Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy 2022
DOI: 10.1145/3508398.3519360
|View full text |Cite
|
Sign up to set email alerts
|

kTRACKER: Passively Tracking KRACK using ML Model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 3 publications
0
1
0
Order By: Relevance
“…However, their focus was solely on detecting KRACK attacks. Similar works include [44]- [46]. It is important to note that these machines learning based defense mechanisms have not been evaluated in real networks but rather assessed using the publicly available AWID3 dataset [26].…”
Section: ) Stage 2 Defense Mechanismsmentioning
confidence: 99%
“…However, their focus was solely on detecting KRACK attacks. Similar works include [44]- [46]. It is important to note that these machines learning based defense mechanisms have not been evaluated in real networks but rather assessed using the publicly available AWID3 dataset [26].…”
Section: ) Stage 2 Defense Mechanismsmentioning
confidence: 99%
“…Publicly available information on the Krack attack includes information about the attack itself. There is no guarantee that every device will have a patch and be protected from these attacks coming from any networked point [38,39]. The four-way handshake procedure, which is a crucial part of the IEEE 802.11 protocol has a serious weakness that allows any attacker to decode a user's communication without eavesdropping on the handshake or knowing the encryption key, according to [40].…”
Section: Krack Attackmentioning
confidence: 99%
“…The authors in [38] used a state-machine architecture to find Krack attacks by monitoring numerous wireless channels. To specifically identify the Krack symptoms at various points of a handshake session, they undertook deep packet inspection and created a grouping method to group Wi-Fi handshake packets.…”
Section: Comparing Our Findings With Previous Studiesmentioning
confidence: 99%