Hackers of India

In air they wander, we exist to blow their cover!!! {Approaches to Evil Twin Detection from a normal user’s perspective}

 Rushikesh D Nandedkar   Amrita C Iyer 

2014/02/14


Presentation Material

Abstract

Wireless networks are prominently seen nowadays. They are so well fitted to the requirements of the mass that, they had become an inseparable element of our day to day life. With this ease there came some drawbacks as well. To name a few, the physical location of wireless host is difficult to trace, the coverage periphery of wireless network cannot be restricted to exact geographical references, so on and so forth.

Like these there are many more drawbacks which paved a road for an attacker to intrude in wireless networks. In this topic we will discuss detection of Evil Twin Attack in open wireless networks by normal user.

Evil Twin Attack is an attack in which a malicious user spoofs the identity of legitimate access point and creates an Evil Twin (Fake Access Point) that allures the legitimate access point users to connect to Evil Twin. Once they are connected the attacker is privileged with the capability to raise a wide array of attacks on the users.

There are many approaches available from a network administrator’s side to detect these evil twin attacks.

But it is not the wireless network administrator who falls prey to Evil Twin Attack; these are normal users who are targeted. And there are not many approaches devised by researchers for detection of such Evil Twins from a normal user side.

Whichever approaches are available, they require a separate hardware or some or the other out of the box mechanism in place keeping usage of their approaches restricted to study purposes only.

To address these limitations we have proposed a packet injection approach and data link layer monitoring approach which does not require substantially implementing/changing any hardware or software in the computer of normal user.