Association attacks: Identifying association protocols

Tingting Sun, Yanyong Zhang, Wade Trappe

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this paper, we examine the problem of identifying different association protocols based on client probing patterns. We take the view point of an attacker, who aims to trick certain clients to switch their association to a compromised AP, so that the attacker can easily perform various attacks, such as passing false management frames and stealing client information. In order to do that, the attacker must know what association protocol the client is using since it determines the clients switching criteria. Therefore, the attacker must be able to identify the association protocol by monitoring the network traffic. We investigated methods to identify four association protocols and propose an approach which combines k-means clustering and Gaussian fitting to classify the association protocols based on probing patterns. We tested the designed scheme on traffic traces for a variety of network scenarios. We also designed a method to quantify the likelihood of the identification using confidence intervals. Results show that the proposed method can correctly identify association protocols. Further interpretation of the results also reveals information regarding important metrics of the clients chosen association protocol.

Original languageAmerican English
Title of host publication2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings
DOIs
StatePublished - 2012
Event13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - San Francisco, CA, United States
Duration: Jun 25 2012Jun 28 2012

Publication series

Name2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings

Other

Other13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012
Country/TerritoryUnited States
CitySan Francisco, CA
Period6/25/126/28/12

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Association attacks: Identifying association protocols'. Together they form a unique fingerprint.

Cite this