Jang et al., 2017 - Google Patents
Rogue access point detector using characteristics of channel overlapping in 802.11 nJang et al., 2017
- Document ID
- 3464899277685138011
- Author
- Jang R
- Kang J
- Mohaisen A
- Nyang D
- Publication year
- Publication venue
- 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS)
External Links
Snippet
In this work, we introduce a powerful hardware-based rogue access point (PrAP), which can relay traffic between a legitimate AP and a wireless station back and forth, and act as a man- in-the-middle attacker. Our PrAP is built of two dedicated wireless routers interconnected …
- 238000001514 detection method 0 abstract description 41
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/164—Implementing security features at a particular protocol layer at the network layer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Shrivastava et al. | EvilScout: Detection and mitigation of evil twin attack in SDN enabled WiFi | |
| US8069483B1 (en) | Device for and method of wireless intrusion detection | |
| US9979749B2 (en) | Network security elements using endpoint resources | |
| Ma et al. | A hybrid rogue access point protection framework for commodity Wi-Fi networks | |
| US7971253B1 (en) | Method and system for detecting address rotation and related events in communication networks | |
| Shetty et al. | Rogue access point detection by analyzing network traffic characteristics | |
| US10257226B2 (en) | Identifying and trapping wireless based attacks on networks using deceptive network emulation | |
| US20070142030A1 (en) | Systems and methods for wireless vulnerability analysis | |
| Jang et al. | Catch me if you can: Rogue access point detection using intentional channel interference | |
| Mónica et al. | Wifihop-mitigating the evil twin attack through multi-hop detection | |
| US10075850B2 (en) | Method and system for wireless attack detection and mitigation | |
| Jang et al. | Rogue access point detector using characteristics of channel overlapping in 802.11 n | |
| Cabaj et al. | Sdn-based mitigation of scanning attacks for the 5g internet of radio light system | |
| Lu et al. | BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks | |
| Aung et al. | IEEE 802.11 attacks and defenses | |
| Wang et al. | Wireless network penetration testing and security auditing | |
| Luo et al. | TPAH: a universal and multi-platform deployable port and address hopping mechanism | |
| Lu et al. | Client-side evil twin attacks detection using statistical characteristics of 802.11 data frames | |
| Alotaibi et al. | A passive fingerprint technique to detect fake access points | |
| Sriram et al. | Detecting and eliminating Rogue Access Points in IEEE-802.11 WLAN-a multi-agent sourcing Methodology | |
| Kralevska et al. | Towards 5g intrusion detection scenarios with omnet++ | |
| Goel et al. | Wireless Honeypot: Framework, Architectures and Tools. | |
| Cabaj et al. | Sniffing detection within the network: Revisiting existing and proposing novel approaches | |
| Budhrani et al. | Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools | |
| Saifan et al. | A lightweight log-monitoring-based mitigation tool against wlan attacks |