JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP
Jang, Rhong-Ho; Kang, Jeon-Il; Nyang, Dae-Hun; Lee, Kyung-Hee;
  PDF(new window)
 Abstract
As more people use Wi-Fi and hotspot, unauthorized APs become one of big security problems in modern society. From the beginning of 2010, researchers study about unauthorized AP continually and contributed a lot of methods of detecting unauthorized AP that use wireless resources. Many researches about unauthorized AP detection use time-delay measurement (e.g., average or standard deviation) which is caused by additional wireless connection. In the most previous researches, however, the unauthorized APs consist of laptop and pulg-in Wi-Fi adaptor, and researchers did not concern about time-delay caused by software network sharing. In this paper, we show that existing unauthorized AP detection scheme that can not efficiently classify the high performance unauthorized AP.
 Keywords
evil-twin;unauthorized AP detection;high-performance unauthorized AP;wireless LAN;time-delay;
 Language
Korean
 Cited by
 References
1.
P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill, "Enhancing the security of corporate Wi-Fi networks using DAIR," MobiSys, pp. 1-14, Uppsala, Sweden, Jun. 2006.

2.
D. Schweitzer, W. Brown, and J. Boleng, "Using visualization to locate rogue access points," J. Computing Sci. Colleges, vol. 23, no. 1, pp. 134-140, Oct. 2007.

3.
R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, "Rogue access point detection using temporal traffic characteristics," in Global Telecommun. Conf., pp. 2271-2275, Dallas, USA, Nov. 2004.

4.
W. Wei, K. Suh, B. Wang, Y. Gu, and J. Kurose, "Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-Pairs," in Proc. ACM SIGCOMM, pp. 365-378, San Diego, USA, Oct. 2007.

5.
H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, "A timing-based scheme for rogue AP detection," IEEE Trans. Parallel and Distrib. Syst., vol. 22, no. 11, pp. 1912-1925, Nov. 2011. crossref(new window)

6.
S. Kang, D. Nyang, J. Choi, and S. Lee, "Relaying rogue AP detection scheme using SVM," J. The Korea Inst. Inf. Security & Cryptology, vol. 23, no. 2, Jun. 2013.

7.
J. Lee, S. Lee, and J. Moon, "Detecting rogue AP using k-SVM method," J. The Korea Inst. Inf. Security & Cryptology, vol. 24, no. 1, Feb. 2013.

8.
UCLA.edu, [Click], http://read.cs.ucla.edu/click/click