{"title":"Detecting IEEE 802.11 Client Device Impersonation on a Wireless Access Point","authors":"Paul Zanna;Dinesh Kumar;Pj Radcliffe","doi":"10.23919/JCIN.2022.10005218","DOIUrl":null,"url":null,"abstract":"The ability to effortlessly construct and broadcast false messages makes IEEE 802.11 wireless networks particularly vulnerable to attack. False frame generation allows rogue devices to impersonate an authorized user and issue commands that impact the user's network connection or possibly the entire network's security. Unfortunately, the current device impersonation detection methods are unsuitable for small devices or real-time applications. Our contribution is to demonstrate that a rule-based learning classifier using several random forest (RF) features from an IEEE 802.11 frame can determine the probability that an impersonating device has generated that frame in real time. Our main innovation is a processing pipeline, and the algorithm that implements concurrent one-class classifiers on a per device basis yet is lightweight enough to run directly on a wireless access point (WAP) and produce real-time outputs.","PeriodicalId":100766,"journal":{"name":"Journal of Communications and Information Networks","volume":"7 4","pages":"408-420"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Communications and Information Networks","FirstCategoryId":"1085","ListUrlMain":"https://ieeexplore.ieee.org/document/10005218/","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The ability to effortlessly construct and broadcast false messages makes IEEE 802.11 wireless networks particularly vulnerable to attack. False frame generation allows rogue devices to impersonate an authorized user and issue commands that impact the user's network connection or possibly the entire network's security. Unfortunately, the current device impersonation detection methods are unsuitable for small devices or real-time applications. Our contribution is to demonstrate that a rule-based learning classifier using several random forest (RF) features from an IEEE 802.11 frame can determine the probability that an impersonating device has generated that frame in real time. Our main innovation is a processing pipeline, and the algorithm that implements concurrent one-class classifiers on a per device basis yet is lightweight enough to run directly on a wireless access point (WAP) and produce real-time outputs.