DocumentCode :
1968090
Title :
Using multiscale traffic analysis to detect WPS attacks
Author :
Petiz, Ivo ; Rocha, Eduardo ; Salvador, Paulo ; Nogueira, Antonio
Author_Institution :
DETI, Univ. of Aveiro, Aveiro, Portugal
fYear :
2013
fDate :
9-13 June 2013
Firstpage :
1020
Lastpage :
1025
Abstract :
The worldwide adoption of the IEEE 802.11 standard as the solution to provide efficient network coverage with high data-rates raised several security concerns. In a first stage, Wired Equivalent Privacy (WEP) was used to protect wireless networks from intrusions, whose main motivations ranged from simply getting free Internet access to the perpetration of complex attacks in order to retrieve confidential information. However, due to multiple technical flaws, this approach was not sufficient, leading to the emergence of the Wi-Fi Protected Access (WPA) and WPA2 technologies, which provided more secure mechanisms at the cost of requiring more complicated configuration tasks. In order to create a simple configuration interface, the Wi-Fi Alliance proposed a simple configuration approach: the Wi-Fi Protected Setup (WPS), which is used by major network products manufacturers and provides a much easier configuration setup, although in a less efficient security environment. Actually, this implementation is vulnerable to brute force attacks, which are very quick to execute, have little complexity and are difficult to detect. After cracking WPS, attackers can access to WPA/WPA2 login information and illicitly connect to the target wireless network. There are several technical requirements and legal constrains that limit access to the contents of wireless frames, thus preventing their deep analysis. This paper presents a method to detect attacks over WPA-enabled routers with Wi-Fi Protected Setup, based only on the amount of generated traffic. The detection methodology uses a monitoring station that exclusively analyzes traffic flows from the router: by monitoring traffic and using a multiscale analysis procedure, the approach is able to accurately identify each intrusion attempt.
Keywords :
data privacy; security of data; telecommunication network routing; telecommunication traffic; wireless LAN; IEEE 802.11 standard; Internet access; WPA-WPA2 login information; WPA-enabled routers; WPA2 technologies; WPS attack detection; complex attacks; confidential information; generated traffic; intrusions; monitoring station; multiscale traffic analysis; security environment; wi-fi alliance; wi-fi protected access; wi-fi protected setup; wired equivalent privacy; Communication system security; Delays; IEEE 802.11 Standards; Internet; Monitoring; Security; Wireless communication; Traffic identification; WPS; Wi-Fi; scalogram; wavelet transform;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communications Workshops (ICC), 2013 IEEE International Conference on
Conference_Location :
Budapest
Type :
conf
DOI :
10.1109/ICCW.2013.6649386
Filename :
6649386
Link To Document :
بازگشت