Reference : Undesired Relatives: Protection Mechanisms Against The Evil Twin Attack in IEEE 802.11 |
Scientific congresses, symposiums and conference proceedings : Paper published in a book | |||
Engineering, computing & technology : Computer science | |||
http://hdl.handle.net/10993/17479 | |||
Undesired Relatives: Protection Mechanisms Against The Evil Twin Attack in IEEE 802.11 | |
English | |
Lanze, Fabian ![]() | |
Panchenko, Andriy ![]() | |
Ponce-Alcaide, Ignacio ![]() | |
Engel, Thomas ![]() | |
Sep-2014 | |
Proceedings of the 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks | |
Yes | |
The 10th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet'14) | |
21.09.2014 | |
[en] Evil Twin Attack ; Survey ; Fake AP ; Software AP ; Detection | |
[en] Commonly used identifiers for IEEE 802.11 access points
(APs), such as network name (SSID), MAC (BSSID), or IP address can be trivially spoofed. Impersonating existing APs with faked ones to attract their traffic is referred to in the literature as the evil twin attack. It allows an attacker with little effort and expenditure to fake a genuine AP and intercept, collect, or alter (potentially even encrypted) data. Due to its severity, the topic has gained remarkable research interest in the past decade. In this paper, we introduce a differentiated attacker model to express the attack in all its facets. We propose a taxonomy for classifying and struc- turing countermeasures and apply it to existing approaches. We are the first to conduct a comprehensive survey in this domain to reveal the potential and the limits of state-of- the-art solutions. Our study discloses an important attack scenario which has not been addressed so far, i.e., the usage of specialized software to mount the attack. We propose and experimentally validate a novel method to detect evil twin APs operated by software within a few seconds. | |
http://hdl.handle.net/10993/17479 | |
FP7 ; 288535 - CONFINE - Community Networks Testbed for the Future Internet |
File(s) associated to this reference | ||||||||||||||
Fulltext file(s):
| ||||||||||||||
All documents in ORBilu are protected by a user license.