TY - GEN
T1 - Association attacks
T2 - 13th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012
AU - Sun, Tingting
AU - Zhang, Yanyong
AU - Trappe, Wade
PY - 2012
Y1 - 2012
N2 - In this paper, we examine the problem of identifying different association protocols based on client probing patterns. We take the view point of an attacker, who aims to trick certain clients to switch their association to a compromised AP, so that the attacker can easily perform various attacks, such as passing false management frames and stealing client information. In order to do that, the attacker must know what association protocol the client is using since it determines the clients switching criteria. Therefore, the attacker must be able to identify the association protocol by monitoring the network traffic. We investigated methods to identify four association protocols and propose an approach which combines k-means clustering and Gaussian fitting to classify the association protocols based on probing patterns. We tested the designed scheme on traffic traces for a variety of network scenarios. We also designed a method to quantify the likelihood of the identification using confidence intervals. Results show that the proposed method can correctly identify association protocols. Further interpretation of the results also reveals information regarding important metrics of the clients chosen association protocol.
AB - In this paper, we examine the problem of identifying different association protocols based on client probing patterns. We take the view point of an attacker, who aims to trick certain clients to switch their association to a compromised AP, so that the attacker can easily perform various attacks, such as passing false management frames and stealing client information. In order to do that, the attacker must know what association protocol the client is using since it determines the clients switching criteria. Therefore, the attacker must be able to identify the association protocol by monitoring the network traffic. We investigated methods to identify four association protocols and propose an approach which combines k-means clustering and Gaussian fitting to classify the association protocols based on probing patterns. We tested the designed scheme on traffic traces for a variety of network scenarios. We also designed a method to quantify the likelihood of the identification using confidence intervals. Results show that the proposed method can correctly identify association protocols. Further interpretation of the results also reveals information regarding important metrics of the clients chosen association protocol.
UR - http://www.scopus.com/inward/record.url?scp=84866409555&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84866409555&partnerID=8YFLogxK
U2 - https://doi.org/10.1109/WoWMoM.2012.6263766
DO - https://doi.org/10.1109/WoWMoM.2012.6263766
M3 - Conference contribution
SN - 9781467312394
T3 - 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings
BT - 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings
Y2 - 25 June 2012 through 28 June 2012
ER -