A. Bybrid Rouge
A. Bybrid Rouge
Abstract—We develop a practical and comprehensive hybrid rogue device because the AP itself is not malfunctioning (e.g.,
rogue access point (AP) detection framework for commodity Wi- operating without specified security controls). Further, the AP
Fi networks. It is the first scheme that combines the distributed does not display anomalous misbehavior such as broadcasting
wireless media surveillance and the centralized wired end socket
level traffic “fingerprinting.” The former is designed not only a duplicate SSID. Thus, a compromised AP can significantly
to detect various types of rogue APs, but also to discover diminish the overall security of the network. A summary of
suspicious activities so as to prevent the adversaries from turning the types of rogue APs and a number of possible scenarios is
victim APs into rogue devices. Moreover, the socket level traffic shown in Table I. For a detailed taxonomy of rogue APs, we
fingerprinting helps our frame work to achieve a finer granu- refer the readers to Ref. [1].
larity on rogue AP detection among the existing schemes. This
framework has the following nice properties: i) it requires neither
Rogue AP Class Possible Scenarios
specialized hardware nor modification to existing standards; ii) 1. Improperly insufficient security knowledge;
the proposed mechanism greatly improves the rogue AP detection configured faulty driver; physically defective;
probability so that network resilience is improved; iii) it provides multiple network cards
a cost-effective solution to Wi-Fi network security enhancement 2. Unauthorized connected to internal LAN without
by incorporating free but mature software tools; iv) it can permission; external neighborhood AP
protect the network from adversaries capable of using customized 3. Phishing fabricated by adversary
equipment and/or violating the IEEE 802.11 standard; v) its open 4. Compromised disclosure of security credentials
architecture allows extra features to be easily added on in the TABLE I
future. Our analysis and evaluation demonstrate that this hybrid ROGUE AP TAXONOMY AND S CENARIOS.
rogue AP protection framework is capable of reliably revealing
rogue devices and preempting potential attacks.
Index Terms—Rogue access point detection, commodity Wi-Fi
networks, intrusion detection, wireless security. According to an early study by Gartner [2], rogue APs
are present on about 20% of all enterprise networks. The
I. I NTRODUCTION main reason leading to this phenomenon is that advances
in hardware and software have made AP installation, AP
With the increasing popularity of Wi-Fi networks, securing discovery (e.g., finding improperly configured APs), and AP
such a network becomes a challenging problem. Commodity compromise an easy task for attackers. It is convenient to
Wi-Fi networks are particularly vulnerable to attacks because obtain an AP and plug into a network without being discovered
of factors such as open medium, insufficient software im- for some time. Moreover, commodity Wi-Fi network cards
plementations, potential for hardware deficits, and improper that have the capability to capture all 802.11 transmissions
configurations. Among all the security threats, one of the most can currently be purchased for about US $30 on eBay. Hence,
dangerous hazards is the prevalence of rogue APs. A rogue AP the process of driving around and looking for vulnerable APs
is typically referred to as an unauthorized AP in the literature. (known as “wardriving”) can be accomplished by people with
This type of device can be easily deployed by end-users. When limited security backgrounds. In addition, the probability that
a rogue AP is connected to a network, it can be used by an unprotected AP can be exploited is increased by people
adversaries for committing espionage and launching attacks. called warchalkers that document and publicize the locations
Similarly, improperly configured APs and phishing APs of APs.
can introduce the same security threats once exploited by To make matters worse, a properly configured AP with secu-
adversaries. Therefore, they can be regarded as rogue APs rity features enforced can still be compromised, thus becoming
as well. More importantly, there is a more insidious type a rogue AP. As shown in [3]–[5], the most common security
of rogue APs, called the compromised APs, that has drawn protocol, Wired Equivalent Privacy (WEP), has been shown to
little attention in the literature. A compromised AP is the be breakable even when correctly configured. Recently, Wi-Fi
most dangerous rogue AP that can exist in commodity Wi- Protected Access (WPA) has been created in response to the
Fi Networks. In particular, it is difficult to detect such a serious weaknesses that researchers found in WEP. However,
WPA does not necessarily work with the first generation process, and correlate network events. However, the latest
APs. When operating in WPA Pre-Shared Key (PSK) mode, release, AirDefense 7.2, has a starting price of US $7, 995.
a strong passphrase is required. Otherwise, the secret key Lastly, if the specialized monitoring sensors are not used, it is
might be discovered by launching a brute-force dictionary difficult to guarantee a complete coverage of the network to
attack on authentication frames. Another deficiency of WPA ensure effective rogue AP detection.
is that it still relies on the RC4 encryption algorithm. Due to On the other hand, the research community has just recently
these weaknesses in WEP and WPA, an attacker can easily started to direct attention toward rogue AP detection. An
compromise an AP and turn it into a rogue one. architecture for fault diagnostics in IEEE 802.11 networks
Facing such unprecedent challenges, the traditional way is presented in [9]. Multiple APs and mobile clients perform
of protecting networks with encryption and firewalls is no RF monitoring to help detect the presence of rogue wireless
longer sufficient. Thus, several techniques are proposed to devices such as unauthorized APs. Each client is required to
detect the existence of rogue APs in literature. One of the install special diagnostic software, and rogue APs are assumed
most popular approaches is to scan the area of interest with to transmit beacon messages and respond to probe requests. In
a wireless device running on laptops or handheld devices. contrast, our framework does not inconvenience clients with
This idea is also widely adopted in the commercial products additional software installs. Further, its detection ability is not
with advanced features such as non-interactive scanning and based on the assumption that rogue APs will function properly.
continuous monitoring capabilities enabled. However, there Bahl et al. [10] propose a distributed monitoring infrastruc-
still lacks a satisfactory and practical solution that is competent ture called DAIR. It attaches USB wireless adapters to desktop
enough to tackle rogue APs. machines for more comprehensive traffic capturing ability.
We develop a novel hybrid framework for protecting Wi-Fi Although techniques to reduce false positives/negatives are
networks from rogue APs. In this framework, rogue APs are provided, its effectiveness is still dependent on AP functional-
automatically detected and located through the combination of ity that can be easily turned off. Additionally, both of [9] and
a distributed wireless scanning and a centralized traffic “fin- [10] assume that some specific characteristics of IEEE 802.11
gerprinting.” Accordingly, it includes two major components: standards cannot be violated by the adversaries. Conversely,
a distribution detection module (DDM) and a centralized our proposed framework avoids their limiting dependencies,
detection module (CDM). The former can be connected to and provides protection from types of rogue APs that they
or implemented on APs as small plugins, while the latter is cannot detect.
located at the gateway router of a local network. In addition, Differences in inter-packet spacing between traffic flows
our framework works in conjunction with current security on wired and wireless networks is used in [11], [12] for
protocols such as WEP and WPA, and it does not require identification of rogue APs. However, the scheme does not
any specialized wireless hardware. Furthermore, it can protect differentiate between wireless traffic from authorized and
the network from adversaries using customized equipment unauthorized APs. It also assumes that APs will be connected
and/or violating the IEEE 802.11 standard. Lastly, it works within one hop to a switch monitoring the traffic, and relies
consistently under various network configurations. on visual inspection of traffic characteristics.
The rest of the paper is organized as follows. Section II Multiple network sniffers are used in [13] for detecting
discusses related work. The proposed rogue AP protection rogue APs and eavesdroppers. Each sniffer has three network
framework is elaborated in Section III, and the detailed cards, and the intrusion detection capabilities are stymied by
analysis is provided in Section IV. The evaluation results are MAC address spoofing. Yeo et al. [14] improve the perfor-
presented in Seciont V. Finally, our conclusion and future mance of wireless monitoring by merging packet captures from
research directions appear in Section VI. multiple network sniffers and carefully selecting sniffer place-
ment. The techniques are exploited to characterize MAC layer
II. R ELATED W ORK traffic and perform retrospective diagnoses. Our framework
Due to the security threats that a rogue AP can pose provides techniques to detect rogue APs that have spoofed
for corporate Wi-Fi networks, detecting such APs is one of MAC addresses without relying on heavily equipped sniffers.
the most important tasks of an IT department. Traditional It can also detect sophisticated eavesdroppers and avert AP
rogue AP detection relies on network enumeration tools (e.g., compromise.
NetStumbler) running on laptops or handheld devices carried Recently, two passive online rogue AP detection algorithms
by IT personnel. This “walking audit” approach is both time- are proposed in [15]. The core of these two algorithms are the
consuming and unreliable. Further it fails when a rogue AP sequential hypothesis tests applied to packet-header data that
spoofs characteristics such as the MAC address and Service are passively collected at a monitoring point. Both algorithms
Set Identifier (SSID) of a legitimate AP. exploit the fundamental properties of the 802.11 CSMA/CA
To help automate the scanning process and provide continu- mechanism and the half duplex nature of wireless channels to
ous monitoring capabilities, a number of commercial products differentiate wired and wireless LAN TCP traffic. Once TCP
have been developed [6]–[8]. AirDefense [6] is one such ACK-pairs are observed, prompt decisions are made with little
product. It uses a combination of radio frequency sensors and computation and storage overhead. Yin et al. [16] propose a
an intrusion detection/protection server appliance to capture, layer-3 rogue AP detection approach using the combination
1895
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceedings.
of a verifier and wireless sniffers. In this approach, a verifier Detection and Containment
on the internal wired network is employed to send test traffic - OS fingerprints
- wireless NIC driver
towards wireless edge. Once wireless sniffers capture an AP fingerprints
relaying the test packets, the AP is flagged as rogue. In >probing timing
>rate adaptation Probing Functions
addition, binary hypothesis testing technique is adopted to - traffic fingerprints - customized ARP
improve the robustness of detection. requests
- probe requests
Our proposed framework differs from previous work in >SSID
that it provides robust and comprehensive protection against >channel
Monitoring and Preemption >security protocol
rogue APs through a novel coupling of rogue AP preemption - promiscuous nodes >RSSI/location
and detection. It also defends against a more insidious type - unregistered MACs
- duplicate MACs
of rogue APs, i.e., the compromised APs, that has never - spoofed management
been addressed in the literature before. Further, it can detect frames
- excessive ARP requests
rogue APs that have the ability to violate the IEEE 802.11
standard. Moreover, the mature techniques and freely available
software that this framework employs make it an efficient and Passive Wireless Frame Collector
cost-effective solution. Lastly, modifications to the underlying
wireless standard are not necessary with this framework.
Fig. 1. Distributed monitoring module architecture.
This hybrid framework is designed to monitor network 1) Passive Wireless Frame Collector: A frame collector is
activities, forestall events that could lead to the generation needed for realtime WLAN monitoring so that rogue wireless
of rogue APs, discover existing rogue APs, and block unau- devices can be quickly identified, and network administrators
thorized network access through rogue APs. The two main notified when appropriate. One benefit of the frame collector is
components that constitute its architecture are the distributed its natural ability to separate wired and wireless traffic. Thus,
monitoring module and the centralized detection module. The there is no need for complicated modules that attempt to isolate
former should be placed in a way that it can cover the the two by examining traffic signatures.
interested areas as much as possible. On the other hand, the The frame collector needs to have a network device that
latter is located at the gateway router of a local network, which runs in promiscuous mode at all times. The entire region
allows it to examine all the traffic coming in and going out of interest can be covered with the assistance of wireless
of the network. A brief summary of each component and its range extenders. One of the frame collector’s main duties
functionalities is listed in Table II. is to capture all wireless traffic. Subsequently, the frame
collector dissects frames into IP and TCP components. This
The type of Wi-Fi networks we consider uses WEP or WPA
allows for information such as client MAC addresses, SSID,
in conjunction with MAC address filtering. Additionally, we
channel assignment, encryption status, and beacon interval to
try to avoid rekeying activities, as they require significant
be recorded. It also filters the collected traffic into user specific
overhead. An example of such a network is the one used by the
Department of Computer Science at The George Washington streams such as AP-client pairs. The relevant data will be
processed by the intrusion preemption and detection engines
University. Although, there are about 20 to 30 active users
described in the following subsections.
daily, there are over 600 registered users. Rekeying (i.e.,
change of the WEP secret key) is not a desirable action, as it Note that it is critical to hide the wireless frame collector
incurs significant overhead. The layout of an example network described from adversaries. Otherwise, a prudent attacker may
can be found in Fig. 2, where a wireless network is behind a change tactics to elude capture. Techniques that can achieve
NAT box. real “passive listening” are detailed in [17].
2) Preemption Engine: While attempted network attacks
cannot be avoided, it is possible to prevent some attacks before
A. The Distributed Detection Module
they happen. In particular, a certain amount of information
This module consists of a passive wireless frame collector, a must be collected by an adversary before an attack can
rogue AP preemption engine, and a rogue AP detection engine. actually occur. The prompt identification of such activity can
An illustration of the overall architecture of the distributed help thwart an impending attack. Subsequently, a rogue AP
monitoring module can be seen in Fig. 1. The frame collector preemption engine is included in the proposed framework.
is responsible for gathering wireless traffic. The collected data The rogue AP preemption engine is our first line of defense.
is then passed to the preemption engine, where checks are The basic objectives of this component are to trap sniffers
performed in order to thwart various attacks. Finally, the data and thwart activity that can lead to AP compromise. Probing
is analyzed by the detection engine. There are also probing of potential eavesdroppers and network integrity checks are
functions shared by the preemption and detection engines so performed to accomplish these goals. The former is designed
that adversaries can be lured into revealing their presence. to discover passive listeners while the latter is used to prevent
1896
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceedings.
TABLE II
F RAMEWORK C OMPONENT S UMMARY
key. In cases like this, an AP is instructed to temporarily and the Honeyclient Project [21].
1897
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceedings.
be labeled as a rogue device. The relevant values associated acteristics in terms of this function [25]. Using these
with each AP in the table of authorized APs include its MAC characteristics, wireless drivers can be determined with
address, SSID, working channel, and equipment vendor. acceptable accuracy.
Accordingly, our detection system has a probe request frame • Rate adaptation schemes: The lack of an explicit speci-
periodically sent out on all of the channels (e.g., 11 channels in fication for a rate adaptation algorithm results in differ-
802.11b). This property increases the likelihood of a rogue AP ent implementations such as ARF [26] and SampleRate
being detected because any AP that hears the request will send [27]. Thus, each algorithm will have a different impact
a probe response back to the detection engine. In this response, on observable traffic characteristics such as throughput
information such as the MAC address must be included, even and occurrence of retransmissions. Techniques have been
though the SSID may not be present. If the reported MAC proposed in [28] to distinguish different drivers by rate
address matches an unregistered MAC address found during adaptation algorithms.
an integrity check, we can conclude that it belongs to a rogue iv) Client location fingerprinting: The ability to distinguish
AP. Finally, the switch port that is associated with the rogue the location of spoofed nodes from the authentic nodes can
AP’s MAC address can be closed to eliminate it from the help to identify compromised APs. A commonly used location
network. distinction approach is RSSI measurement. Yet, RSSI values
In the event that a rogue AP spoofs a legitimate AP’s MAC may vary due to small-scale and frequency-selective fading.
address and SSID, location information should be used to There are some more advanced techniques proposed for loca-
make a judgement. If an AP announces a legitimate MAC tion distinction such as link temporal signature [29].
address, but has localization results that are inconsistent with
those in the AP MAC-to-location table, it can be considered B. Centralized Detection Module
to be a rogue AP. The wireless distributed monitoring module is effective at
b) Compromised AP Detection: A compromised AP is spotting rogues, but those not within the surveillance coverage
detected by identifying an unauthorized client who is con- range may run away undetected. In addition, it is conceivable
necting to it. The client can be detected by employing a com- that there might be no wireless network in a company. As a
bination of various fingerprinting techniques. Fingerprinting result, there is no AP or wireless extender available. Therefore,
is a process by which a device or the software it is running the ideal method of detecting such rogue APs is to use a
is identified by its externally observable characteristics. We central console attached to the wired side of the network for
detail these techniques below. monitoring. Another benefits of a central point detection is
i) User-specific traffic fingerprinting: A profile could be cre- that it alleviates the need to walk through the facilities in case
ated (either online or offline) for each client that indicates their of incomplete coverage. It can be regarded as a compensate to
network traffic patterns such as web browsing preferences. the wireless monitoring module. In the following, we elaborate
More specifically, the profile contains distinctive identifiers some novel techniques for finding potential rogue APs from
such as Internet destinations and email servers. In this case, the wired side of the network.
techniques from machine learning and data mining [22] could 1) Port 80 Detection: Most commodity AP products enable
be performed. port 80 (HTTP) in order to let the management personnel to
ii) OS fingerprinting: The OS that is running on a sus- login. Thus, a simple but efficient method to detect the exis-
pect client can be identified with OS fingerprinting tools. tence of an rogue AP is to trap it into responding to queries. In
Examples of active and passive OS fingerprinting tools are our centralized detection module, a port 80 scanning program
Nmap [23] and p0f [24], respectively. Information about OS is running on the console that is connected to the gateway
preference can be obtained when users register with the router. The port scan program can identify enabled TCP ports
system administrator. With this information, we can identify from various devices connected to the wired network. To be
potential attackers by looking for inconsistencies between the specific, it uncovers all port 80 (HTTP) interfaces on the
fingerprinting results and the preferred OS. A discrepancy may network, which includes all Web servers, and all APs. Even if
be cause for a “red flag” to be generated about a particular an rogue AP’s port 80 interface is disabled or protected by a
client. username and password, it will generally respond to the port
iii) Wireless network interface card (NIC) driver fingerprint- scanner’s ping with the vendor name and its corresponding IP
ing: Due to the ambiguity of the 802.11 standard, different address. After obtaining these information, they are compared
implementations of the same protocol specification in wireless with the stored data of the authorized APs. Any mismatching
device drivers behave differently. Fingerprinting techniques will trigger a security alert to the system administrator. With
take advantage of these implementation-dependent differences the IP address of a suspected AP, it is possible to determine
to accurately identify a driver. We list two implementation- its physical location via router table entries.
dependent algorithms below. There are two extra advantages to carry out the port 80 scan
• Timing of probe request frames: The algorithm used from the wired side of the local networks compared to the
to scan for AP is not explicitly defined in the 802.11 wireless side. Firstly, there is much more available bandwidth
standard. Therefore, it has led to the development of than the wireless links. Secondly, it is more “passive” than
many wireless device drivers that display different char- sending out queries via wireless broadcasting because the
1898
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceedings.
1899
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceedings.
1900
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceedings.
identity of a legitimate user A, the validation samples from PCI card (Atheros AR2414a chipset) using MadWifi [35]
users other than A are classified based on A’s profile using driver. Enabled by the MadWifi driver, this interface functions
the Bayesian approach [34]. as a normal AP. The other interface is an external Linksys
The two metrics that we employ to evaluate the performance WMP54G PCI card, which serves as the host for all the rogue
of our proposed fingerprinting techniques are as follows: AP detection modules including the preemption engine. The
• The true positive rate (TPR) refers to the percentage of prototype preemption engine employs open source programs
validation data that user A does not generate but we such as Kismet [36] and Nmap [23].
correctly classify as unauthorized users. The attacker is a Dell laptop with a number of wireless
• The false positive rate (FPR) refers to the percentage of
surveillance and hacking tools such as Kismet and Aircrack
validation data that user A generates but we incorrectly [37], respectively, installed. Therefore, this laptop is capable
classify as unauthorized users. of launching various attacks that include management frame
We detail our evaluation results below. The relation between forgery (e.g., deauthentication flooding, and fake authentica-
the mean TPR and the mean FPR, also known as the receiver tion), ARP request injection [19], fragmentation attack [37],
operating characteristic (ROC) curve, is plotted in Fig 3(a). For and Monkey-Jack attack [38]. We arrange the attacker to launch
reference, the dotted line x = y represents the performance the above attacks at various times and locations.
of random guessing. The proposed techniques clearly achieve
a high accuracy in terms of unauthorized user detection on 2) Methodology: Experiments are done during weekends
average. For example, the mean TPR reaches over 80% when when the offices are empty in order to minimize the impact of
the mean FPR is 0.05. This high average accuracy is partly external factors such as traffic from other APs or client devices.
due to the rich diversity that lies in the attendees of the Our setup completely separates normal AP functionalities from
conference. A large portion of the attendees come from dif- rogue AP detection modules. As a result, it is easy for us
ferent universities, and therefore become distinguishable when to debug. The machines are tested to ensure that packet
accessing their school web and email servers. Additionally, collection (i.e., “logging”) and processing does not degrade the
the complementary cumulative distribution function (CCDF) performance of the wireless network or inadvertently impact
of the TPR when the FPR is fixed to be 0.05 is shown in the results of the experiment. We have more control over
Fig 3(b). We see that over 60% unauthorized users can be the system compared to commodity AP products because
identified at a TPR that is at least 95% on average. a software programmable AP is constructed using widely
available devices that are reasonably priced. We also adopt
ROC Curve
FPR = 0.05 open source programs to greatly reduce development costs.
Fraction of users with TPR > x
1.0
1.0
Traffic Fingerprints 3) Results: Our logged records show that the preemption
Mean true positive rate
0.8
x=y
0.8
1901
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceedings.
VI. C ONCLUSION [12] S. Shetty, M. Song, and L. Ma, “Rogue access point detection by
analyzing network traffic characteristics,” in MILCOM, Orlando, Florida,
In this paper, we develop a practical hybrid framework October 2007.
targeting preempting attacks that can create rogue APs, and [13] M. K. Chirumamilla and B. Ramamurthy, “Agent based intrusion
detection and response system for wireless lans,” in ICC ’03. IEEE
detecting the presence of such devices when they exist. It is International Conference on Communications, 2003, pp. 492–496.
the first framework that correlates alerts containing all data [14] J. Yeo, M. Youssef, and A. Agrawala, “A framework for wireless LAN
from both wired scans and wireless surveillance. An attractive monitoring and its applications,” in WiSe ’04: Proceedings of the 2004
ACM workshop on Wireless security. New York, NY, USA: ACM Press,
feature of the proposed framework is that it requires neither 2004, pp. 70–79.
specialized hardware nor modification to existing security [15] W. Wei, K. Suh, B. Wang, Y. Gu, J. Kurose, and D. Towsley, “Passive
standards. Further, it can be connected to or implemented on online rogue access point detection using sequential hypothesis testing
with tcp ack-pairs,” in IMC ’07: Proceedings of the 7th ACM SIGCOMM
APs as small plugins. It also makes use of freely available conference on Internet measurement. New York, NY, USA: ACM, 2007,
mature software in order to provide a cost-effective security pp. 365–378.
solution. Lastly, it can protect networks from rogue APs [16] H. Yin, G. Chen, and J. wang, “Detecting protected layer-3 rogue APs,”
in IEEE BROADNETS ’07: Fourth Annual International Conference on
even when assuming that adversaries have the ability to use Broadband Networks, 2007.
customized equipment that violates the IEEE 802.11 standard. [17] L. Ma, A. Y. Teymorian, and X. Cheng, “Passive listening and intrusion
Our framework is the first one that can successfully protect the management in commodity wi-fi networks,” in GLOBECOM, 2007.
[18] P. Mateti, “Hacking techniques in wireless networks.” [On-
network under that assumption. line]. Available: [Link]
As a part of our future work, we plan to evaluate the Lectures/WirelessHacks/[Link]
[19] “ARP request replay attack.” [Online]. Available: [Link]
proposed framework in a more open environment, where [Link]/[Link]?id=arp-request reinjection
there are more background “noises” that may cause false [20] Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and
positives. Additionally, we are anticipating the inclusion of S. T. King, “Automated web patrol with strider honeymonkeys: Finding
new features for the framework that can further improve its web sites that exploit browser vulnerabilities.” in NDSS, 2006.
[21] “Honeyclient project.” [Online]. Available:
network protection abilities. One such feature is a proactive [Link]
honeypot function that can be used to better preempt various [22] M. A. Maloof, Machine Learning and Data Mining for Computer Secu-
rity: Methods and Applications (Advanced Information and Knowledge
attacks. Processing). Secaucus, NJ, USA: Springer-Verlag New York, Inc.,
2005.
ACKNOWLEDGMENT [23] “Nmap network security scanner.” [Online]. Available:
[Link]
This research was supported by the US National Science [24] “p0f: a versatile passive os fingerprinting tool.” [Online]. Available:
Foundation under grant CCF-0627322. [Link]
[25] J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and
D. Sicker, “Passive data link layer 802.11 wireless device driver fin-
REFERENCES gerprinting,” in USENIX-SS’06: Proceedings of the 15th conference
on USENIX Security Symposium. Berkeley, CA, USA: USENIX
[1] L. Ma, A. Y. Teymorian, X. Cheng, and M. Song, “RAP: Protecting Association, 2006, pp. 12–12.
commodity wi-fi networks from rogue access points,” in QShine ’07: [26] A. Kamerman and L. Monteban, “WaveLAN-II: A high-performance
Proceedings of the 4th international conference on Quality of service in wireless lan for the unlicensed band,” Bell Labs Technical Journal, 1997.
heterogeneous wired/wireless networks, 2007. [27] J. Bicket, “Bit-rate selection in wireless networks,” Master’s thesis,
[2] “Gartner advises on security.” [Online]. Available: Massachusetts Institute of Technology, 2005.
[Link] about/press releases/2001/[Link] [28] C. Corbett, R. Beyah, and J. Copeland, “Passive classification of wireless
[3] S. R. Fluhrer, I. Mantin, and A. Shamir, “Weaknesses in the key nics during rate switching,” EURASIP J. Wirel. Commun. Netw., To
scheduling algorithm of rc4,” in SAC ’01: Revised Papers from the appear.
8th Annual International Workshop on Selected Areas in Cryptography. [29] N. Patwari and S. K. Kasera, “Robust location distinction using temporal
London, UK: Springer-Verlag, 2001, pp. 1–24. link signatures,” in MobiCom ’07, 2007, pp. 111–122.
[4] N. Borisov, I. Goldberg, and D. Wagner, “Intercepting mobile communi- [30] “Powerful TCP port scanner, pinger, resolver.” [Online]. Available:
cations: the insecurity of 802.11,” in MobiCom ’01, 2001, pp. 180–189. [Link]
[5] N. Cam-Winget, R. Housley, D. Wagner, and J. Walker, “Security flaws [31] “IP personality: a netfilter module to change characteristics of network
in 802.11 data link protocols,” Commun. ACM, vol. 46, no. 5, pp. 35–39, traffic.” [Online]. Available: [Link]
2003. [32] M. Rodrig, C. Reis, R. Mahajan, D. Wetherall, J. Zahorjan, and
[6] “AirDefense enterprise: a wireless intrusion prevention system.” E. Lazowska, “CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17),”
[Online]. Available: [Link] Downloaded from [Link]
[7] “AirMagnet: Enterprise WLAN management.” [Online]. Available: Oct. 2006.
[Link] [33] J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall,
[8] “Airwave: Wireless network management.” [Online]. Available: “802.11 user fingerprinting,” in MobiCom ’07, 2007, pp. 99–110.
[Link] [34] A. W. Moore and D. Zuev, “Internet traffic classification using bayesian
[9] A. Adya, P. Bahl, R. Chandra, and L. Qiu, “Architecture and techniques analysis techniques,” in SIGMETRICS ’05. New York, NY, USA: ACM,
for diagnosing faults in IEEE 802.11 infrastructure networks,” in Mobi- 2005, pp. 50–60.
Com ’04, 2004, pp. 30–44. [35] “Madwifi wlan device driver.” [Online]. Available: [Link]
[10] P. Bahl, R. Chandra, J. Padhye, L. Ravindranath, M. Singh, A. Wolman, [36] “Kismet: an 802.11 layer2 wireless network detector,
and B. Zill, “Enhancing the security of corporate wi-fi networks using sniffer, and intrusion detection system.” [Online]. Available:
DAIR,” in MobiSys 2006: Proceedings of the 4th international confer- [Link]
ence on Mobile systems, applications and services. New York, NY, [37] “Aircrack-ng: an 802.11 WEP and WPA-PSK keys cracking program.”
USA: ACM Press, 2006, pp. 1–14. [Online]. Available: [Link]
[11] R. Beyah, S. Kangude, G. Yu, B. Strickland, and J. Copeland, “Rogue [38] “Advanced 802.11 attack: Black hat 2002.” [Online]. Avail-
access point detection using temporal traffic characteristics,” in GLOBE- able: [Link]
COM, 2004. [Link]
1902