參考文獻 |
[1] Wikipedia. Hotspot (wi-Fi). http://en.wikipedia.org/wiki/Hotspot_(Wi-Fi), 2015.
[2] United States Department of Homeland Security. Tips for using public wi-Fi networks. http://www.onguardonline.gov/articles/0014-tips-using-public-wi-fi-networks, 2014.
[3] iPass. Wi-Fi growth map. http://www.ipass.com/wifi-growth-map/, 2015.
[4] CNN. Evil twin threat to Wi-Fi users. Available from: http://edition.cnn.com/2005/TECH/internet/01/20/evil.twins/
[5] Erin Biba. Does Your Wi-Fi Hotspot Have an Evil Twin.Available from: http://www.pcworld.com/article/120054/article.html
[6] Chris Hails. Smartphones and Public Wi-Fi Evil Twin Attacks. Available from: http://blog.netsafe.org.nz/2011/04/28/smartphones-and-public-wi-fi-evil-twin-attacks/
[7] Scams Inc. Evil Twin Attacks: Scamming Wireless Network Users. Available from: http://scamsinc.com/2012/02/13/evil-twin-attacks-scamming-wireless-network-users/
[8] Shmoo. Airsnarf - A rogue AP setup utility. Available from: http://airsnarf.shmoo.com/
[9] Hack WiFi. Rogue AP Dangers - Wireless Evil Twin Attack Techniques. Available from: http://www.freehowtohackwifi.com/advanced-wifi-hacks/rogue-ap/
[10] Wikipedia. Received signal strength indication. Available from: http://en.wikipedia.org/wiki/Received_signal_strength_indication
[11] John Bellardo and Stefan Savage. 802.11 denial-of-service attacks: Real vulnerabilities and practical solutions. In Proceedings of the 12th conference on USENIX Security Symposium, volume 12 of SSYM′03, Berkeley, CA, USA, 2003. USENIX Association.
[12] Chao Yang, Yimin Song, and Guofei Gu. Active user-side evil twin access point detection using statistical techniques. IEEE Transac-tions on Information Forensics and Security, 7(5):1638-1651, 2012.
[13] Motorola Solutions. TIRED OF ROGUES? Solutions for Detecting and Eliminating Rogue Wireless Networks White paper. Available from: http://www.motorolasolutions.com/web/Business/Products/Software%20and%20Applications/Network%20Design%20Software/AirDefense_Security_Compliance/_documents/Static_files/Tired_of_Rogues.pdf.
[14] Airwave. The Airwave Project. Available from: http://www.airwave.com
[15] Cisco. Cisco wireless lan solution engine (wlse) white paper. Available from: http://www.cisco.com/c/en/us/products/cloud-systems-management/ciscoworks-wireless-lan-solution-engine-wlse/index.html
[16] Proxim. Rogue access point detection: Automatically detect and manage wireless threats to your network white paper. Available from: http://www.proxim.com
[17] Netstumbler. The Netstumbler Project. Available from: http://www.netstumbler.com
[18] AirMagnet. The AirMagnet Project. Available from: http://www.airmagnet.com/
[19] Yong Sheng, Keren Tan, Guanling Chen, David Kotz, and Andrew Campbell. Detecting 802.11 mac layer spoofing using received signal strength. In INFOCOM, pages 1768-1776. IEEE, 2008.
[20] Suman Jana and Sneha Kumar Kasera. On fast and accurate detection of unauthorized wireless access points using clock skews. IEEE Trans. Mob. Comput., 9(3):449-462, 2010.
[21] Vladimir Brik, Suman Banerjee, Marco Gruteser, and Sangho Oh. Wireless device identification with radiometric signatures. In J. J.Garcia-Luna-Aceves, Raghupathy Sivakumar, and Peter Steenkiste, editors, MOBICOM, pages 116-127. ACM, 2008.
[22] Paramvir Bahl, Ranveer Chandra, Jitendra Padhye, Lenin Ravindranath, Manpreet Singh, Alec Wolman, and Brian Zill. Enhancing the security of corporate wi-Fi networks using dair. In Proceedings of the 4th International Conference on Mobile Systems, Applications and Services, MobiSys ′06, pages 1-14, New York, NY, USA, 2006. ACM.
[23] Raheem A. Beyah, Shantanu Kangude, George Yu, Brian Strickland, and John A. Copeland. Rogue access point detection using temporal trafic characteristics. In GLOBECOM, pages 2271-2275. IEEE, 2004.
[24] Hongda Yin, Guanling Chen, and Jie Wang. Detecting protected layer-3 rogue aps. In BROADNETS, pages 449-458. IEEE, 2007.
[25] Wei Wei, Kyoungwon Suh, Bing Wang, Yu Gu, Jim Kurose, and Don Towsley. Passive online rogue access point detection using sequential hypothesis testing with tcp ack-pairs. In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, IMC ′07, pages 365-378, New York, NY, USA, 2007. ACM.
[26] S. Shetty, Min Song, and Liran Ma. Rogue access point detection by analyzing network traffic characteristics. In Military Communi-cations Conference, 2007. MILCOM 2007. IEEE, pages 1-7, Oct 2007.
[27] WeiWei, Sharad Jaiswal, Jim Kurose, and Don Towsley. Identifying 802.11 traffic from passive measurements using iterative bayesian inference. In In Proc. IEEE INFOCOM, 2006.
[28] Lanier Watkins, Raheem A. Beyah, and Cherita L. Corbett. A passive approach to rogue access point detection. In GLOBECOM, pages 355-360. IEEE, 2007.
[29] Chad D. Mano, Andrew Blaich, Qi Liao, Yingxin Jiang, David A. Cieslak, David Salyers, and Aaron Striegel. Ripps: Rogue identifying packet payload slicer detecting unauthorized wireless hosts through network traffic conditioning. ACM Trans. Inf. Syst. Secur., 11(2), 2008.
[30] Aravind Venkataraman and Raheem Beyah. Rogue access point detection using innate characteristics of the 802.11 mac. In Yan Chen, Tassos Dimitriou, and Jianying Zhou, editors, SecureComm, volume 19 of Lecture Notes of the Institute for Computer Sciences, So-cial Informatics and Telecommunications Engineering, pages 394-416. Springer, 2009.
[31] Wei Wei, Bing Wang, Chun Zhang, Jim Kurose, and Don Towsley. Classification of access network types: Ethernet, wireless lan, adsl, cable modem or dialup. Computer Networks, pages 3205-3217, 2008.
[32] Valeria Baiamonte, Konstantina Papagiannaki, and Gianluca Iannaccone. Detecting 802.11 wireless hosts from remote passive observations. In Ian F. Akyildiz, Raghupathy Sivakumar, Eylem Ekici, Jaudelice Cavalcante de Oliveira, and Janise McNair, editors, Net-working, volume 4479 of Lecture Notes in Computer Science, pages 356-367. Springer, 2007.
[33] Hao Han, Bo Sheng, Chiu Chiang Tan, Qun Li, and Sanglu Lu. A timing-based scheme for rogue ap detection. IEEE Trans. Parallel Distrib. Syst., 22(11):1912-1925, 2011.
[34] Cherita Corbett, Raheem Beyah, and John Copeland. A passive approach to wireless nic identification. In ICC, pages 2329-2334. IEEE, 2006.
[35] Liran Ma, Amin Y. Teymorian, and Xiuzhen Cheng. A hybrid rogue access point protection framework for commodity wi-fi networks. In Proc. IEEE INFOCOM, 2008.
[36] Wei Wei, Sharad Jaiswal, Jim Kurose, Don Towsley, Kyoungwon Suh, and Bing Wang. Identifying 802.11 traffic from passive measurements using iterative bayesian inference. IEEE/ACM Trans. Netw., 20(2):325-338, 2012.
[37] Kuo-Fong Kao, I-En Liao, and Yueh-Chia Li. Detecting rogue access points using client-side bottleneck bandwidth analysis. Computers & Security, 28(3-4):144-152, 2009.
[38] Anthony J. Nicholson, Yatin Chawathe, Mike Y. Chen, Brian D. Noble, and David Wetherall. Improved access point selection. In Proceedings of the 4th International Conference on Mobile Systems, Applications and Services, MobiSys ′06, pages 233-245, New York, NY, USA, 2006. ACM.
[39] Jay Aikat, Jasleen Kaur, F. Donelson Smith, and Kevin Jeffay. Variability in tcp round-trip times. In Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, IMC ′03, pages 279-284, New York, NY, USA, 2003. ACM.
[40] Phillipa Sessini and Anirban Mahanti. Observations on round-trip times of tcp connections. SIMULATION SERIES, 38(3):347, 2006.
[41] Rafael Camilo Lozoya Gámez, P Marti, Manel Velasco, and J Fuertes. Wireless network delay estimation for time-sensitive applications. Autom. Control Dept., Technical Univ. Catalonia, Catalonia, Spain, Tech. Rep. ESAII RR-06-12, 2006.
[42] O. Awoniyi and F.A. Tobagi. Packet error rate in ofdm-based wireless lans operating in frequency selective channels. In INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Proceedings, pages 1-13, April 2006.
[43] Ethan Katz-Bassett, Harsha V Madhyastha, Vijay Kumar Adhikari, Colin Scott, Justine Sherry, Peter Van Wesep, Thomas E Anderson, and Arvind Krishnamurthy. Reverse traceroute. In NSDI, volume 10, pages 219-234, 2010.
[44] Aircrack-ng. Determine the driver, 2011. |