Rogue access point detection by analyzing network traffic characteristics

Sachin Shetty, Min Song, Ma Liran

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

48 Scopus citations

Abstract

One of the most challenging network security concerns for network administrators is the presence of rogue access points. Rogue access points, if undetected, can be an open door to sensitive information on the network. Many data raiders have taken advantage of the undetected rogue access points in enterprises to not only get free Internet access, but also to view confidential information. Most of the current solutions to detect rouge access points are not automated and are dependent on a specific wireless technology. In this paper, we present a rogue access point detection approach. The approach is an automated solution which can be installed on any router at the edge of a network. The main premise of our approach is to distinguish authorized WLAN hosts from unauthorized WLAN hosts connected to rogue access points by analyzing traffic characteristics at the edge of a network. Simulation results verify the effectiveness of our approach in detecting rogue access points in a heterogeneous network comprised of wireless and wired subnets.

Original languageEnglish
Title of host publicationMilitary Communications Conference, MILCOM 2007
DOIs
StatePublished - 2007
EventMilitary Communications Conference, MILCOM 2007 - Orlando, FL, United States
Duration: 29 Oct 200731 Oct 2007

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Conference

ConferenceMilitary Communications Conference, MILCOM 2007
Country/TerritoryUnited States
CityOrlando, FL
Period29/10/0731/10/07

Keywords

  • Detection
  • Rogue access point
  • Traffic characteristics

Fingerprint

Dive into the research topics of 'Rogue access point detection by analyzing network traffic characteristics'. Together they form a unique fingerprint.

Cite this