IEEE Global Telecommunications Conference, 2004. GLOBECOM '04.
DOI: 10.1109/glocom.2004.1378413
|View full text |Cite
|
Sign up to set email alerts
|

Rogue access point detection using temporal traffic characteristics

Abstract: As the cost of 802.11 hardware continues to fall, the appeal of inserting unauthorized wireless access into enterprise networks grows. These rogue access points (APs) expose the enterprise network to a barrage of security vulnerabilities in that they are typically connected to a network port behind the firewall. Most of the current approaches to detecting rogue APs are rudimentary and are easily evaded by hackers. We propose the use of temporal traffic characteristics to detect rogue APs at a central location.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
44
0

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 74 publications
(45 citation statements)
references
References 0 publications
0
44
0
Order By: Relevance
“…In [14], the authors were among the earliest to suggest using temporal characteristics, such as interpacket arrival time to detect rogue APs. Later work by Shetty et al [7] builds on this idea by creating an automated classifier.…”
Section: Related Workmentioning
confidence: 99%
“…In [14], the authors were among the earliest to suggest using temporal characteristics, such as interpacket arrival time to detect rogue APs. Later work by Shetty et al [7] builds on this idea by creating an automated classifier.…”
Section: Related Workmentioning
confidence: 99%
“…Baiamonte et al [5] use entropies to detect wireless traffic based on traffic collected at an aggregation point. Beyah et al [8] use visual inspection to detect wireless hosts. Mano et al [24] propose a technique that segments large packets into smaller ones to detect wireless traffic.…”
Section: Related Workmentioning
confidence: 99%
“…(Ma, et al, 2007) categorises Rogues AP into one of four classes;  Improperly configured AP,  Unauthorised AP,  Phishing AP,  Compromised AP. Detection of unauthorised APs is the most common class addressed by research into Rogue APs (Beyah, et al, 2004). The existence of poorly configured APs in practice is outlined in (Percoco, 2010), where "poor security settings" is one of the top two threat vectors in practical cyber security instances.…”
Section: Introductionmentioning
confidence: 99%