Browse > Article
http://dx.doi.org/10.13089/JKIISC.2014.24.1.87

Detecting Rogue AP using k-SVM method  

Lee, Jae-Wook (Graduate School of Information Security, Korea University)
Lee, Si-Young (Graduate School of Information Security, Korea University)
Moon, Jong-Sub (Graduate School of Information Security, Korea University)
Abstract
Under only authorized AP is allowable environment, rogue AP which is generated by a smartphone tethering can be a serious security breach. To solve rogue AP problem, this paper proposes classifying algorithm of Kernel Support Vector Machine using features of RTT data. Through our experiment, we can detect rogue AP from LTE mobile network.
Keywords
Rogue AP; Network; SVM; LTE;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Phil Simon, "Too Big to Ignore: The Business Case for Big Data," Wiley and SAS Business Series, pp 89-90, 2013.
2 John Robert Anderson et al,. "Machine Learning: An artificial intelligence approach," Morgan Kaufmann, pp. 19, 1986.
3 Bernhard E. Boser, Isabelle M. Guyon, and Vladimir N. Vapnik, "A training algorithm for optimal margin classifiers," Proceedings of the fifth annual workshop on Computational learning theory, pp. 144-152, Jul. 1992.
4 Vladimir N. Vapnik, "The nature of statistical learning theory," Springer, pp. 133-136, 2000.
5 Colin Campbell and Nello Cristianini, "Simple learning algorithms for training support vector machines," Technical report, University of Bristol, 1998.
6 Massimiliano Pontil and Alessandro Verri, "Properties of support vector machines," Neural Computation, Vol. 10, No. 4, pp. 955-974, Mar. 1998.   DOI   ScienceOn
7 Simon Haykin, "Neural networks: a comprehensive foundation," Prentice Hall PTR, 1994.
8 Ram Periakaruppan and Evi Nemeth, "GTrace - A Graphical Traceroute Tool," LISA '99 Proceedings of the 13th USENIX conference on System administration, pp 69-78, 1999.
9 Pyeong-jung Song and Yeon-seung Shin, "LTE Mobility Management Technology for Network Convergence," Electronics and Telecommunications Trends, 25(6), Dec. 2010.
10 Mathieu Lacage, Mohammad Hossein Manshaei and Thierry Turletti, "IEEE 802.11 rate adaptation: a practical approach," Proceedings of the 7th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems, pp. 126-134, Oct. 2004.
11 Holma H. and Toskala A., "LTE for UMTS : OFDMA and SCFDMA Based Radio Access," Wiley, pp. 244-245, 2009.
12 Kenneth Jonsson et al., "Support vector machines for face authentication," Image and Vision Computing, Vol. 20, Issue 5-6, pp. 369-375, Apr. 2002.   DOI
13 accord - Accord.NET Framework, http://code.google.com/p/accord/
14 B. Caputo et al., "Appearance-based Object Recognition using SVMs: Which Kernel Should I Use?," Proc of NIPS workshop on Statistical methods for computational experiments in visual processing and computer vision, Whistler, Dec. 2002.
15 Tarek S. Sobh, "Wi-Fi Networks Security and Accessing Control," IJCNIS, Vol. 5, No. 7, pp.9-20, Jun. 2013.
16 IEEE P802.11i/D10.0, "Medium Access Control(MAC) security enhancements, amendment 6 to IEEE Standard for local and metropolitan area networks part 11: Wireless Medium Access Control (MAC) and Physical Layer (PHY) specifications," Apr. 2004.
17 Changhua He and John C. Mitchell, "Security Analysis and Improvements for IEEE 802.11i," The 12th Annual Network and Distributed System Security Symposium (NDSS'05) Stanford University, pp. 90-110, Feb. 2005.
18 Henry Paul S and Hui Luo, "WiFi: what's next?," Communications Magazine IEEE, Vol. 40, Issue 12, pp. 66-72, Dec. 2002.
19 Paramvir Bahl et al., "Enhancing the security of corporate Wi-Fi networks using DAIR," Proceedings of the 4th international conference on Mobile systems, applications and services, pp. 1-14, Jun. 2006.
20 Daisuke Takahashi et al., "IEEE 802.11 user fingerprinting and its applications for intrusion detection," Computers & Mathematics with Applications, Vol. 60, Issue 2, pp. 307-318, Jul. 2010.   DOI
21 AirDefense Services Platform - Motorola Solutions USA, http://www.airdefense.net
22 The award-winning wireless networking tool and the best source for your daily Wi-Fi, WiMAX, 3G and VoIP news. NetSt umbler, http://www.netstumbler.com/
23 Wei Wei et al., "Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs," Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pp. 365-378, Oct. 2007.
24 RogueScanner Free System Administrat ion software downloads at SourceForge. net, http://sourceforge.net/projects/roguescanner/
25 Dino Schweitzer, Wayne Brown and Jeff Boleng, "Using visualization to locate rogue access points," Journal of Computing Sciences in Colleges, Vol. 23, Issue 1, pp. 134-140, Oct. 2007.
26 Payal Bhatia, Christine Laurendeau, and Michel Barbeau, "Solution to the wireless evil-twin transmitter attack," Risks and Security of Internet and Systems (CRiSIS2010), pp. 1-7, Oct. 2010.
27 Kuo-Fong Kao et al., "A location-aware rogue AP detection system based on wireless packet sniffing of sensor APs," Proceedings of the 2011 ACM Symposium on Applied Computing, pp. 32-36, Mar. 2011.
28 Paramvir Bahl, and Venkata N. Padmanabhan, "RADAR: An in-building RF-based user location and tracking system," INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, Vol. 2, pp. 775-784, Mar. 2000.
29 Beyah Raheem et al., "Rogue access point detection using temporal traffic characteristics," Global Telecommunications Conference, 2004. GLOBECOM'04. IEEE, Vol. 7, pp. 2271-2275, Dec. 2004.
30 Lanier Watkins, Raheem Beyah, and Cherita Corbett, "A passive approach to rogue access point detection," Global Telecommunications Conference 2007 (GLOBECOM'07), pp. 355-360, Nov. 2007.
31 Hao Han et al., "A measurement based rogue AP detection scheme," INFOCOM 2009, pp. 1593-1601, Apr. 2009.