Browse > Article
http://dx.doi.org/10.7840/kics.2015.40.3.551

Analysis of Time-Based Unauthorized AP Detection Methods According to Hardware Performance of Unauthorized AP  

Jang, Rhong-Ho (Inha University Computer Science Engineering)
Kang, Jeon-Il (Inha University Computer Science Engineering)
Nyang, Dae-Hun (Inha University Computer Science Engineering)
Lee, Kyung-Hee (The University of Suwon Electrical Engineering)
Abstract
As more people use Wi-Fi and hotspot, unauthorized APs become one of big security problems in modern society. From the beginning of 2010, researchers study about unauthorized AP continually and contributed a lot of methods of detecting unauthorized AP that use wireless resources. Many researches about unauthorized AP detection use time-delay measurement (e.g., average or standard deviation) which is caused by additional wireless connection. In the most previous researches, however, the unauthorized APs consist of laptop and pulg-in Wi-Fi adaptor, and researchers did not concern about time-delay caused by software network sharing. In this paper, we show that existing unauthorized AP detection scheme that can not efficiently classify the high performance unauthorized AP.
Keywords
evil-twin; unauthorized AP detection; high-performance unauthorized AP; wireless LAN; time-delay;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, and B. Zill, "Enhancing the security of corporate Wi-Fi networks using DAIR," MobiSys, pp. 1-14, Uppsala, Sweden, Jun. 2006.
2 D. Schweitzer, W. Brown, and J. Boleng, "Using visualization to locate rogue access points," J. Computing Sci. Colleges, vol. 23, no. 1, pp. 134-140, Oct. 2007.
3 R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, "Rogue access point detection using temporal traffic characteristics," in Global Telecommun. Conf., pp. 2271-2275, Dallas, USA, Nov. 2004.
4 W. Wei, K. Suh, B. Wang, Y. Gu, and J. Kurose, "Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-Pairs," in Proc. ACM SIGCOMM, pp. 365-378, San Diego, USA, Oct. 2007.
5 H. Han, B. Sheng, C. C. Tan, Q. Li, and S. Lu, "A timing-based scheme for rogue AP detection," IEEE Trans. Parallel and Distrib. Syst., vol. 22, no. 11, pp. 1912-1925, Nov. 2011.   DOI   ScienceOn
6 S. Kang, D. Nyang, J. Choi, and S. Lee, "Relaying rogue AP detection scheme using SVM," J. The Korea Inst. Inf. Security & Cryptology, vol. 23, no. 2, Jun. 2013.
7 J. Lee, S. Lee, and J. Moon, "Detecting rogue AP using k-SVM method," J. The Korea Inst. Inf. Security & Cryptology, vol. 24, no. 1, Feb. 2013.
8 UCLA.edu, [Click], http://read.cs.ucla.edu/click/click