Progress-based regulation of low-importance processes
Proceedings of the seventeenth ACM symposium on Operating systems principles
Analysis of a local-area wireless network
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Making Everyday Life Easier Using Dense Sensor Networks
UbiComp '01 Proceedings of the 3rd international conference on Ubiquitous Computing
Security flaws in 802.11 data link protocols
Communications of the ACM - Wireless networking security
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
Proceedings of the 10th annual international conference on Mobile computing and networking
The changing usage of a mature campus-wide wireless network
Proceedings of the 10th annual international conference on Mobile computing and networking
Sextant: a unified node and event localization framework using non-convex constraints
Proceedings of the 6th ACM international symposium on Mobile ad hoc networking and computing
Characterizing mobility and network usage in a corporate wireless local-area network
Proceedings of the 1st international conference on Mobile systems, applications and services
Analysis of a campus-wide wireless network
Wireless Networks
802.11 denial-of-service attacks: real vulnerabilities and practical solutions
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Architecture of secure cross-platform and network communications
Proceedings of the 2nd international conference on Ubiquitous information management and communication
Designing high performance enterprise Wi-Fi networks
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Wide-scale data stream management
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
On fast and accurate detection of unauthorized wireless access points using clock skews
Proceedings of the 14th ACM international conference on Mobile computing and networking
Blue-Fi: enhancing Wi-Fi performance using bluetooth signals
Proceedings of the 7th international conference on Mobile systems, applications, and services
RAP: protecting commodity wi-fi networks from rogue access points
The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops
Metronome: coordinating spectrum sharing in heterogeneous wireless networks
COMSNETS'09 Proceedings of the First international conference on COMmunication Systems And NETworks
WiPal: efficient offline merging of IEEE 802.11 traces
ACM SIGMOBILE Mobile Computing and Communications Review
Robust Detection of Unauthorized Wireless Access Points
Mobile Networks and Applications
On the reliability of wireless fingerprinting using clock skews
Proceedings of the third ACM conference on Wireless network security
Refocusing in 802.11 wireless measurement
PAM'08 Proceedings of the 9th international conference on Passive and active network measurement
Performance sensitivities of wireless mesh networks under path-based DoS attacks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Dyson: an architecture for extensible wireless LANs
USENIXATC'10 Proceedings of the 2010 USENIX conference on USENIX annual technical conference
Aegis: physical space security for wireless networks with smart antennas
IEEE/ACM Transactions on Networking (TON)
A location-based management system for enterprise wireless LANs
NSDI'07 Proceedings of the 4th USENIX conference on Networked systems design & implementation
A location-aware rogue AP detection system based on wireless packet sniffing of sensor APs
Proceedings of the 2011 ACM Symposium on Applied Computing
WiFiHop - mitigating the Evil twin attack through multi-hop detection
ESORICS'11 Proceedings of the 16th European conference on Research in computer security
Identifying 802.11 traffic from passive measurements using iterative Bayesian inference
IEEE/ACM Transactions on Networking (TON)
Towards programmable enterprise WLANS with Odin
Proceedings of the first workshop on Hot topics in software defined networks
Sniffer channel selection for monitoring wireless LANs
Computer Communications
Modeling adaptive rate video transmission in Wi-Fi MANET
Proceedings of the 7th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Robust authentication of public access points using digital certificates: a novel approach
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Hi-index | 0.00 |
We present a framework for monitoring enterprise wireless networks using desktop infrastructure. The framework is called DAIR, which is short for Dense Array of Inexpensive Radios. We demonstrate that the DAIR framework is useful for detecting rogue wireless devices (e.g., access points) attached to corporate networks, as well as for detecting Denial of Service attacks on Wi-Fi networks.Prior proposals in this area include monitoring the network via a combination of access points (APs), mobile clients, and dedicated sensor nodes. We show that a dense deployment of sensors is necessary to effectively monitor Wi-Fi networks for certain types of threats, and one can not accomplish this using access points alone. An ordinary, single-radio AP can not monitor multiple channels effectively, without adversely impacting the associated clients. Moreover, we show that a typical deployment of access points is not sufficiently dense to detect the presence of rogue wireless devices. Due to power constraints, mobile devices can provide only limited assistance in monitoring wireless networks. Deploying a dense array of dedicated sensor nodes is an expensive proposition.Our solution is based on two simple observations. First, in most enterprise environments, one finds plenty of desktop machines with good wired connectivity, and spare CPU and disk resources. Second, inexpensive USB-based wireless adapters are commonly available. By attaching these adapters to desktop machines, and dedicating the adapters to the task of monitoring the wireless network, we create a low cost management infrastructure.