Location Prediction of Rogue Access Point Based on Deep Neural Network Approach
DOI:
https://doi.org/10.13052/jmm1550-4646.1845Keywords:
Wireless local area networks, rogue access point, beacon frame, location prediction, deep neural networkAbstract
One of the serious security problems in wireless local networks (WLAN) is the existence of the rogue access points (RAPs). To prevent our network from the RAP attacks, we need to identify the RAPs by using the RAP detection methods. However, the identification of RAP location is also a challenging task. The objective of this paper is to propose the location prediction scheme for the RAP. We call our proposed scheme as the location prediction of rogue access point (LPRAP). The LPRAP scheme consists of two mechanisms, the RAP detection mechanism and the RAP location prediction mechanism. We apply the concept of the fingerprint in the RAP detection mechanism by considering the SSID, time duration of broadcasting beacon frame and MAC address. We show that this mechanism can detect the number of RAP. For the RAP location prediction mechanism, we utilize the deep neuron network (DNN) to predict the location of RAPs and evaluate its effectiveness. We evaluate the performance of LPRAP by comparing with those of other machine learning methods such as Support Vector Machine (SVM), K-Nearest Neighbor (KNN), Naive Bayes, and Multi-layer Perceptron (MLP). We also compare with particle swarm optimization algorithm. The results show that LPRAP can accurately predict the location of RAP up to 99.29%.
Downloads
References
R. Beyah and A. Venkataraman, “Rogue Access Point Detection,” IEEE Computer and Reliability Societies, pp. 56–61, 2011.
B. Alotaibi and K. Elleithy, “Rogue access point detection : Taxonomy, challenges, and future direction,” Wireless Personal Communications, October 2016.
S. Anmulwar, M. Ai-Refai, and A. Al-Qerem, “Rogue access point detection methods : A review,” International Conference on Information Communication and Embedded Systems (ICICES), 2014.
K. Sui, Y. Zhao, D. Pei, and L. Zimu, “How bad are the rogue’ impact on enterprise 802.11 networks performance?,” IEEE Conference on Computer Communications (INFOCOM), pp. 361–369, 2015.
S. Shetty, M. Song, and L. Ma, “Rogue access point detection by analyzing network traffic characteristics,” IEEE Military Communications Conference (MILCOM), 2007.
K.-F. Kao, W.-C. Chen, J.-C. Chang, and H.-T. Chu, “An accurate fake access point detection method based on deviation of beacon time interval,” 8th International Conference on Software Security and Reliability, 2014.
B. Alotaibi and K. Elleithy, “A passive fingerprint technique to detect fake access points,” Wireless Telecommunication Symposium (WTS), 2015.
B. Alotaibi and K. Elleithy, “An empirical fingerprint framework to detect rouge access points,” Systems, Applications and Technology Conference (LISAT), 2015.
S. Jana and S. K. Kasera, “On fast and accurate detection of unauthorized wireless access points using clock skews,” IEEE Transactions on Mobile Computing, March 2010, pp. 449–462.
H. Han, B. Sheng, C. Tan, and S. Lu, “A measurement based rough AP detection scheme,” IEEE International Conference on Computer Communications (INFOCOM), 2009.
H. B. Sheng, C. C. Tan, Q. Li, and S. Lu, “A timing-based scheme for rough AP detection,” IEEE Transactions on Parallel and Distributed Systems, vol. 22, Iss. 11, pp. 1912–1925, Nov. 2011.
C. Yang, Y. Song, X. Fang, and J. Tang, “Active user-side evil twin access point detection using statistical techniques,” IEEE Transactions on Information Forensics and Security, 2012.
R. Shrestha and S. Y. Nam, “Access point selection mechanism to circumvent rogue access point using voting-based query procedure,” IET Communications, Vol. 8, Iss. 16, pp. 2943–2951, 2014.
T. M. Le, R. P. Liu, and M. Hedley, “Rogue Access point Detection and Localization,” The 23rd International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 2489–2493, 2012.
F. Awad, M. Al-Refai, and A. Al-Qerem, “Rogue access point location using particle swarm optimization,” 8th International Conference on Information and Communication Systems (ICICS), 2017.
X. Ge and Z. Qu, “Optimization wifi indoor positioning KNN algorithm location-based fingerprint,” 7th IEEE International Conference on Software Engineering and Service Science (ICSESS), 2016.
W. Zhang, K. Liu, W. Zhang, Y. Zhang, and J. Gu, “Deep neural networks for wireless localization in indoor and outdoor environments,” Elsevier (Neurocomputing), Vol. 194, pp. 279–287, June 2016.