Using visualization to locate rogue access points

Unauthorized access points on a wireless network, known as rogue access points, represent significant security vulnerabilities. Commercial and open source tools are available to detect and locate such devices. As part of a class project, students in our Computer Security course assisted in the development of a software tool, called WiVis, that uses interactive visualization to locate rogue access points. Distributed sensors are "profile mapped" to determine how they receive wireless signals from the environment around them. Visual displays of the maps as contour lines are overlaid onto a schematic of the office or lab space. When sensors detect an access point, contour line intersection visually show the predicted location of the device. The tool runs on standard platforms and requires no special hardware.

[1]  V. Padmanabhan,et al.  Enhancements to the RADAR User Location and Tracking System , 2000 .

[2]  Paramvir Bahl,et al.  RADAR: an in-building RF-based user location and tracking system , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[3]  Golden G. Richard,et al.  Physically Locating Wireless Intruders , 2004, ITCC.

[4]  Andreas Haeberlen,et al.  Practical robust localization over large-scale 802.11 wireless networks , 2004, MobiCom '04.

[5]  Ted Kremenek,et al.  A Probabilistic Room Location Service for Wireless Networked Environments , 2001, UbiComp.

[6]  Henry Tirri,et al.  A Statistical Modeling Approach to Location Estimation , 2002, IEEE Trans. Mob. Comput..

[7]  Andy Hopper,et al.  The active badge location system , 1992, TOIS.

[8]  Toshiro Kawahara,et al.  Robust indoor location estimation of stationary and mobile users , 2004, IEEE INFOCOM 2004.