DocumentCode :
3477229
Title :
Who is peeping at your passwords at Starbucks? — To catch an evil twin access point
Author :
Song, Yimin ; Yang, Chao ; Gu, Guofei
Author_Institution :
Texas A&M Univ., College Station, TX, USA
fYear :
2010
fDate :
June 28 2010-July 1 2010
Firstpage :
323
Lastpage :
332
Abstract :
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks (WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID name). It is set up by an adversary, who can eavesdrop on wireless communications of users´ Internet access. Existing evil twin detection solutions are mostly for wireless network administrators to verify whether a given AP is in an authorized list or not, instead of for a wireless client to detect whether a given AP is authentic or evil. Such administrator-side solutions are limited, expensive, and not available for many scenarios. For example, for traveling users who use wireless networks at airports, hotels, or cafes, they need to protect themselves from evil twin attacks (instead of relying on those wireless network providers, which typically may not provide strong security monitoring/management service). Thus, a lightweight and effective solution for these users is highly desired. In this work, we propose a novel user-side evil twin detection technique that outperforms traditional administrator-side detection methods in several aspects. Unlike previous approaches, our technique does not need a known authorized AP/host list, thus it is suitable for users to identify and avoid evil twins. Our technique does not strictly rely on training data of target wireless networks, nor depend on the types of wireless networks. We propose to exploit fundamental communication structures and properties of such evil twin attacks in wireless networks and to design new active, statistical and anomaly detection algorithms. Our preliminary evaluation in real-world widely deployed 802.11b and 802.11g wireless networks shows very promising results. We can identify evil twins with a very high detection rate while keeping a very low false positive rate.
Keywords :
security of data; wireless LAN; 802.11b wireless networks; 802.11g wireless networks; Internet access; Wi-Fi access point; administrator-side detection methods; evil twin attacks; user-side evil twin detection technique; wireless local area networks; Airports; Algorithm design and analysis; Detection algorithms; Internet; Monitoring; Protection; Training data; Wireless LAN; Wireless communication; Wireless networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Dependable Systems and Networks (DSN), 2010 IEEE/IFIP International Conference on
Conference_Location :
Chicago, IL
Print_ISBN :
978-1-4244-7500-1
Electronic_ISBN :
978-1-4244-7499-8
Type :
conf
DOI :
10.1109/DSN.2010.5544302
Filename :
5544302
Link To Document :
بازگشت