...
首页> 外文期刊>Computers & Security >BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks
【24h】

BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks

机译:BiRe:针对多模型邪恶双胞胎攻击的客户端双向SYN反射机制

获取原文
获取原文并翻译 | 示例
           

摘要

The evil twin attack (ETA) has been a persistent security threat for decades in wireless local area networks (WLANs). An ETA refers to a rogue access point (RAP) impersonating a legal access point (LAP) to allure wireless users' connection. Such attacks give rise to serious privacy leakage and property damages, motivating intensive research on ETA detection in both academic and manufacturing communities. Among existing ETA detection methods, those deployed at client side are superior to the typical admin-side ones because of the particular requirements on dedicated equipments at admin side and the lack of real-time protection. Unfortunately, available client-side ETA detection mechanisms are simply targeted to specific evil twin model and fail to provide adequate detection rate. In this paper, we propose a multi-model ETA detection mechanism at client side, called BiRe. Inspired by the request-response reflection stated in TCP handshake process, BiRe employs a novel Bi-directional TCP SYN Reflection to determine the existence of an ETA and differentiate among various attack models. A pair of wireless adapters are employed to cooperatively initiate TCP handshakes and monitor the absence of the expected TCP SYN-ACK packets. The remarkable feature of BiRe is to make the number of such absences as a feasible indicator for the ETA model identification. The results from extensive real-world experiments demonstrate the distinguishing performance of BiRe, achieving as high as 100% detection rate in multi-model ETA scenarios. Moreover, a free lightweight Linux tool has been developed based on BiRe to automate client-side ETA detection. (C) 2019 Published by Elsevier Ltd.
机译:邪恶双生攻击(ETA)在无线局域网(WLAN)中一直是持续存在的安全威胁。 ETA是指冒充无线接入点(RAP),冒充合法接入点(LAP)来吸引无线用户的连接。此类攻击导致严重的隐私泄露和财产损失,从而激发了学术界和制造业界对ETA检测的深入研究。在现有的ETA检测方法中,由于对管理员专用设备的特殊要求以及缺乏实时保护,部署在客户端的方法要优于典型的管理员方法。不幸的是,可用的客户端ETA检测机制仅针对特定的邪恶孪生模型,无法提供足够的检测率。在本文中,我们在客户端提出了一种多模型ETA检测机制,称为BiRe。受TCP握手过程中所述的请求-响应反射的启发,BiRe使用一种新颖的双向TCP SYN反射来确定ETA的存在并区分各种攻击模型。一对无线适配器用于协同启动TCP握手并监视期望的TCP SYN-ACK数据包的缺失。 BiRe的显着特征是将此类缺失的数量作为ETA模型识别的可行指标。大量实际实验的结果证明了BiRe的卓越性能,在多模型ETA场景中的检测率高达100%。此外,已经基于BiRe开发了免费的轻量级Linux工具,以自动执行客户端ETA检测。 (C)2019由Elsevier Ltd.发布

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号