Gemini detector-Client side solutions to detect the evil twin access point

博士 === 國立中央大學 === 資訊工程學系 === 104 === This paper proposes two passive and one active user-side solutions, called Evil Twin Detector(ET-Detector), Wi-Fi Legal AP Finder (LAF) and Wi-Fi Malicious Rouge AP Finder (RAF), to the notorious evil twin access point problem which in turn can result in diverse...

Full description

Bibliographic Details
Main Authors: Yu-Liang Hsu, 徐裕量
Other Authors: Fu-Hau Hsu
Format: Others
Language:en_US
Published: 2016
Online Access:http://ndltd.ncl.edu.tw/handle/avjd93
id ndltd-TW-104NCU05392063
record_format oai_dc
spelling ndltd-TW-104NCU053920632019-05-15T23:01:21Z http://ndltd.ncl.edu.tw/handle/avjd93 Gemini detector-Client side solutions to detect the evil twin access point 雙基地台偵測-客戶端偵測惡意無線基地台機制 Yu-Liang Hsu 徐裕量 博士 國立中央大學 資訊工程學系 104 This paper proposes two passive and one active user-side solutions, called Evil Twin Detector(ET-Detector), Wi-Fi Legal AP Finder (LAF) and Wi-Fi Malicious Rouge AP Finder (RAF), to the notorious evil twin access point problem which in turn can result in diverse security problems, such as fraud, identity theft, and man-in-the-middle attacks. Due to the severe security threats created by evil twins, many promising solutions have been proposed. However, the majority of these solutions are designed for the administrators of wireless networks, not for Wi-Fi users. Hence, they are either too expensive or need some data that are usually not accessible to normal users. ET Detector detects wireless packets and forwarding behavior. LAF utilizes the TCP three-way handshake-related packets and packet forwarding property created by evil twins to find legal APs, called good twins, at public hotspots or unencrypted WLANs; thus, it does not need any data or assistance from wireless network administrators. LAF does not send exploring packets actively; hence, evil twins cannot sense its existence. If the evil twins connected the Internet by 3G/4G network, LAF can't collect the TCP packets between evil twins and the Internet. RAF utilizes the routing path to find out the rogue AP, the routing path is not the same with good AP and rogue AP. No matter when and where a user needs to utilize an AP to connect to the Internet at a hotspot, he can use ET Detector,LAF and RAF to find a good twin AP to connect to. Fu-Hau Hsu 許富皓 2016 學位論文 ; thesis 81 en_US
collection NDLTD
language en_US
format Others
sources NDLTD
description 博士 === 國立中央大學 === 資訊工程學系 === 104 === This paper proposes two passive and one active user-side solutions, called Evil Twin Detector(ET-Detector), Wi-Fi Legal AP Finder (LAF) and Wi-Fi Malicious Rouge AP Finder (RAF), to the notorious evil twin access point problem which in turn can result in diverse security problems, such as fraud, identity theft, and man-in-the-middle attacks. Due to the severe security threats created by evil twins, many promising solutions have been proposed. However, the majority of these solutions are designed for the administrators of wireless networks, not for Wi-Fi users. Hence, they are either too expensive or need some data that are usually not accessible to normal users. ET Detector detects wireless packets and forwarding behavior. LAF utilizes the TCP three-way handshake-related packets and packet forwarding property created by evil twins to find legal APs, called good twins, at public hotspots or unencrypted WLANs; thus, it does not need any data or assistance from wireless network administrators. LAF does not send exploring packets actively; hence, evil twins cannot sense its existence. If the evil twins connected the Internet by 3G/4G network, LAF can't collect the TCP packets between evil twins and the Internet. RAF utilizes the routing path to find out the rogue AP, the routing path is not the same with good AP and rogue AP. No matter when and where a user needs to utilize an AP to connect to the Internet at a hotspot, he can use ET Detector,LAF and RAF to find a good twin AP to connect to.
author2 Fu-Hau Hsu
author_facet Fu-Hau Hsu
Yu-Liang Hsu
徐裕量
author Yu-Liang Hsu
徐裕量
spellingShingle Yu-Liang Hsu
徐裕量
Gemini detector-Client side solutions to detect the evil twin access point
author_sort Yu-Liang Hsu
title Gemini detector-Client side solutions to detect the evil twin access point
title_short Gemini detector-Client side solutions to detect the evil twin access point
title_full Gemini detector-Client side solutions to detect the evil twin access point
title_fullStr Gemini detector-Client side solutions to detect the evil twin access point
title_full_unstemmed Gemini detector-Client side solutions to detect the evil twin access point
title_sort gemini detector-client side solutions to detect the evil twin access point
publishDate 2016
url http://ndltd.ncl.edu.tw/handle/avjd93
work_keys_str_mv AT yulianghsu geminidetectorclientsidesolutionstodetecttheeviltwinaccesspoint
AT xúyùliàng geminidetectorclientsidesolutionstodetecttheeviltwinaccesspoint
AT yulianghsu shuāngjīdetáizhēncèkèhùduānzhēncèèyìwúxiànjīdetáijīzhì
AT xúyùliàng shuāngjīdetáizhēncèkèhùduānzhēncèèyìwúxiànjīdetáijīzhì
_version_ 1719138852885495808