2021
DOI: 10.1186/s13638-021-01978-4
|View full text |Cite
|
Sign up to set email alerts
|

WNV-Detector: automated and scalable detection of wireless network vulnerabilities

Abstract: The security of wireless routers receives much attention given by the increasing security threats. In the era of Internet of Things, many devices pose security vulnerabilities, and there is a significant need to analyze the current security status of devices. In this paper, we develop WNV-Detector, a universal and scalable framework for detecting wireless network vulnerabilities. Based on semantic analysis and named entities recognition, we design rules for automatic device identification of wireless access po… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(10 citation statements)
references
References 13 publications
0
10
0
Order By: Relevance
“…Yang et al [36] collect information from the Internet to build a complete product database of IoT devices and combine rules to label network devices. WNV-Detector [37] designs general rules for accessing device webpages and parse out fine-grained information. However, the response data of network devices often contain only partial information, limiting the effectiveness and coverage of the identification.…”
Section: Rule-based Device Identificationmentioning
confidence: 99%
See 4 more Smart Citations
“…Yang et al [36] collect information from the Internet to build a complete product database of IoT devices and combine rules to label network devices. WNV-Detector [37] designs general rules for accessing device webpages and parse out fine-grained information. However, the response data of network devices often contain only partial information, limiting the effectiveness and coverage of the identification.…”
Section: Rule-based Device Identificationmentioning
confidence: 99%
“…We assume that the adversaries conduct attacks in the WLAN, and the specific behaviors can be (1) connecting unauthorized devices to the wireless network such as hidden cameras and bugs [24,47]; (2) using IoT honeypots or virtual machines to forge legitimate real devices [48,49]; (3) utilizing software to counterfeit the wireless AP, which has the same SSID and MAC address as the legitimate one, deceiving the user to connect and further performing malicious attacks [17][18][19][20]; (4) exploiting the device vulnerabilities that have been disclosed on the Internet to endanger the security of user devices and the entire platform [37,50].…”
Section: Reat Modelmentioning
confidence: 99%
See 3 more Smart Citations