. IEEE PERVASIVE COMPUTING, 2013, 12 (02) : 59 - 67
  • [35] Improving Bug Detection via Context-Based Code Representation Learning and Attention-Based Neural Networks
    Li, Yi
    Wang, Shaohua
    Nguyen, Tien N.
    Son Van Nguyen
    [J]. PROCEEDINGS OF THE ACM ON PROGRAMMING LANGUAGES-PACMPL, 2019, 3 (OOPSLA):
  • [36] Context-based caching in mobile information-centric networks
    Leira, Luis
    Luis, Miguel
    Sargento, Susana
    [J]. COMPUTER COMMUNICATIONS, 2022, 193 : 214 - 223
  • [37] Knowledge sharing in flexible supply networks: a context-based approach
    Smirnov, Alexander
    Levashova, Tatiana
    Shilov, Nikolay
    Kashevnik, Alexey
    [J]. CONTROL AND CYBERNETICS, 2010, 39 (01): : 177 - 196
  • [38] A Novel Context-based Risk Assessment Approach in Vehicular Networks
    Ahmad, Farhan
    Adnane, Asma
    [J]. IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA 2016), 2016, : 466 - 474
  • [39] Knowledge sharing in flexible production networks: A context-based approach
    Smirnov, Alexander
    Levashova, Tatiana
    Shilov, Nikolay
    [J]. International Journal of Automotive Technology and Management, 2009, 9 (01) : 87 - 109
  • [40] Context-based wireless mesh networks: a case for network virtualization
    Ricardo Matos
    Susana Sargento
    Karin Anna Hummel
    Andrea Hess
    Kurt Tutschku
    Hermann de Meer
    [J]. Telecommunication Systems, 2012, 51 : 259 - 272