[go: up one dir, main page]

Jang et al., 2017 - Google Patents

Rogue access point detector using characteristics of channel overlapping in 802.11 n

Jang et al., 2017

Document ID
3464899277685138011
Author
Jang R
Kang J
Mohaisen A
Nyang D
Publication year
Publication venue
2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)

External Links

Snippet

In this work, we introduce a powerful hardware-based rogue access point (PrAP), which can relay traffic between a legitimate AP and a wireless station back and forth, and act as a man- in-the-middle attacker. Our PrAP is built of two dedicated wireless routers interconnected …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/164Implementing security features at a particular protocol layer at the network layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information

Similar Documents

Publication Publication Date Title
Shrivastava et al. EvilScout: Detection and mitigation of evil twin attack in SDN enabled WiFi
US8069483B1 (en) Device for and method of wireless intrusion detection
US9979749B2 (en) Network security elements using endpoint resources
Ma et al. A hybrid rogue access point protection framework for commodity Wi-Fi networks
US7971253B1 (en) Method and system for detecting address rotation and related events in communication networks
Shetty et al. Rogue access point detection by analyzing network traffic characteristics
US10257226B2 (en) Identifying and trapping wireless based attacks on networks using deceptive network emulation
US20070142030A1 (en) Systems and methods for wireless vulnerability analysis
Jang et al. Catch me if you can: Rogue access point detection using intentional channel interference
Mónica et al. Wifihop-mitigating the evil twin attack through multi-hop detection
US10075850B2 (en) Method and system for wireless attack detection and mitigation
Jang et al. Rogue access point detector using characteristics of channel overlapping in 802.11 n
Cabaj et al. Sdn-based mitigation of scanning attacks for the 5g internet of radio light system
Lu et al. BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks
Aung et al. IEEE 802.11 attacks and defenses
Wang et al. Wireless network penetration testing and security auditing
Luo et al. TPAH: a universal and multi-platform deployable port and address hopping mechanism
Lu et al. Client-side evil twin attacks detection using statistical characteristics of 802.11 data frames
Alotaibi et al. A passive fingerprint technique to detect fake access points
Sriram et al. Detecting and eliminating Rogue Access Points in IEEE-802.11 WLAN-a multi-agent sourcing Methodology
Kralevska et al. Towards 5g intrusion detection scenarios with omnet++
Goel et al. Wireless Honeypot: Framework, Architectures and Tools.
Cabaj et al. Sniffing detection within the network: Revisiting existing and proposing novel approaches
Budhrani et al. Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools
Saifan et al. A lightweight log-monitoring-based mitigation tool against wlan attacks