Abstract | ||
---|---|---|
Evil Twin Attack (ETA) refers to a rogue Wi-Fi Access Point (AP) that appears to be a legitimate one but actually has been set up to eavesdrop on wireless communications [1]. Most of existing detection techniques assume that the attacker will use the same legitimate wireless network gateway to pass through victim's wireless data. These detection methods will fail if the attacker uses a different gateway, such as using his own broadband cellular connection through his own smartphone. In this paper, we present a new client-side detection method to detect such an ETA that uses a different gateway from the legitimate one. It relies on SSL/TCP connection to an arbitrary remote web server to avoid attacker's misleading message, and trying to detect the changing of gateway's public IP address by switching from one AP to another in the middle of the SSL/TCP connection. The detection method is on the client side which makes it more convenient for users to deploy and ensure their security. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1109/CCNC.2015.7157983 | 2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) |
Keywords | Field | DocType |
Evil Twin Attack,Wi-Fi security,TCP,SSL | Client-side,Wireless network,Wireless,Computer security,Computer science,Server,Computer network,Default gateway,Transmission Control Protocol,Web server,Evil twin | Conference |
ISSN | Citations | PageRank |
2331-9852 | 3 | 0.42 |
References | Authors | |
5 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Omar Nakhila | 1 | 6 | 3.54 |
Erich Dondyk | 2 | 11 | 1.65 |
M. Faisal Amjad | 3 | 21 | 8.90 |
Cliff C. Zou | 4 | 10 | 2.59 |