IDEAS home Printed from https://ideas.repec.org/a/gam/jdataj/v9y2024i10p119-d1498196.html
   My bibliography  Save this article

Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks

Author

Listed:
  • Roman Banakh

    (Department of Information Technology Security, Lviv Polytechnic National University, 79013 Lviv, Ukraine)

  • Elena Nyemkova

    (Department of Information Technology Security, Lviv Polytechnic National University, 79013 Lviv, Ukraine)

  • Connie Justice

    (Purdue School of Engineering and Technology, Indiana University–Purdue University Indianapolis, Indianapolis, IN 46202, USA)

  • Andrian Piskozub

    (Department of Information Technology Security, Lviv Polytechnic National University, 79013 Lviv, Ukraine)

  • Yuriy Lakh

    (Department of Information Technology Security, Lviv Polytechnic National University, 79013 Lviv, Ukraine)

Abstract

Recent cyber security solutions for wireless networks during internet open access have become critically important for personal data security. The newest WPA3 network security protocol has been used to maximize this protection; however, attackers can use an Evil Twin attack to replace a legitimate access point. The article is devoted to solving the problem of intrusion detection at the OSI model’s physical layers. To solve this, a hardware–software complex has been developed to collect information about the signal strength from Wi-Fi access points using wireless sensor networks. The collected data were supplemented with a generative algorithm considering all possible combinations of signal strength. The k-nearest neighbor model was trained on the obtained data to distinguish the signal strength of legitimate from illegitimate access points. To verify the authenticity of the data, an Evil Twin attack was physically simulated, and a machine learning model analyzed the data from the sensors. As a result, the Evil Twin attack was successfully identified based on the signal strength in the radio spectrum. The proposed model can be used in open access points as well as in large corporate and home Wi-Fi networks to detect intrusions aimed at substituting devices in the radio spectrum where IEEE 802.11 networking equipment operates.

Suggested Citation

  • Roman Banakh & Elena Nyemkova & Connie Justice & Andrian Piskozub & Yuriy Lakh, 2024. "Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks," Data, MDPI, vol. 9(10), pages 1-19, October.
  • Handle: RePEc:gam:jdataj:v:9:y:2024:i:10:p:119-:d:1498196
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2306-5729/9/10/119/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2306-5729/9/10/119/
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jdataj:v:9:y:2024:i:10:p:119-:d:1498196. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.