Measuring Accuracy in Identifying and Detecting Unauthorized Access Point using Proactive Intrusion Detection Approach in Wireless Networks

Summary Currently, one of the major security issues in wireless environment is the intrusion coming from an unknown and unauthorized wireless access points. This access points could expose any sensitive information transmitted over the network. Until now the Intrusion Detection System (IDS) on Wireless network environment is still being developed because the necessary of its architectural design and IDS detection techniques need high levels of optimization in accommodating unique characteristics. IDS on Wireless network must have an adaptive nature and meet the scalability aspects in a distributed wireless network, as well as having a high accuracy detection with low false positive rate by taking into account the resource constraints on wireless networks. Furthermore, the convenience of the user in accessing network wirelessly could face the security risks against the intrusion of the possible Unauthorized Access Point, which is not legitimized and registered on a network. A more proactive detection system to protect this kind of intrusion has become an important part in the development of Intrusion Detection System. In this research, the mechanism of detecting the presence of Unauthorized Access Point is developed and the accuracy rate for identifying and detecting the presence of this kind of Access Point is also analyzed. During the test, it is showed that the accuracy of detection system reaches about 100% on idle traffic conditions, then declined to around 90%-70% in medium to low traffic conditions.

[1]  Guanlin Chen,et al.  An Intelligent WLAN Intrusion Prevention System Based on Signature Detection and Plan Recognition , 2010, 2010 Second International Conference on Future Networks.

[2]  Jie Wang,et al.  Detecting protected layer-3 rogue APs , 2007, 2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS '07).

[3]  Bo Sheng,et al.  A Measurement Based Rogue AP Detection Scheme , 2009, IEEE INFOCOM 2009.

[4]  Sachin Shetty,et al.  Rogue Access Point Detection by Analyzing Network Traffic Characteristics , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[5]  Günter Schäfer,et al.  Security in fixed and wireless networks - an introduction to securing data communications , 2004 .

[6]  Srinivas Sampalli,et al.  Client-based intrusion prevention system for 802.11 wireless LANs , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.

[7]  Xiuzhen Cheng,et al.  A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[8]  Hu Zhengbing,et al.  Study of Intrusion Detection Systems (IDSs) in Network Security , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.

[10]  John S. Baras,et al.  A framework for the evaluation of intrusion detection systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[11]  Bo Sheng,et al.  A Timing-Based Scheme for Rogue AP Detection , 2011, IEEE Transactions on Parallel and Distributed Systems.

[12]  R Schmoyer Timothy,et al.  Wireless intrusion detection and response : A case study using the classic man-in-the-middle attack , 2004 .

[13]  Wenyong Weng,et al.  An overview of wireless intrusion prevention systems , 2010, 2010 Second International Conference on Communication Systems, Networks and Applications.

[14]  S. Srilasak,et al.  Integrated Wireless Rogue Access Point Detection and Counterattack System , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[15]  Raheem A. Beyah,et al.  A Passive Approach to Rogue Access Point Detection , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[16]  Donald F. Towsley,et al.  Passive online rogue access point detection using sequential hypothesis testing with TCP ACK-pairs , 2007, IMC '07.

[17]  Jack Timofte Wireless Intrusion Prevention Systems , 2008 .

[18]  Guanlin Chen,et al.  Research of wireless intrusion prevention systems based on plan recognition and honeypot , 2009, 2009 International Conference on Wireless Communications & Signal Processing.