메뉴 건너뛰기




Volumn , Issue , 2008, Pages 104-115

On fast and accurate detection of unauthorized wireless access points using clock skews

Author keywords

Fake access point; Fingerprint; IEEE 802.11; MAC address spoofing; Timestamp

Indexed keywords

FAKE ACCESS POINT; FINGERPRINT; IEEE 802.11; MAC ADDRESS SPOOFING; TIMESTAMP;

EID: 60349083720     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1409944.1409958     Document Type: Conference Paper
Times cited : (89)

References (32)
  • 1
    • 60349090885 scopus 로고    scopus 로고
    • IEEE Standard 802.11 - wireless LAN medium access control (MAC) and physical layer (PHY) specifications. The Institute of Electrical and Electronics Engineers, Inc., 1999.
    • IEEE Standard 802.11 - wireless LAN medium access control (MAC) and physical layer (PHY) specifications. The Institute of Electrical and Electronics Engineers, Inc., 1999.
  • 4
    • 60349126487 scopus 로고    scopus 로고
    • Intel PRD/Wireless 3945ABG Driver for Linux, http://ipw3945.sourceforge. net/.
    • Intel PRD/Wireless 3945ABG Driver for Linux, http://ipw3945.sourceforge. net/.
  • 8
    • 84868886462 scopus 로고    scopus 로고
    • AirMagnet, http://www.airmagnet.com.
    • AirMagnet
  • 11
    • 84868874988 scopus 로고    scopus 로고
    • DD-WRT
    • DD-WRT, http://www.dd-wrt.com.
  • 12
    • 60349093412 scopus 로고    scopus 로고
    • Network Time Protocol version 4 reference and implementation guide, http://www.eecis.udel.edu/emills/database/reports/ntp4/ntp4.pdf.
    • Network Time Protocol version 4 reference and implementation guide, http://www.eecis.udel.edu/emills/database/reports/ntp4/ntp4.pdf.
  • 14
    • 84870578392 scopus 로고    scopus 로고
    • NetStumbler, http://www.netstumbler.com.
    • NetStumbler
  • 16
    • 60349110791 scopus 로고    scopus 로고
    • tcpdump, http://www.tcpdump.org/.
    • tcpdump, http://www.tcpdump.org/.
  • 17
    • 11244291937 scopus 로고    scopus 로고
    • Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks
    • A. Adya, P. Bahl, and R. C. et al. Architecture and techniques for diagnosing faults in IEEE 802.11 infrastructure networks. In MobiCom '04, pages 30-44, 2004.
    • (2004) MobiCom '04 , pp. 30-44
    • Adya, A.1    Bahl, P.2
  • 18
    • 33748979867 scopus 로고    scopus 로고
    • Enhancing the security of corporate Wi-Fi networks using DAIR
    • P. Bahl, R. Chandra, and J. P. et al. Enhancing the security of corporate Wi-Fi networks using DAIR. In MobiSys '06, pages 1-14, 2006.
    • (2006) MobiSys '06 , pp. 1-14
    • Bahl, P.1    Chandra, R.2
  • 20
    • 18144401989 scopus 로고    scopus 로고
    • Rogue access point detection using temporal traffic characteristics
    • December
    • R. Beyah, S. Kangude, and G. Y. et al. Rogue access point detection using temporal traffic characteristics. In Proceedings of IEEE GLOBECOM, December 2004.
    • (2004) Proceedings of IEEE GLOBECOM
    • Beyah, R.1    Kangude, S.2
  • 23
    • 85143166035 scopus 로고    scopus 로고
    • Security analysis and improvements for IEEE 802.Hi
    • C. He and J. C. Mitchell. Security analysis and improvements for IEEE 802.Hi. In NDSS, 2005.
    • (2005) NDSS
    • He, C.1    Mitchell, J.C.2
  • 24
    • 0003761433 scopus 로고
    • Method and means for recognizing complex patterns
    • U.S. Patent 3069654
    • P. Hough. Method and means for recognizing complex patterns. U.S. Patent 3069654, 1962.
    • (1962)
    • Hough, P.1
  • 26
    • 85022192331 scopus 로고    scopus 로고
    • Ripps: Rogue identifying packet payload sheer detecting unauthorized wireless hosts through network traffic conditioning
    • C. Mano, A. Blaich, and Q. L. et al. Ripps: Rogue identifying packet payload sheer detecting unauthorized wireless hosts through network traffic conditioning. A CM Transactions on Information and System Security, 2007.
    • (2007) A CM Transactions on Information and System Security
    • Mano, C.1    Blaich, A.2
  • 27
    • 33244479152 scopus 로고    scopus 로고
    • Estimation and removal of clock skew from network delay measurements
    • Technical report, Amherst, MA, USA
    • S. B. Moon, P. Skelly, and D. Towsley. Estimation and removal of clock skew from network delay measurements. Technical report, Amherst, MA, USA, 1998.
    • (1998)
    • Moon, S.B.1    Skelly, P.2    Towsley, D.3
  • 28
    • 34547339276 scopus 로고    scopus 로고
    • Hot or not: Revealing hidden services by their clock skew
    • New York, NY, USA, ACM
    • S. J. Murdoch. Hot or not: revealing hidden services by their clock skew. In CCS '06, pages 27-36, New York, NY, USA, 2006. ACM.
    • (2006) CCS '06 , pp. 27-36
    • Murdoch, S.J.1
  • 30
    • 60349101689 scopus 로고    scopus 로고
    • M. Rodrig, C. Reis, and R. M. et al. CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17). http://crawdad.cs.dartmouth.edu/uw/sigcomm2004, Oct. 2006.
    • M. Rodrig, C. Reis, and R. M. et al. CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17). http://crawdad.cs.dartmouth.edu/uw/sigcomm2004, Oct. 2006.
  • 31
    • 60349085550 scopus 로고    scopus 로고
    • Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs
    • W. Wei, K. Suh, and B. W. et al. Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs. In IMC, pages 93-108, 2007.
    • (2007) IMC , pp. 93-108
    • Wei, W.1    Suh, K.2
  • 32
    • 33845307812 scopus 로고
    • Randomized Hough transform (RHT): Basic mechanisms, algorithms, and computational complexities
    • L. Xu and E. Oja. Randomized Hough transform (RHT): basic mechanisms, algorithms, and computational complexities. CVGIP: Image Underst., 57(2):131-154, 1993.
    • (1993) CVGIP: Image Underst , vol.57 , Issue.2 , pp. 131-154
    • Xu, L.1    Oja, E.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.