Title
User-side Wi-Fi Evil Twin Attack detection using SSL/TCP protocols
Abstract
Evil Twin Attack (ETA) refers to a rogue Wi-Fi Access Point (AP) that appears to be a legitimate one but actually has been set up to eavesdrop on wireless communications [1]. Most of existing detection techniques assume that the attacker will use the same legitimate wireless network gateway to pass through victim's wireless data. These detection methods will fail if the attacker uses a different gateway, such as using his own broadband cellular connection through his own smartphone. In this paper, we present a new client-side detection method to detect such an ETA that uses a different gateway from the legitimate one. It relies on SSL/TCP connection to an arbitrary remote web server to avoid attacker's misleading message, and trying to detect the changing of gateway's public IP address by switching from one AP to another in the middle of the SSL/TCP connection. The detection method is on the client side which makes it more convenient for users to deploy and ensure their security.
Year
DOI
Venue
2015
10.1109/CCNC.2015.7157983
2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC)
Keywords
Field
DocType
Evil Twin Attack,Wi-Fi security,TCP,SSL
Client-side,Wireless network,Wireless,Computer security,Computer science,Server,Computer network,Default gateway,Transmission Control Protocol,Web server,Evil twin
Conference
ISSN
Citations 
PageRank 
2331-9852
3
0.42
References 
Authors
5
4
Name
Order
Citations
PageRank
Omar Nakhila163.54
Erich Dondyk2111.65
M. Faisal Amjad3218.90
Cliff C. Zou4102.59