A novel traceroute-based detection scheme for Wi-Fi Evil twin attacks

Alex Burns, Longfei Wu, Xiaojiang Du, Liehuang Zhu

科研成果: 期刊稿件会议文章同行评审

15 引用 (Scopus)

摘要

Wi-Fi has been widely used in our work, home, and many other places, such as hotels and airports. However, the data may be leaked if the access through Wi-Fi is not well-guarded. Wi-Fi hotspots are deployed in an unprecedented speed to facilitate people's lives. The open access nature makes them vulnerable to an evil twin access point (AP), which has the same service set id (SSID) as the legitimate AP and larger signal strength. Current Wi-Fi capable devices are not able to detect the evil twin attack, and will automatically switch to the bogus AP. In this paper, we devise a novel detection scheme based on the commonly used network diagnostic tool traceroute. A remote detection server is set up so that the client-to-server and server-to-client traceroute results are compared. If the evil twin AP is present, it will attempt to conceal the legitimate AP. The inconsistency among the two traceroute results will reveal the evil twin attack. We first present the attack model, then describe the detection scheme in detail. In our implementation, a Nexus 4 smartphone serves as the client, a desktop PC with a USB wireless adapter is set up as the evil twin AP, and the detection service is running on an Amazon EC2 Server. The experimental result demonstrates that our scheme can effectively detect an evil twin attack.

源语言英语
页(从-至)1-6
页数6
期刊Proceedings - IEEE Global Communications Conference, GLOBECOM
2018-January
DOI
出版状态已出版 - 2017
活动2017 IEEE Global Communications Conference, GLOBECOM 2017 - Singapore, 新加坡
期限: 4 12月 20178 12月 2017

指纹

探究 'A novel traceroute-based detection scheme for Wi-Fi Evil twin attacks' 的科研主题。它们共同构成独一无二的指纹。

引用此