AUTOMATION FRAMEWORK FOR ROGUE ACCESS POINT MITIGATION IN IEEE 802.1X-BASED WLAN

Wi-Fi hotspot is a product of wireless network technology than can be easily found in public places such as airport, café, or shopping mall. Besides offering ease in connection, the use of wireless network technology is also raises security issue because it lies in an open or public area. There needs to be a mechanism that can control access to the wireless network to protect it from attacker or intruder. Port-based authentication system or known as IEEE 802.1X standard is a framework that provides access control to the network. But still it is possible for the attack to occur in wireless network environment protected by IEEE 802.1X, i.e. rogue Access Point (rogue AP). A rogue AP can act like authorized Access Point (authorized AP), deceiving wireless users. Therefore, it is necessary to do mitigation steps including detection and elimination of rogue AP. In this research, live forensics method is used to detect the rogue AP. Output of this research is a framework for mitigating rogue AP in an IEEE 802.1X-based Wireless Local Area Network (WLAN). This framework can also be used as a basic for doing automation process to mitigate rogue AP, helping the network administrators to minimize their manual tasks for handling the rogue AP.

[1]  Mamoona Rafique,et al.  Exploring Static and Live Digital Forensics: Methods, Practices and Tools , 2013 .

[2]  Mohsen Guizani,et al.  A lightweight live memory forensic approach based on hardware virtualization , 2017, Information Sciences.

[3]  Frank Adelstein,et al.  Live forensics: diagnosing your system without killing it first , 2006, CACM.

[4]  Abhijit S. Bodhe,et al.  RAPD Algorithm: Detection of Rogue Access Point in Wireless Network , 2013 .

[5]  Jim Geier,et al.  Implementing 802.1X Security Solutions for Wired and Wireless Networks , 2008 .

[6]  Jyh-Cheng Chen,et al.  Extensible authentication protocol (EAP) and IEEE 802.1x: tutorial and empirical experience , 2005, IEEE Communications Magazine.

[7]  Orhan Ozan Denial of service attacks on 802.1X security protocol , 2004 .

[8]  V. S. Shankar Sriram,et al.  Detecting and eliminating Rogue Access Points in IEEE-802.11 WLAN - a multi-agent sourcing Methodology , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).

[9]  Mazdak Zamani,et al.  A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[10]  Min Song,et al.  A Hidden Markov Model based approach to detect Rogue Access Points , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[11]  Shital V Jagtap,et al.  Rogue Access Point Detection in WLAN by Analyzing Network Traffic and Behavior , 2010 .

[12]  Sachin Shetty,et al.  Rogue Access Point Detection by Analyzing Network Traffic Characteristics , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[13]  Shilpi Gupta,et al.  Wireless Network Security Protocols A Comparative Study , 2012 .

[14]  Jemal H. Abawajy,et al.  Wi-Fi security: wireless with confidence , 2011 .