Detection and analysis of the Chameleon WiFi access point virus

This paper analyses and proposes a novel detection strategy for the 'Chameleon’ WiFi AP-AP virus. Previous research has considered virus construction, likely virus behaviour and propagation methods. The research here describes development of an objective measure of virus success, the impact of product susceptibility, the acceleration of infection and the growth of the physical area covered by the virus. An important conclusion of this investigation is that the connectivity between devices in the victim population is a more significant influence on virus propagation than any other factor. The work then proposes and experimentally verifies the application of a detection method for the virus. This method utilises layer 2 management frame information which can detect the attack while maintaining user privacy and user confidentiality, a key requirement in many security solutions.

[1]  Zhiqi Tao,et al.  X-Mode: A Real Time Approach of Discriminating Wi-Fi Network Impersonators , 2008, 2008 4th International Conference on Next Generation Web Services Practices.

[2]  Xiuzhen Cheng,et al.  A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[3]  David R. Cheriton,et al.  Detecting identity-based attacks in wireless networks using signalprints , 2006, WiSe '06.

[4]  Dijiang Huang,et al.  Using Power Hopping to Counter MAC Spoof Attacks in WLAN , 2010, 2010 7th IEEE Consumer Communications and Networking Conference.

[5]  Alessandro Vespignani,et al.  WiFi networks and malware epidemiology , 2007, Proceedings of the National Academy of Sciences.

[6]  Steven Myers,et al.  Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm , 2011, LEET.

[7]  Min Song,et al.  A Hidden Markov Model based approach to detect Rogue Access Points , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[8]  Kian Meng Yap,et al.  Development of device identity using WiFi layer 2 management frames for combating Rogue APs , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).

[9]  Eitan Altman,et al.  Maximum Damage Malware Attack in Mobile Wireless Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[10]  Mazdak Zamani,et al.  A Novel Approach for Rogue Access Point Detection on the Client-Side , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.