Back to Results
First PageMeta Content
Computer network security / Wireless access points / Electronic engineering / IEEE 802.11 / Wireless security / Rogue access point / Wireless bridge / Wireless LAN / Evil twin / Wireless networking / Technology / Wireless


Who Is Peeping at Your Passwords at Starbucks? – To Catch an Evil Twin Access Point Yimin Song, Chao Yang, and Guofei Gu Texas A&M University {songym,yangchao,guofei}@cse.tamu.edu Abstract—In this paper, we consider
Add to Reading List

Document Date: 2010-04-12 21:21:15


Open Document

File Size: 2,08 MB

Share Result on Facebook

Company

IEEE Global Telecommunications / BW LP / S TSIF S LACK(M AC) LACK(T CP ) LP LP / Australian Telecommunication Networks / I. I NTRODUCTION Wireless / Eliminating Rogue Wireless Networks / Microsoft / Starbucks / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

Texas A&M University / campus TAMULink AP / Guofei Gu Texas A&M University / /

IndustryTerm

Internet access / administrator-side solution / wireless network saturation / wireless channels / datasets under real network / wireless side / Internet traffic patterns / wireless link / real time / wireless network card / wireless network administrators / wireless communications / threshold random algorithm / authorized wireless user / wireless/softap.jsp / legitimate wireless providers / detection solutions / readily-available software / evil twin detection solutions / wireless access point / wireless chan / wireless hops / server-side applications / packet payload slicer detecting unauthorized wireless hosts / wireless collision probability / wireless environments / suspect devices / wireless card / wireless hop leading / Wireless LAN Solution Engine / onehop wireless channel / local available wireless networks / typical administrator-side solution / wireless hosts / wireless device / real wireless network environments / statistical anomaly detection algorithms / wireless sniffers / wireless hop / servers/communications / non-training-based detection algorithm / detection algorithm / numerical algorithm / detection algorithms / campus server / target wireless networks / internal network / wireless channel / anomaly detection algorithms / campus network / Passive online rogue access point detection using sequential hypothesis testing / user-side evil twin detection solution / wireless clients / wireless users / wireless bandwidth / diverse network protocols / wireless network environment / wireless network / wireless connections / Internet measurement / legitimate wireless channels / Wireless LAN Medium Access Control / wireless network cards / hop physical layer wireless channel / it less differentiable than Server / Wireless Rogue Access Point Detection / wireless situations / wireless networks / remote network / wireless collisions / wireless network providers / remote server / real wireless network environment / real-world wireless networks / evil twin attack detection algorithms / wireless threats / wireless client / administrator-side solutions / communications letters / Wireless Access Point Detection System / wireless local area networks / wireless infrastructures / wireless networks shows / wireless environment / twohop wireless channels / campus wireless network / /

OperatingSystem

Microsoft Windows 2000 / /

Organization

IMC / AP IAT / Texas A&M University / LP BE / International Criminal Court / /

Person

Chao Yang / Mahesh Sabbavarapu / Radu Stoleru / Rogue / /

/

Position

network administrator / wireless network administrator / /

Product

Server IATs / ETSniffer / Windows 2000 / W0 / P2 / /

PublishedMedium

IEEE Communications Letters / IEEE Wireless Communications / /

Technology

Linux / ADSL / detection algorithms / threshold random algorithm / two algorithms / wireless access / model Protocol / wireless device / multi-HDT algorithm / multi-TMM algorithm / diverse network protocols / TMM algorithm / two statistical anomaly detection algorithms / non-training-based detection algorithm / 3G / evil twin attack detection algorithms / cable modem / Broadband / anomaly detection algorithms / wireless communications / name TMM algorithm / non-training-based algorithm / UDP / normal B. Hop Differentiating Technique In HDT algorithm / operating systems / TCP/IP / Wi-Fi / Ethernet / HDT algorithm / WLAN / 802.11b protocol / http / radio frequency / local area networks / VOIP / wireless LAN / filtered packets Tech HDT TMM Protocol / /

URL

http /

SocialTag