无线局域网对抗流氓接入点的实验评估

Narahari Komanduri, S. Sankaran
{"title":"无线局域网对抗流氓接入点的实验评估","authors":"Narahari Komanduri, S. Sankaran","doi":"10.1109/iSES52644.2021.00098","DOIUrl":null,"url":null,"abstract":"Access Points (AP) are traditionally used to provide cost-effective, high speed Wi-Fi connectivity to homes, organizations and communities. Despite Wi-Fi providing numerous benefits such as flexibility, scalability and ease of deployment, it is susceptible to numerous vulnerabilities due to the presence of rogue access points (Rogue AP). In particular, intruders can eavesdrop, exploit, launch remote backdoors and manipulate legitimate clients and APs through Rogue APs thus leading to data breaches or possible network compromise. In this work, we build a real-time Wireless LAN testbed using commodity Wi-Fi devices such as Wi-Fi Pineapple Nano that acts as a rogue AP. Further, we perform different attacks on 802.11 Association process between clients and access points through the rogue AP and analyze their impact on the overall performance. Finally, we leverage a sniffer to capture genuine and malicious traffic and develop a mechanism for signature-based detection for mitigating the attacks caused by rogue APs. Evaluation shows that the proposed signature-based approach effectively detects the attacks caused by rogue APs with a detection rate of 91%.","PeriodicalId":293167,"journal":{"name":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Experimental Assessment of Wireless LANs against Rogue Access Points\",\"authors\":\"Narahari Komanduri, S. Sankaran\",\"doi\":\"10.1109/iSES52644.2021.00098\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Access Points (AP) are traditionally used to provide cost-effective, high speed Wi-Fi connectivity to homes, organizations and communities. Despite Wi-Fi providing numerous benefits such as flexibility, scalability and ease of deployment, it is susceptible to numerous vulnerabilities due to the presence of rogue access points (Rogue AP). In particular, intruders can eavesdrop, exploit, launch remote backdoors and manipulate legitimate clients and APs through Rogue APs thus leading to data breaches or possible network compromise. In this work, we build a real-time Wireless LAN testbed using commodity Wi-Fi devices such as Wi-Fi Pineapple Nano that acts as a rogue AP. Further, we perform different attacks on 802.11 Association process between clients and access points through the rogue AP and analyze their impact on the overall performance. Finally, we leverage a sniffer to capture genuine and malicious traffic and develop a mechanism for signature-based detection for mitigating the attacks caused by rogue APs. Evaluation shows that the proposed signature-based approach effectively detects the attacks caused by rogue APs with a detection rate of 91%.\",\"PeriodicalId\":293167,\"journal\":{\"name\":\"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iSES52644.2021.00098\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iSES52644.2021.00098","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

接入点(AP)传统上用于为家庭、组织和社区提供经济高效的高速Wi-Fi连接。尽管Wi-Fi提供了许多优点,如灵活性、可扩展性和易于部署,但由于存在非法接入点(流氓AP),它容易受到许多漏洞的影响。特别是,入侵者可以窃听、利用、启动远程后门,并通过流氓ap操纵合法客户端和ap,从而导致数据泄露或可能的网络危害。在这项工作中,我们使用商品Wi-Fi设备(如Wi-Fi Pineapple Nano)构建了一个实时无线局域网测试平台,作为流氓AP。此外,我们通过流氓AP对客户端和接入点之间的802.11关联过程进行了不同的攻击,并分析了它们对整体性能的影响。最后,我们利用嗅探器捕获真实和恶意流量,并开发基于签名的检测机制,以减轻恶意ap引起的攻击。结果表明,基于签名的检测方法能够有效检测到非法ap的攻击,检测率高达91%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Experimental Assessment of Wireless LANs against Rogue Access Points
Access Points (AP) are traditionally used to provide cost-effective, high speed Wi-Fi connectivity to homes, organizations and communities. Despite Wi-Fi providing numerous benefits such as flexibility, scalability and ease of deployment, it is susceptible to numerous vulnerabilities due to the presence of rogue access points (Rogue AP). In particular, intruders can eavesdrop, exploit, launch remote backdoors and manipulate legitimate clients and APs through Rogue APs thus leading to data breaches or possible network compromise. In this work, we build a real-time Wireless LAN testbed using commodity Wi-Fi devices such as Wi-Fi Pineapple Nano that acts as a rogue AP. Further, we perform different attacks on 802.11 Association process between clients and access points through the rogue AP and analyze their impact on the overall performance. Finally, we leverage a sniffer to capture genuine and malicious traffic and develop a mechanism for signature-based detection for mitigating the attacks caused by rogue APs. Evaluation shows that the proposed signature-based approach effectively detects the attacks caused by rogue APs with a detection rate of 91%.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Implementation of Self-Controlled Wheelchairs based on Joystick, Gesture Motion and Voice Recognition Dynamic Two Hand Gesture Recognition using CNN-LSTM based networks Performance Assessment of Dual Metal Graded Channel Negative Capacitance Junctionless FET for Digital/Analog field VLSI Architecture of Sigmoid Activation Function for Rapid Prototyping of Machine Learning Applications. Influence of Nanosilica in PVDF Thin Films for Sensing Applications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1