METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Autoren

Externe Organisationen

  • Rheinische Friedrich-Wilhelms-Universität Bonn
Forschungs-netzwerk anzeigen

Details

OriginalspracheEnglisch
Titel des SammelwerksFinancial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers
Herausgeber/-innenTatsuaki Okamoto, Rainer Bohme
Herausgeber (Verlag)Springer Verlag
Seiten370-386
Seitenumfang17
BandLNCS 8975
ISBN (Print)978-3-662-47853-0
PublikationsstatusVeröffentlicht - 2015

Publikationsreihe

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Band8975
ISSN (Print)0302-9743
ISSN (elektronisch)1611-3349

Abstract

Mobile Evil Twin attacks stem from the missing authentication of open WiFi access points. Attackers can trick users into connecting to their malicious networks and thereby gain the capability to mount further attacks. Although some recognition and prevention techniques have been proposed, they have been impractical and thus have not seen any adoption. To quantify the scale of the threat of evil twin attacks we performed a field study with 92 participants to collect their WiFi usage patterns. With this data we show how many of our participants are potentially open to the evil twin attack. We also used the data to develop and optimize a context-based recognition algorithm, that can help mitigate such attacks. While it cannot prevent the attacks entirely it gives users the chance to detect them, raises the amount of effort for the attacker to execute such attacks and also significantly reduces the amount of vulnerable users which can be targeted by a single attack. Using simulations on real-world data, we evaluate our proposed recognition system and measure the impact on both users and attackers. Unlike most other approaches to counter evil twin attacks our system can be deployed autonomously and does not require any infrastructure changes and offers the full benefit of the system to early adopters.

ASJC Scopus Sachgebiete

Zitieren

METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points. / Szongott, Christian; Brenner, Michael; Smith, Matthew.
Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers. Hrsg. / Tatsuaki Okamoto; Rainer Bohme. Band LNCS 8975 Springer Verlag, 2015. S. 370-386 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8975).

Publikation: Beitrag in Buch/Bericht/Sammelwerk/KonferenzbandAufsatz in KonferenzbandForschungPeer-Review

Szongott, C, Brenner, M & Smith, M 2015, METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points. in T Okamoto & R Bohme (Hrsg.), Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers. Bd. LNCS 8975, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Bd. 8975, Springer Verlag, S. 370-386. https://doi.org/10.1007/978-3-662-47854-7_22
Szongott, C., Brenner, M., & Smith, M. (2015). METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points. In T. Okamoto, & R. Bohme (Hrsg.), Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers (Band LNCS 8975, S. 370-386). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Band 8975). Springer Verlag. https://doi.org/10.1007/978-3-662-47854-7_22
Szongott C, Brenner M, Smith M. METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points. in Okamoto T, Bohme R, Hrsg., Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers. Band LNCS 8975. Springer Verlag. 2015. S. 370-386. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). doi: 10.1007/978-3-662-47854-7_22
Szongott, Christian ; Brenner, Michael ; Smith, Matthew. / METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points. Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers. Hrsg. / Tatsuaki Okamoto ; Rainer Bohme. Band LNCS 8975 Springer Verlag, 2015. S. 370-386 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Download
@inproceedings{074ef70a763f423aa5b6c556b08f5048,
title = "METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points",
abstract = "Mobile Evil Twin attacks stem from the missing authentication of open WiFi access points. Attackers can trick users into connecting to their malicious networks and thereby gain the capability to mount further attacks. Although some recognition and prevention techniques have been proposed, they have been impractical and thus have not seen any adoption. To quantify the scale of the threat of evil twin attacks we performed a field study with 92 participants to collect their WiFi usage patterns. With this data we show how many of our participants are potentially open to the evil twin attack. We also used the data to develop and optimize a context-based recognition algorithm, that can help mitigate such attacks. While it cannot prevent the attacks entirely it gives users the chance to detect them, raises the amount of effort for the attacker to execute such attacks and also significantly reduces the amount of vulnerable users which can be targeted by a single attack. Using simulations on real-world data, we evaluate our proposed recognition system and measure the impact on both users and attackers. Unlike most other approaches to counter evil twin attacks our system can be deployed autonomously and does not require any infrastructure changes and offers the full benefit of the system to early adopters.",
keywords = "802.11, Attack detection, Evil twin access points, Mobile device security",
author = "Christian Szongott and Michael Brenner and Matthew Smith",
note = "Publisher Copyright: {\textcopyright} International Financial Cryptography Association 2015. Copyright: Copyright 2015 Elsevier B.V., All rights reserved.",
year = "2015",
doi = "10.1007/978-3-662-47854-7_22",
language = "English",
isbn = "978-3-662-47853-0",
volume = "LNCS 8975",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "370--386",
editor = "Tatsuaki Okamoto and Rainer Bohme",
booktitle = "Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers",
address = "Germany",

}

Download

TY - GEN

T1 - METDS - A Self-Contained, Context-based Detection System for Evil Twin Access Points

AU - Szongott, Christian

AU - Brenner, Michael

AU - Smith, Matthew

N1 - Publisher Copyright: © International Financial Cryptography Association 2015. Copyright: Copyright 2015 Elsevier B.V., All rights reserved.

PY - 2015

Y1 - 2015

N2 - Mobile Evil Twin attacks stem from the missing authentication of open WiFi access points. Attackers can trick users into connecting to their malicious networks and thereby gain the capability to mount further attacks. Although some recognition and prevention techniques have been proposed, they have been impractical and thus have not seen any adoption. To quantify the scale of the threat of evil twin attacks we performed a field study with 92 participants to collect their WiFi usage patterns. With this data we show how many of our participants are potentially open to the evil twin attack. We also used the data to develop and optimize a context-based recognition algorithm, that can help mitigate such attacks. While it cannot prevent the attacks entirely it gives users the chance to detect them, raises the amount of effort for the attacker to execute such attacks and also significantly reduces the amount of vulnerable users which can be targeted by a single attack. Using simulations on real-world data, we evaluate our proposed recognition system and measure the impact on both users and attackers. Unlike most other approaches to counter evil twin attacks our system can be deployed autonomously and does not require any infrastructure changes and offers the full benefit of the system to early adopters.

AB - Mobile Evil Twin attacks stem from the missing authentication of open WiFi access points. Attackers can trick users into connecting to their malicious networks and thereby gain the capability to mount further attacks. Although some recognition and prevention techniques have been proposed, they have been impractical and thus have not seen any adoption. To quantify the scale of the threat of evil twin attacks we performed a field study with 92 participants to collect their WiFi usage patterns. With this data we show how many of our participants are potentially open to the evil twin attack. We also used the data to develop and optimize a context-based recognition algorithm, that can help mitigate such attacks. While it cannot prevent the attacks entirely it gives users the chance to detect them, raises the amount of effort for the attacker to execute such attacks and also significantly reduces the amount of vulnerable users which can be targeted by a single attack. Using simulations on real-world data, we evaluate our proposed recognition system and measure the impact on both users and attackers. Unlike most other approaches to counter evil twin attacks our system can be deployed autonomously and does not require any infrastructure changes and offers the full benefit of the system to early adopters.

KW - 802.11

KW - Attack detection

KW - Evil twin access points

KW - Mobile device security

UR - http://www.scopus.com/inward/record.url?scp=84949988188&partnerID=8YFLogxK

U2 - 10.1007/978-3-662-47854-7_22

DO - 10.1007/978-3-662-47854-7_22

M3 - Conference contribution

SN - 978-3-662-47853-0

VL - LNCS 8975

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 370

EP - 386

BT - Financial Cryptography and Data Security - 19th International Conference, FC 2015, Revised Selected Papers

A2 - Okamoto, Tatsuaki

A2 - Bohme, Rainer

PB - Springer Verlag

ER -

Von denselben Autoren