skip to main content
10.1145/1367497.1367750acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
poster

Rogue access point detection using segmental TCP jitter

Published: 21 April 2008 Publication History

Abstract

Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the mechanism of IEEE 802.11 MAC Distributed Coordinated Function (DCF) and used to differentiate the types of wire and WLAN connections which is the crucial step for RAPs detecting. STJ as the detecting metric can reflect more the characteristic of 802.11 MAC than ACK-Pair since it can eliminate the delay caused by packet transmission. The experiment on an operated network shows the average detection ratio of the algorithm with STJ is more than 92.8% and the average detection time is less than 1s with improvement of 20% and 60% over the detecting approach of ACK-Pair respectively. Farther more no WLAN training trace is needed in the detecting algorithm.

References

[1]
Beyah, S. Kangude. Rogue access point detection using temporal traffic characteristics. In: Proceedings of IEEE GLOBECOM'04, Dallas, Texas, USA, 2004:2271 2275
[2]
Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kurose, Don Towsley. Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs. In: Proceedings of ACM SIGCOMM IMC'07, San Diego, California, USA, 2007: 365 378
[3]
Mano, A. Blaich, Q. Liao, Y. Jiang, D. Cieslak, D. Salyers, A. Striegel. RIPPS- Rogue Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts Through Network Traffic Conditioning. ACM Transactions on Information and System Security, May 2008, to appear.
[4]
Wei Wei, Sharad Jaiswal, Jim Kurose, Don Towsley. Identifying 802.11 Traffic from Passive Measurements Using Iterative Bayesian Inference. In: Proceedings of IEEE INFOCOM'06, Barcelona, Catalunya, 2006: 1 12
[5]
Tickoo O, Sikdar B. Queueing analysis and delay mitigation in IEEE 802.11 random access MAC based wireless networks. In: Proceedings of IEEE INFOCOM'04, HongKong, 2004: 1404 1413

Cited By

View all
  • (2018)User-side evil twin attack detection using time-delay statistics of TCP connection termination2018 20th International Conference on Advanced Communication Technology (ICACT)10.23919/ICACT.2018.8323700(211-216)Online publication date: Feb-2018
  • (2016)Finding proxy users at the service using anomaly detection2016 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2016.7860473(82-90)Online publication date: Oct-2016
  • (2011)WiFiHop - mitigating the Evil twin attack through multi-hop detectionProceedings of the 16th European conference on Research in computer security10.5555/2041225.2041228(21-39)Online publication date: 12-Sep-2011
  • Show More Cited By

Index Terms

  1. Rogue access point detection using segmental TCP jitter

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WWW '08: Proceedings of the 17th international conference on World Wide Web
      April 2008
      1326 pages
      ISBN:9781605580852
      DOI:10.1145/1367497
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 21 April 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. analytic model
      2. rogue ap
      3. segmental tcp jitter
      4. sequential hypothesis testing

      Qualifiers

      • Poster

      Conference

      WWW '08
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 08 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2018)User-side evil twin attack detection using time-delay statistics of TCP connection termination2018 20th International Conference on Advanced Communication Technology (ICACT)10.23919/ICACT.2018.8323700(211-216)Online publication date: Feb-2018
      • (2016)Finding proxy users at the service using anomaly detection2016 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2016.7860473(82-90)Online publication date: Oct-2016
      • (2011)WiFiHop - mitigating the Evil twin attack through multi-hop detectionProceedings of the 16th European conference on Research in computer security10.5555/2041225.2041228(21-39)Online publication date: 12-Sep-2011
      • (2009)Using end-to-middle security to protect against evil twin access points2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops10.1109/WOWMOM.2009.5282395(1-6)Online publication date: Jun-2009

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media