A location-aware rogue AP detection system based on wireless packet sniffing of sensor APs

  • Authors:
  • Kuo-Fong Kao;Tau-Heng Yeo;Wai-Shuen Yong;Hui-Hsuan Chen

  • Affiliations:
  • Hsiuping Institute of Technology, Taiwan, R. O. C.;Hsiuping Institute of Technology, Taiwan, R. O. C.;Hsiuping Institute of Technology, Taiwan, R. O. C.;Hsiuping Institute of Technology, Taiwan, R. O. C.

  • Venue:
  • Proceedings of the 2011 ACM Symposium on Applied Computing
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

For easy installation and increasing the use of wireless LAN access points (AP), an unauthorized AP can be quickly plugged into the LANs of most organizations. Unauthorized APs are also termed rogue APs, and can seriously threaten network security. Detecting the existence of rogue APs has become an important research topic. A rogue AP should work by broadcasting wireless packets. This paper proposes a rogue AP detection system based on sensing the existence of AP packets. Once the MAC address of the AP packets is not on a white list, the system will find the location of the suspected AP. If the location of the suspected AP is outside the managed area, this AP will be classified into be a neighbor AP. Conversely, the suspected AP will be deemed a rogue AP. The proposed system adopts the AP with an open source firmware, OpenWrt, and an open source MAC layer sniffing application, kismet, to monitor wireless packets. The research demonstrated efficient detection of rogue APs and can further strengthen the security of wireless networks.