{"id":"https://openalex.org/W2894118702","doi":"https://doi.org/10.1587/transinf.2018edp7030","title":"Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames","display_name":"Client-Side Evil Twin Attacks Detection Using Statistical Characteristics of 802.11 Data Frames","publication_year":2018,"publication_date":"2018-09-30","ids":{"openalex":"https://openalex.org/W2894118702","doi":"https://doi.org/10.1587/transinf.2018edp7030","mag":"2894118702"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2018edp7030","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E101.D/10/E101.D_2018EDP7030/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.jstage.jst.go.jp/article/transinf/E101.D/10/E101.D_2018EDP7030/_pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017509557","display_name":"Qian Lu","orcid":"https://orcid.org/0000-0003-4816-7697"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qian LU","raw_affiliation_strings":["Dept. of Computer Science and Technology, Ocean University of China"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Technology, Ocean University of China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101745869","display_name":"Haipeng Qu","orcid":"https://orcid.org/0000-0002-1564-8980"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haipeng QU","raw_affiliation_strings":["Dept. of Computer Science and Technology, Ocean University of China"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Technology, Ocean University of China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066333395","display_name":"Yuan Zhuang","orcid":"https://orcid.org/0000-0003-3377-9658"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan ZHUANG","raw_affiliation_strings":["Dept. of Computer Science and Technology, Ocean University of China"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Technology, Ocean University of China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037569152","display_name":"Xi-Jun Lin","orcid":"https://orcid.org/0000-0002-8818-8436"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xi-Jun LIN","raw_affiliation_strings":["Dept. of Computer Science and Technology, Ocean University of China"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Technology, Ocean University of China","institution_ids":["https://openalex.org/I59028903"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064112839","display_name":"Yuzhan Ouyang","orcid":"https://orcid.org/0000-0003-3456-0885"},"institutions":[{"id":"https://openalex.org/I59028903","display_name":"Ocean University of China","ror":"https://ror.org/04rdtx186","country_code":"CN","type":"education","lineage":["https://openalex.org/I59028903"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuzhan OUYANG","raw_affiliation_strings":["Dept. of Computer Science and Technology, Ocean University of China"],"affiliations":[{"raw_affiliation_string":"Dept. of Computer Science and Technology, Ocean University of China","institution_ids":["https://openalex.org/I59028903"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.806,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":9,"citation_normalized_percentile":{"value":0.843827,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":84,"max":85},"biblio":{"volume":"E101.D","issue":"10","first_page":"2465","last_page":"2473"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9985,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9942,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/python","display_name":"Python","score":0.460174},{"id":"https://openalex.org/keywords/confusion","display_name":"Confusion","score":0.42524368}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8276201},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.62326515},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.50267935},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.49593076},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4702208},{"id":"https://openalex.org/C519991488","wikidata":"https://www.wikidata.org/wiki/Q28865","display_name":"Python (programming language)","level":2,"score":0.460174},{"id":"https://openalex.org/C2781140086","wikidata":"https://www.wikidata.org/wiki/Q557945","display_name":"Confusion","level":2,"score":0.42524368},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.41191944},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.41030025},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.36460525},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2503767},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.117201686},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C11171543","wikidata":"https://www.wikidata.org/wiki/Q41630","display_name":"Psychoanalysis","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2018edp7030","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E101.D/10/E101.D_2018EDP7030/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1587/transinf.2018edp7030","pdf_url":"https://www.jstage.jst.go.jp/article/transinf/E101.D/10/E101.D_2018EDP7030/_pdf","source":{"id":"https://openalex.org/S2486202937","display_name":"IEICE Transactions on Information and Systems","issn_l":"0916-8532","issn":["0916-8532","1745-1361"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4320800604","host_organization_name":"Institute of Electronics, Information and Communication Engineers","host_organization_lineage":["https://openalex.org/P4320800604"],"host_organization_lineage_names":["Institute of Electronics, Information and Communication Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":23,"referenced_works":["https://openalex.org/W1607867957","https://openalex.org/W1978193834","https://openalex.org/W1984872578","https://openalex.org/W1996789571","https://openalex.org/W2012073891","https://openalex.org/W2051074457","https://openalex.org/W2059308951","https://openalex.org/W2083648618","https://openalex.org/W2097571740","https://openalex.org/W2098936405","https://openalex.org/W2105563148","https://openalex.org/W2111654482","https://openalex.org/W2117557301","https://openalex.org/W2122156845","https://openalex.org/W2122237830","https://openalex.org/W2151043249","https://openalex.org/W2155886813","https://openalex.org/W2156636826","https://openalex.org/W2165572597","https://openalex.org/W2177987768","https://openalex.org/W2411767049","https://openalex.org/W2481945518","https://openalex.org/W2756189185"],"related_works":["https://openalex.org/W4297799326","https://openalex.org/W4287027380","https://openalex.org/W4285822516","https://openalex.org/W3193760048","https://openalex.org/W3187193180","https://openalex.org/W3116064965","https://openalex.org/W2341492732","https://openalex.org/W1901143057","https://openalex.org/W1699080303","https://openalex.org/W106542691"],"abstract_inverted_index":{"With":[0],"the":[1,12,28,38,52,61,90,102,117,155],"development":[2],"of":[3,9,23,47,51,70,92,110,116,154,158],"wireless":[4,150],"network":[5,151],"technology":[6],"and":[7,99,113,141,191],"popularization":[8],"mobile":[10],"devices,":[11],"Wireless":[13],"Local":[14],"Area":[15],"Network":[16],"(WLAN)":[17],"has":[18,105],"become":[19,114],"an":[20],"indispensable":[21],"part":[22],"our":[24,180,194,196],"daily":[25],"life.":[26],"Although":[27],"802.11-based":[29],"WLAN":[30],"provides":[31],"enormous":[32],"convenience":[33],"for":[34],"users":[35,59,84,137,172],"to":[36,44,82,85,89,107,138,171,173],"access":[37,72,79],"Internet,":[39],"it":[40],"also":[41],"gives":[42],"rise":[43],"a":[45,68,77,130,149,184],"number":[46],"security":[48,120],"issues.":[49],"One":[50],"most":[53,118],"severe":[54],"threat":[55],"encountered":[56],"by":[57,168],"Wi-Fi":[58],"is":[60],"evil":[62,66,103,143,159,175,203],"twin":[63,104,176],"attacks.":[64,177],"The":[65],"twin,":[67],"kind":[69],"rogue":[71],"points":[73],"(RAPs),":[74],"masquerades":[75],"as":[76],"legitimate":[78,206],"point":[80],"(AP)":[81],"lure":[83],"connect":[86],"it.":[87],"Due":[88],"characteristics":[91],"strong":[93],"concealment,":[94],"high":[95],"confusion,":[96],"great":[97],"harmfulness":[98],"easy":[100],"implementation,":[101],"led":[106],"significant":[108],"loss":[109],"sensitive":[111],"information":[112],"one":[115],"prominent":[119],"threats":[121],"in":[122,183,193,201],"recent":[123],"years.":[124],"In":[125],"this":[126],"paper,":[127],"we":[128],"propose":[129],"passive":[131],"client-based":[132],"detection":[133,181],"solution":[134],"that":[135],"enables":[136],"independently":[139],"identify":[140],"locate":[142],"twins":[144,204],"without":[145],"any":[146],"assistance":[147],"from":[148,205],"administrator.":[152],"Because":[153],"forwarding":[156],"behavior":[157],"twins,":[160],"proposed":[161],"method":[162],"compares":[163],"802.11":[164],"data":[165],"frames":[166],"sent":[167],"target":[169],"APs":[170],"determine":[174],"We":[178],"implemented":[179],"technique":[182],"Python":[185],"tool":[186],"named":[187],"ET-spotter.":[188],"Through":[189],"implementation":[190],"evaluation":[192],"study,":[195],"algorithm":[197],"achieves":[198],"96%":[199],"accuracy":[200],"distinguishing":[202],"APs.":[207]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2894118702","counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2024-12-09T11:48:40.087185","created_date":"2018-10-05"}