bstract-As the cost of 802.11 hardware continues to fall,
the appeal of inserting unauthorized wireless access into
enterprise networks grows. These rogue access points
(APs) expose the enterprise network to a barrage of
security vulnerabilities in that they are typically
connected to a network port behind the firewall. Most of
the current approaches to detecting rogue APs are
rudimentary and are easily evaded by hackers. We
propose the use of temporal traffic characteristics to
detect rogue APs at a central location. This detection is
independent of the wireless technology (802.11a, 802.11b,
or 802.11g), is scalable, does not posses the inefficiencies
of the current solutions, and is independent of the signal
range of the rogue APs.
bstract-As the cost of 802.11 hardware continues to fall, the appeal of inserting unauthorized wireless access into enterprise networks grows. These rogue access points (APs) expose the enterprise network to a barrage of security vulnerabilities in that they are typically connected to a network port behind the firewall. Most of the current approaches to detecting rogue APs are rudimentary and are easily evaded by hackers. We propose the use of temporal traffic characteristics to detect rogue APs at a central location. This detection is independent of the wireless technology (802.11a, 802.11b, or 802.11g), is scalable, does not posses the inefficiencies of the current solutions, and is independent of the signal range of the rogue APs.
การแปล กรุณารอสักครู่..