DocumentCode :
2398184
Title :
A Hidden Markov Model based approach to detect Rogue Access Points
Author :
Shivaraj, Gayathri ; Song, Min ; Shetty, Sachin
Author_Institution :
Dept. of Electr. & Comput. Eng., Old Dominion Univ., Norfolk, VA
fYear :
2008
fDate :
16-19 Nov. 2008
Firstpage :
1
Lastpage :
7
Abstract :
One of the most challenging security concerns for network administrators is the presence of rogue access points. In this paper, we propose a statistical based approach to detect rogue access points using a hidden Markov model applied to passively measure packet-header data collected at a gateway router. Our approach utilizes variations in packet inter-arrival time to differentiate between authorized access points and rouge access points. We designed and developed our hidden Markov model by analyzing denial of service attacks and the traffic characteristics of 802.11 based wireless local area networks. Experimental validations demonstrate the effectiveness of our approach. Our trained Hidden Markov Model can detect the presence of a rogue access point promptly within one second with extreme accuracy (very low false positive and false negative ratios are obtained). The success of our approach lies in the fact that it leverages knowledge about the behaviour of the traffic characteristics of 802.11 based WLANs and properties of denial of service attacks. Our approach is scalable and non-intrusive, requiring little deployment cost and effort, and is easy to manage and maintain.
Keywords :
hidden Markov models; internetworking; security of data; telecommunication network routing; telecommunication security; telecommunication traffic; wireless LAN; 802.11 based wireless local area networks; WLAN; authorized access points; denial of service attacks; gateway router; hidden Markov model; network administrators; packet inter-arrival time; packet-header data; rogue access point detection; traffic characteristics; Communication system security; Computer crime; Data security; Hidden Markov models; Information security; Monitoring; Radio frequency; Telecommunication traffic; Traffic control; Wireless LAN; Compromised Rogue Access Points; Denial of Service; Hidden Markov; Models; Rogue Access Points;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Military Communications Conference, 2008. MILCOM 2008. IEEE
Conference_Location :
San Diego, CA
Print_ISBN :
978-1-4244-2676-8
Electronic_ISBN :
978-1-4244-2677-5
Type :
conf
DOI :
10.1109/MILCOM.2008.4753358
Filename :
4753358
Link To Document :
بازگشت