TY - GEN
T1 - Rogue access point detection by analyzing network traffic characteristics
AU - Shetty, Sachin
AU - Song, Min
AU - Liran, Ma
PY - 2007
Y1 - 2007
N2 - One of the most challenging network security concerns for network administrators is the presence of rogue access points. Rogue access points, if undetected, can be an open door to sensitive information on the network. Many data raiders have taken advantage of the undetected rogue access points in enterprises to not only get free Internet access, but also to view confidential information. Most of the current solutions to detect rouge access points are not automated and are dependent on a specific wireless technology. In this paper, we present a rogue access point detection approach. The approach is an automated solution which can be installed on any router at the edge of a network. The main premise of our approach is to distinguish authorized WLAN hosts from unauthorized WLAN hosts connected to rogue access points by analyzing traffic characteristics at the edge of a network. Simulation results verify the effectiveness of our approach in detecting rogue access points in a heterogeneous network comprised of wireless and wired subnets.
AB - One of the most challenging network security concerns for network administrators is the presence of rogue access points. Rogue access points, if undetected, can be an open door to sensitive information on the network. Many data raiders have taken advantage of the undetected rogue access points in enterprises to not only get free Internet access, but also to view confidential information. Most of the current solutions to detect rouge access points are not automated and are dependent on a specific wireless technology. In this paper, we present a rogue access point detection approach. The approach is an automated solution which can be installed on any router at the edge of a network. The main premise of our approach is to distinguish authorized WLAN hosts from unauthorized WLAN hosts connected to rogue access points by analyzing traffic characteristics at the edge of a network. Simulation results verify the effectiveness of our approach in detecting rogue access points in a heterogeneous network comprised of wireless and wired subnets.
KW - Detection
KW - Rogue access point
KW - Traffic characteristics
UR - http://www.scopus.com/inward/record.url?scp=47949122729&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=47949122729&partnerID=8YFLogxK
U2 - 10.1109/MILCOM.2007.4455018
DO - 10.1109/MILCOM.2007.4455018
M3 - Conference contribution
AN - SCOPUS:47949122729
SN - 1424415136
SN - 9781424415137
T3 - Proceedings - IEEE Military Communications Conference MILCOM
BT - Military Communications Conference, MILCOM 2007
T2 - Military Communications Conference, MILCOM 2007
Y2 - 29 October 2007 through 31 October 2007
ER -