Enhancing the security of corporate Wi-Fi networks using DAIR
Proceedings of the 4th international conference on Mobile systems, applications and services
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Robust Detection of Unauthorized Wireless Access Points
Mobile Networks and Applications
Hi-index | 0.00 |
For easy installation and increasing the use of wireless LAN access points (AP), an unauthorized AP can be quickly plugged into the LANs of most organizations. Unauthorized APs are also termed rogue APs, and can seriously threaten network security. Detecting the existence of rogue APs has become an important research topic. A rogue AP should work by broadcasting wireless packets. This paper proposes a rogue AP detection system based on sensing the existence of AP packets. Once the MAC address of the AP packets is not on a white list, the system will find the location of the suspected AP. If the location of the suspected AP is outside the managed area, this AP will be classified into be a neighbor AP. Conversely, the suspected AP will be deemed a rogue AP. The proposed system adopts the AP with an open source firmware, OpenWrt, and an open source MAC layer sniffing application, kismet, to monitor wireless packets. The research demonstrated efficient detection of rogue APs and can further strengthen the security of wireless networks.