EconPapers    
Economics at your fingertips  
 

Data Mining Approach for Evil Twin Attack Identification in Wi-Fi Networks

Roman Banakh, Elena Nyemkova (), Connie Justice, Andrian Piskozub and Yuriy Lakh
Additional contact information
Roman Banakh: Department of Information Technology Security, Lviv Polytechnic National University, 79013 Lviv, Ukraine
Elena Nyemkova: Department of Information Technology Security, Lviv Polytechnic National University, 79013 Lviv, Ukraine
Connie Justice: Purdue School of Engineering and Technology, Indiana University–Purdue University Indianapolis, Indianapolis, IN 46202, USA
Andrian Piskozub: Department of Information Technology Security, Lviv Polytechnic National University, 79013 Lviv, Ukraine
Yuriy Lakh: Department of Information Technology Security, Lviv Polytechnic National University, 79013 Lviv, Ukraine

Data, 2024, vol. 9, issue 10, 1-19

Abstract: Recent cyber security solutions for wireless networks during internet open access have become critically important for personal data security. The newest WPA3 network security protocol has been used to maximize this protection; however, attackers can use an Evil Twin attack to replace a legitimate access point. The article is devoted to solving the problem of intrusion detection at the OSI model’s physical layers. To solve this, a hardware–software complex has been developed to collect information about the signal strength from Wi-Fi access points using wireless sensor networks. The collected data were supplemented with a generative algorithm considering all possible combinations of signal strength. The k-nearest neighbor model was trained on the obtained data to distinguish the signal strength of legitimate from illegitimate access points. To verify the authenticity of the data, an Evil Twin attack was physically simulated, and a machine learning model analyzed the data from the sensors. As a result, the Evil Twin attack was successfully identified based on the signal strength in the radio spectrum. The proposed model can be used in open access points as well as in large corporate and home Wi-Fi networks to detect intrusions aimed at substituting devices in the radio spectrum where IEEE 802.11 networking equipment operates.

Keywords: data; machine learning model; KNN; generative algorithm; intrusion detection; IEEE 802.11; Evil Twin attack (search for similar items in EconPapers)
JEL-codes: C8 C80 C81 C82 C83 (search for similar items in EconPapers)
Date: 2024
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/2306-5729/9/10/119/pdf (application/pdf)
https://www.mdpi.com/2306-5729/9/10/119/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jdataj:v:9:y:2024:i:10:p:119-:d:1498196

Access Statistics for this article

Data is currently edited by Ms. Cecilia Yang

More articles in Data from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jdataj:v:9:y:2024:i:10:p:119-:d:1498196