Loading [MathJax]/extensions/MathMenu.js
A passive approach to rogue access point detection | IEEE Conference Publication | IEEE Xplore

A passive approach to rogue access point detection


Abstract:

Unauthorized or rogue access points (APs) produce security vulnerabilities in enterprise/campus networks by circumventing inherent security mechanisms. We propose to use ...Show More

Abstract:

Unauthorized or rogue access points (APs) produce security vulnerabilities in enterprise/campus networks by circumventing inherent security mechanisms. We propose to use the round trip time (RTT) of network traffic to distinguish between wired and wireless nodes. This information coupled with a standard wireless AP authorization policy allows the differentiation (at a central location) between wired nodes, authorized APs, and rogue APs. We show that the lower capacity and the higher variability in a wireless network can be used to effectively distinguish between wired and wireless nodes. Further, this detection is not dependant upon the wireless technology (802.11a, 802.11b, or 802.11g), is scalable, does not contain the inefficiencies of current solutions, remains valid as the capacity of wired and wireless links increase, and is independent of the signal range of the rogue APs.
Date of Conference: 26-30 November 2007
Date Added to IEEE Xplore: 26 December 2007
ISBN Information:
Print ISSN: 1930-529X
Conference Location: Washington, DC, USA

Contact IEEE to Subscribe

References

References is not available for this document.