[157296] in North American Network Operators' Group
Re: Detection of Rogue Access Points
daemon@ATHENA.MIT.EDU (Matthias Waehlisch)
Sun Oct 14 17:55:25 2012
Date: Sun, 14 Oct 2012 23:56:49 +0200
From: Matthias Waehlisch <waehlisch@ieee.org>
To: Lyndon Nerenberg <lyndon@orthanc.ca>
In-Reply-To: <5C7DC48C-B036-432B-8828-F5CE7F8BD1BD@orthanc.ca>
X-HTW-DELIVERED-TO: nanog@nanog.org
Cc: North American Network Operators Group <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org
On Sun, 14 Oct 2012, Lyndon Nerenberg wrote:
> There was a SIGCOMM paper a few years back that described a scheme
> based on measuring the the ACK delays of TCP sessions. In a nutshell,
> you can detect nodes on the wireless network by looking for the extra
> delay added by the radio link. It had very good accuracy, and caught
> new nodes quickly. It didn't require any prior knowledge of the
> network.
>
> I don't have a copy of the paper at hand, and I don't remember the
> title/author or the publication date (2007ish?), but maybe this will
> ring a bell for someone else on the list who does.
>
do you mean http://conferences.sigcomm.org/imc/2007/papers/imc122.pdf
?
Cheers
matthias
--
Matthias Waehlisch
. Freie Universitaet Berlin, Inst. fuer Informatik, AG CST
. Takustr. 9, D-14195 Berlin, Germany
.. mailto:waehlisch@ieee.org .. http://www.inf.fu-berlin.de/~waehl
:. Also: http://inet.cpt.haw-hamburg.de .. http://www.link-lab.net