abstract-As the cost of 802.11 hardware continues to fall,
the appeal of inserting unauthorized wireless access into
enterprise networks grows. These rogue access points
(APs) expose the enterprise network to a barrage of
security vulnerabilities in that they are typically
connected to a network port behind the firewall. Most of
the current approaches to detecting rogue APs are
rudimentary and are easily evaded by hackers. We
propose the use of temporal traffic characteristics to
detect rogue APs at a central location. This detection is
independent of the wireless technology (802.11a, 802.11b,
or 802.11g), is scalable, does not posses the inefficiencies
of the current solutions, and is independent of the signal
range of the rogue APs.
abstract-As the cost of 802.11 hardware continues to fall,
the appeal of inserting unauthorized wireless access into
enterprise networks grows. These rogue access points
(APs) expose the enterprise network to a barrage of
security vulnerabilities in that they are typically
connected to a network port behind the firewall. Most of
the current approaches to detecting rogue APs are
rudimentary and are easily evaded by hackers. We
propose the use of temporal traffic characteristics to
detect rogue APs at a central location. This detection is
independent of the wireless technology (802.11a, 802.11b,
or 802.11g), is scalable, does not posses the inefficiencies
of the current solutions, and is independent of the signal
range of the rogue APs.
การแปล กรุณารอสักครู่..
