Rogue access point detection: Taxonomy, challenges, and future directions
Abstract Wireless Local Area Networks (WLANs) are increasingly integrated into our daily
lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are …
lives. Access Points (APs) are an integral part of the WLAN infrastructure, as they are …
[KİTAP][B] The state of the art in intrusion prevention and detection
ASK Pathan - 2014 - api.taylorfrancis.com
Most of the security threats in various communications networks are posed by the illegitimate
entities that enter or intrude within the network perimeter, which could commonly be termed …
entities that enter or intrude within the network perimeter, which could commonly be termed …
A timing-based scheme for rogue AP detection
This paper considers a category of rogue access points (APs) that pretend to be legitimate
APs to lure users to connect to them. We propose a practical timing-based technique that …
APs to lure users to connect to them. We propose a practical timing-based technique that …
Who is pee** at your passwords at Starbucks?—To catch an evil twin access point
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like …
(WLANs). An evil twin is essentially a phishing (rogue) Wi-Fi access point (AP) that looks like …
Active user-side evil twin access point detection using statistical techniques
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks
(WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like …
(WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like …
A hybrid rogue access point protection framework for commodity Wi-Fi networks
We develop a practical and comprehensive hybrid rogue access point (AP) detection
framework for commodity Wi-Fi networks. It is the first scheme that combines the distributed …
framework for commodity Wi-Fi networks. It is the first scheme that combines the distributed …
A measurement based rogue ap detection scheme
This paper considers a category of rogue access points (APs) that pretend to be legitimate
APs to lure users to connect to them. We propose a practical timing based technique that …
APs to lure users to connect to them. We propose a practical timing based technique that …
Securing SSL certificate verification through dynamic linking
A Bates, J Pletcher, T Nichols, B Hollembaek… - Proceedings of the …, 2014 - dl.acm.org
Recent discoveries of widespread vulnerabilities in the SSL/TLS protocol stack, particular
with regard to the verification of server certificates, has left the security of the Internet's …
with regard to the verification of server certificates, has left the security of the Internet's …
Cetad: Detecting evil twin access point attacks in wireless hotspots
Wireless hotspots allow users to use Internet via Wi-Fi interface, and many shops, cafés,
parks, and airports provide free wireless hotspot services to attract customers. However …
parks, and airports provide free wireless hotspot services to attract customers. However …
Detection of man‐in‐the‐middle attacks using physical layer wireless security techniques
Compared with a wired network, a wireless network is not protected by the cable
transmission medium. Information is broadcasted over the air and it can be intercepted by …
transmission medium. Information is broadcasted over the air and it can be intercepted by …