A Graph-Theoretic Approach to Virtual Access Point Correlation
Title | A Graph-Theoretic Approach to Virtual Access Point Correlation |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Roth, J. D., Martin, J., Mayberry, T. |
Conference Name | 2017 IEEE Conference on Communications and Network Security (CNS) |
Publisher | IEEE |
ISBN Number | 978-1-5386-0683-4 |
Keywords | 802.11 access point implementation, Communication system security, computer network security, Correlation, functional improvement, graph theory, graph-theoretic approach, IEEE 802.11 Standard, individual provider, insecure network, logically separate networks, nascent wireless functionality management, Network reconnaissance, Network topology, physical equipment, Probes, pubcrawl, Resiliency, secure network, security, security standpoint, standardization process, telecommunication network management, VAP identification algorithm, virtual access point correlation, wireless LAN, wireless networks |
Abstract | The wireless boundaries of networks are becoming increasingly important from a security standpoint as the proliferation of 802.11 WiFi technology increases. Concurrently, the complexity of 802.11 access point implementation is rapidly outpacing the standardization process. The result is that nascent wireless functionality management is left up to the individual provider's implementation, which creates new vulnerabilities in wireless networks. One such functional improvement to 802.11 is the virtual access point (VAP), a method of broadcasting logically separate networks from the same physical equipment. Network reconnaissance benefits from VAP identification, not only because network topology is a primary aim of such reconnaissance, but because the knowledge that a secure network and an insecure network are both being broadcast from the same physical equipment is tactically relevant information. In this work, we present a novel graph-theoretic approach to VAP identification which leverages a body of research concerned with establishing community structure. We apply our approach to both synthetic data and a large corpus of real-world data to demonstrate its efficacy. In most real-world cases, near-perfect blind identification is possible highlighting the effectiveness of our proposed VAP identification algorithm. |
URL | http://ieeexplore.ieee.org/document/8228645/ |
DOI | 10.1109/CNS.2017.8228645 |
Citation Key | roth_graph-theoretic_2017 |
- Correlation
- security standpoint
- standardization process
- telecommunication network management
- Resiliency
- secure network
- security
- VAP identification algorithm
- virtual access point correlation
- wireless LAN
- wireless networks
- 802.11 access point implementation
- Communication system security
- computer network security
- pubcrawl
- functional improvement
- graph theory
- graph-theoretic approach
- IEEE 802.11 Standard
- individual provider
- insecure network
- logically separate networks
- nascent wireless functionality management
- Network reconnaissance
- network topology
- physical equipment
- Probes