Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots

The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying p...

Full description

Saved in:
Bibliographic Details
Main Author: Ahmad, Nazrul Muhaimin
Format: Thesis
Language:English
English
Published: 2018
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/23373/1/Passive%20Client-centric%20Rogue%20Access%20Point%20Detection%20Framework%20for%20Wi_Fi%20Hotspots.pdf
http://eprints.utem.edu.my/id/eprint/23373/2/Passive%20Client-Centric%20Rogue%20Access%20Point%20Detection%20Framework%20For%20Wi_Fi%20Hotspots.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-utem-ep.23373
record_format uketd_dc
institution Universiti Teknikal Malaysia Melaka
collection UTeM Repository
language English
English
advisor Abdollah, Mohd Faizal

topic T Technology (General)
T Technology (General)
spellingShingle T Technology (General)
T Technology (General)
Ahmad, Nazrul Muhaimin
Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots
description The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot.
format Thesis
qualification_name Doctor of Philosophy (PhD.)
qualification_level Doctorate
author Ahmad, Nazrul Muhaimin
author_facet Ahmad, Nazrul Muhaimin
author_sort Ahmad, Nazrul Muhaimin
title Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots
title_short Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots
title_full Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots
title_fullStr Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots
title_full_unstemmed Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots
title_sort passive client-centric rogue access point detection framework for wifi hotspots
granting_institution UTeM
granting_department Faculty Of Information And Communication Technology
publishDate 2018
url http://eprints.utem.edu.my/id/eprint/23373/1/Passive%20Client-centric%20Rogue%20Access%20Point%20Detection%20Framework%20for%20Wi_Fi%20Hotspots.pdf
http://eprints.utem.edu.my/id/eprint/23373/2/Passive%20Client-Centric%20Rogue%20Access%20Point%20Detection%20Framework%20For%20Wi_Fi%20Hotspots.pdf
_version_ 1747834044868984832
spelling my-utem-ep.233732022-03-15T09:43:27Z Passive Client-Centric Rogue Access Point Detection Framework For WiFi Hotspots 2018 Ahmad, Nazrul Muhaimin T Technology (General) TK Electrical engineering. Electronics Nuclear engineering The proliferation of Wi-Fi hotspots in public places provides seamless Internet connectivity anywhere at any time to the wireless clients.Although many hotspots are often unprotected,unmanaged and unencrypted,this does not prevent the clients from actively connecting to the network.The underlying problem is that the network Access Point (AP) is always trusted.The adversary can impersonate a legitimate AP by setting up a rogue AP to commit espionage and to launch evil-twin attack,session hijacking,and eavesdropping.To aggravate the threats, existing detection solutions are ill-equipped to safeguard the client against rogue AP.Infrastructure- centric solutions are heavily relied on the deployment of sensors or centralized server for rogue AP detection, which are limited,expensive and rarely to be implemented in hotspots.Even though client-centric solutions offer threat-aware protection for the client,but the dependency of the existing solutions on the spoofable contextual network information and the necessity to be associated with the network makes those solutions are not viable for the hotspot’s client.Hence,this work proposes a framework of passive client-centric rogue AP detection for hotspots.Unlike existing solutions,the key idea is to piggyback AP-specific and network-specific information in IEEE 802.11 beacon frame that enables the client to perform the detection without authentication and association to any AP.Based on the spatial fingerprints included in the broadcasted information from the APs in the vicinity of the client,this work discloses a novel concept that enables the rogue AP detection via the client’s ability to self-colocalize and self-validate its own position in the hotspot.The legitimacy of the APs in the hotspot,in this view,lies in the fact that the correct matching between the Received Signal Strength Indicator (RSSI) measurements at the client and pre-recorded fingerprints is attainable when the beacons are transmitted only from the legitimate APs.Hence,any anomalousness in AP’s beacon frame or any attempt to replay the legitimate AP’s beacon frame from different location can be detected and classified as rogue AP threats.Through experiments in real environment,the results demonstrate that with proper algorithm selection and parameters tuning,the rogue AP detection framework can achieve over 90% detection accuracy in classifying the absence and presence of rogue AP threats in the hotspot. 2018 Thesis http://eprints.utem.edu.my/id/eprint/23373/ http://eprints.utem.edu.my/id/eprint/23373/1/Passive%20Client-centric%20Rogue%20Access%20Point%20Detection%20Framework%20for%20Wi_Fi%20Hotspots.pdf text en public http://eprints.utem.edu.my/id/eprint/23373/2/Passive%20Client-Centric%20Rogue%20Access%20Point%20Detection%20Framework%20For%20Wi_Fi%20Hotspots.pdf text en validuser http://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=112998 phd doctoral UTeM Faculty Of Information And Communication Technology Abdollah, Mohd Faizal 1. Abu-Nimeh, S., and Nair, S., 2008. Bypassing Security Toolbars and Phishing Filters via DNS Poisoning. IEEE Global Telecommunication Conference, pp. 1-6. 2. Agrawal, P., and Patwari, N., 2012. Kernel Methods for RSS-based Indoor Localization. Handbook of Position Location: Theory, Practice and Advances, 1st ed., IEEE-Wiley. 3. Ahmad, A., and Hassan, S., 2008. Detecting Rogue Access Point (RAP) using Simple Network Management Protocol (SNMP). International Conference on Network Applications, Protocols and Services, pp. 1-4. 4. Ahmad, A., Hassan, S., and Omar, M. H., 2013. Inbound Time Stamping for Detecting Rogue Access Point. International Conference on Computing and Informatics, pp. 173- 178. 5. Aime, M. D., Calandriello, G., and Lioy, A., 2007. Dependability in Wireless Networks: Can We Rely on WiFi?. IEEE Security & Privacy Magazine, 5(1), pp. 23–29. 6. Alotaibi, B., and Elleithy, K., 2015. An Empirical Fingerprint Framework to Detect Rogue Access Points. IEEE Long Island Conference on Systems, Applications, and Technology, pp. 1-7. 7. Anonymous, 2013. WiPhire. [online] Available at: http://sourceforge.net/projects/wiphire/ [Accessed on 8 November 2014]. 8. Anton, B., Bullock, B., and Short, J., 2003. Best Current Practices for Wireless Internet Service Provider (WISP) Roaming, Version 1.0 WiFi Alliance. [online] Available at: http://www.wi-fi.org/ [Accessed on 3 March 2013]. 9. Arackaparambil, C., Bratus, S., Shubina, A., and Kotz, D., 2010. On the Reliability of Wireless Fingerprinting using Clock Skews. Proceedings of the 3rd ACM Conference on Wireless Network Security, pp. 169-174. 10. Arlot, S., and Celisse, A., 2010. A Survey Cross-Validation Procedures for Model Selection, Statistic Survey, 4, pp. 40-79. 11. Aruba Networks, 2016. AirWave Network Management. [online] Available at: http://www.arubanetworks.com/ [Accessed on 3 March 2016]. 12. Arya, A., Godlewski, P., and Melle, P., 2009. Performance Analysis of Outdoor Localization System based on RSS Fingerprinting. Proceedings of International Conference on Wireless Communication Systems, pp. 378-382. 13. Arya, A., Godlewski, P., and Melle, P., 2010. A Hierarchical Clustering Technique for Radio Map Compression in Location Fingerprinting Systems. IEEE 71st Vehicular Technology Conference, pp. 1-5. 14. Au, A. W. S., Feng, C., Valaee, S., Reyes, S., Sorour, S., Markowitz, S. N., Gold, D., Gordon, K., and Eizenman, M., 2013. Indoor Tracking and Navigation using Received Signal Strength and Compressive Sensing on a Mobile Device. IEEE Transactions on Mobile Computing, 12(10), pp. 2050-2062. 15. Azhar, S., Ahmad, I., and Sein, M. K., 2009. Action Research as Procative Research Method for Construction Engineering and Management. Journal of Construction Engineering and Management, 136(1), pp.87-98. 16. Bahl, P., and Padmanabhan, N., 2000. RADAR: An In-building RF-based User Location and Tracking System. In 19th Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 775-784. 17. Baiamonte, V., Papagiannaki, K. and Iannaccone, G., 2007. Detecting 802.11 Wireless Hosts from Remote Passive Observations. In Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, LNCS Vol. 4479, pp. 356–367. 18. Balachandran, A., Voelker, G.M. and Bahl, P., 2005. Wireless Hotspots: Current Challenges and Future Directions. Mobile Networks and Applications, 10(3), pp.265–274. 19. Bauer, K., Gonzales, H., and McCoy, D., 2008. Mitigating Evil Twin Attacks in 802.11. IEEE International Conference on Performance, Computing, and Communications, pp. 513-516. 20. Bellardo, J. and Savage, S., 2003. 802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions. In 12th USENIX Security Symposium, pp. 15-27. 21. Beyah, R., Kangude, S., Yu, G., and Strickland, B., 2004. Rogue Access Point Detection using Temporal Traffic Characteristics. IEEE Global Telecommunication Conference, pp. 2271-2275. 22. Beyah, R. and Venkataraman, A., 2011. Rogue-Access-Point Detection: Challenges, Solutions, and Future Directions. IEEE Security & Privacy Magazine, 9(5), pp. 56-61. 23. Bhatia, P., Laurendeau, C., and Barbeau, M., 2010. Solution to the Wireless Evil-Twin Transmitter Attack. 5th International Conference on Risks and Security of Internet and Systems, pp. 1-7. 24. Bien, J., and Tibshirani, R., 2011. Hierarchical Clustering with Prototypes via Minimax Linkage. Journal of American Statistical Association, 106(495), pp. 1075-1084. 25. Biondi, P., and Bareil, N., 2003. Scapy – Interactive Packet Manipulation. [online] Available at: http://www.secdev.org/projects/scapy/ [Accessed on 6 July 2013]. 26. Bittau, A., Handley, M. and Lackey, J., 2006. The Final Nail in WEP’s Coffin. 27th IEEE Symposium on Security and Privacy, pp. 386–400. 27. Branch, J. W., Petroni, N. L., Doorn, L. V., and Safford, D., 2004. Autonomic 802.11 Wireless LAN Security Auditing, IEEE Security and Privacy, 2(3), pp. 56-65. 28. Bratus, S., Cornelius, C., Kotz, D., and Peebles, D., 2008. Active Behavioral Fingerprinting of Wireless Devices. Proceedings of the 1st ACM Conference on Wireless Network Security, pp. 56-61. 29. Brik, V., Banarjee, S., Gruteser, M., and Oh, S., 2008. Wireless Device Identification with Radiometric Signatures. Proceedings of the 14th ACM International Conference on Mobile Computing and Networking, pp. 116–127. 30. Brody, R.G., Gonzales, K. and Oldham, D., 2013. Wi-Fi Hotspots: Secure or Ripe for Fraud?. Journal of Forensic & Investigative Accounting, 5(2), pp.27–47. 31. Bulusu, N., Heidemann, J., and Estrin, D., 2000. GPS-less Low Cost Outdoor Localization for Very Small Devices, IEEE Personal Communications, 7(5), pp. 28-34. 32. Butler, E., 2010. Firesheep. [online] Available at: http://codebutler.com/firesheep/ [Accessed on 5 March 2012]. 33. Butti, L., 2006. Raw Wireless Tools Homepage. [online] Available at: http://rfakeap.tuxfamily.org/ [Accessed on 9 November 2014]. 34. Chae, K., Shao, J., Jung, S., Han, C., Bae, S., and Jeong, I., 2012. A Scheme of Detection and Prevention Rogue AP using Comparison Security Condition of AP, International Conference on Advances in Computer Science and Electronics Engineering, pp. 89-93. 35. Chandra, R., Padhye, J., Ravindranath, L., and Wolman, A., 2007. Beacon-Stuffing: Wi-Fi Without Associations. IEEE Workshop on Mobile Computing Systems and Applications, pp. 53-57. 36. Chapre, Y., Mohapatra, P., Jha, S., and Seneviratne, A., 2013. Received Signal Strength Indicator and Its Analysis in a Typical WLAN System. IEEE 38th Conference on Local Computer Networks, pp. 1-4. 37. Chormole, A., and Datar, K., 2008. Rogue Access Point Detection using Challenge- Response Mechanism. [online] Available at: http://www.csee.umbc.edu/~nicholas/601/601%20tenMinute%20papers/AudumbarPaper.p df [Accessed on 30 November 2015]. 38. Chen, E. Y., and Ito, M., 2009. Using End-to-Middle Security to Protect Against Evil Twin Access Points. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks and Workshops, pp. 1-6. 39. Chen Y., Kleisouris, K., Li, X., Trappe, W., and Martin, R. P., 2006. The Robustness of Algorithms to Signal Strength Attacks: A Comparative Study. 2nd IEEE International Conference on Distributed Computing in Sensor Systems, pp. 546-563. 40. Choi, J., Chang, S. Y., Ko, D., and Hu, Y. C., 2011. Secure MAC-Layer Protocol for Captive Portals in Wireless Hotspots. IEEE International Conference on Communications (ICC). pp. 1-5. 41. Corbett, C., Beyah, R., and Copeland, J. A., 2006. Using Active Scanning to Identity Wireless NICs. Proceedings of the IEEE Workshop on Information Assurance, pp. 239- 246. 42. Cunche, M., 2014. I Know your MAC Address: Targeted Tracking of Individual using Wi- Fi. Journal of Computer Virology and Hacking Techniques, 10(4), pp. 219-227. 43. Deak, G., Curran, K., and Condell, J., 2012. A Survey of Active and Passive Indoor Localisation Systems. Computer Communications, 35(16), pp. 1939-1954. 44. Dekok, A., Cudbard-Bell, A., Mayers, P., and Newton, M., 1999. The FreeRADIUS Project. [online] Available at: http://freeradius.org/ [Acceessd on 24 January 2014]. 45. D’Otreppe, T., 2010a. Aircrack-ng. [online] Available at: http://www.aircrackng. org/doku.php [Accessed on 8 November 2014]. 46. D’Otreppe, T., 2010b. Airbase-ng. [online] Available at: http://www.aircrackng. org/doku.php?id=airbase-ng [Accessed on 8 November 2014]. 47. Ekahau, 2015. Ekahau Wireless Design. [online] Available at: https://www.ekahau.com/products/ekahau-site-survey/overview/ [Accessed on 25 November 2015] 48. Elnahrawy, E., Li, X., and Martin, R. P., 2004. The Limits of Localization using Signal Strength: A Comparative Study. 1st IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, pp. 406-414. 49. Feng, C., Au, W. S. A., Valaee, S., and Tan, Z., 2012. Received Signal Strength based Indoor Positioning using Compressive Sensing. IEEE Transactions on Mobile Computing, 11(12), pp. 1983-1993. 50. Feng, Z., Ning, J., Broustis, I., Pelechrinis, K., Krishnamurthy, S. V., and Faloutsos, M., 2011. Coping with Packet Replay Attacks in Wireless Networks. 8th Annual IEEE Communication Conference on Sensor, Mesh, and Ad-hoc Communications and Networks, pp. 368 – 376. 51. Fluhrer, S., Mantin, I. and Shamir, A., 2001. Weaknesses in the Key Scheduling Algorithm of RC4. International Workshop on Selected Areas in Cryptography, LNCS, 2259, pp.1– 24. 52. Galov, A., Moschevikin, A., and Voronov, R., 2011. Combination of RSS Localization and ToF Ranging for Increasing Positioning Accuracy Indoors. 11th International Conference on ITS Telecommunication, pp. 299-304. 53. Gao, K., Corbett, C., and Beyah, R., 2010. A Passive Approach to Wireless Device Fingerprinting. IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 383 – 392. 54. Gao, Y., Niu, J., Zhou, R., and Xing, G., 2013. ZiFind: Exploiting Cross-Technology Inference Signatures for Energy-Efficient Indoor Localization. IEEE Proceedings of INFOCOM, pp. 2904-2912. 55. Giron, M. A. L., Paulus, A., Link, J. A. B., and Wehrle, K., 2012. Gossipmule: Scanning and Disseminating Information between Stations in Cooperative WLANs. Proceedings of the 3rd ACM International Workshop on Mobile Opportunistic Networks, pp. 87-88. 56. Godber, A., and Dasgupta, P., 2003. Countering Rogues in Wireless Network. International Conference of Parallel Processing Workshops, pp. 1-7. 57. Gold, S., 2011. Cracking Wireless Networks. Network Security, 2011(11), pp.14–18. 58. Gonzales, H., Bauer, K., Lindqvist, J., McCoy, D., and Sicker, D., 2010. Practical Defenses for Evil Twin Attacks in 802.11. IEEE Global Telecommunication Conference, pp. 1-6. 59. Gordon, A. D., 1999. Classification. 2nd ed., London: Chapman & Hall. 60. Gschwandtner, F., and Schindhelm, C. K., 2011. Spontaneous Privacy-friendly Indoor Positioning using Enhanced WLAN Beacons. International Conference on Indoor Positioning and Indoor Navigation (IPIN), pp. 1-8. 61. Guo, F., and Chiueh, T., 2005. Sequence Number-based MAC Address Spoof Detection. Proceedings of the 8th International Conference on Recent Advances in Intrusion Detection, pp. 309-329. 62. Gu, W., Yang, Z., Xuan, D., Jia, W., and Que, C., 2010. Null Data Frame: A Double- Edged Sword in IEEE 802.11 WLANs. IEEE Transactions on Parallel and Distributed Systems, 21(7), pp. 897-910. 63. Gupta, V., and Rohil, M. K., 2013. Bit-Stuffing in 802.11 Beacon Frame: Embedding Non- Standard Custom Information. International Journal of Computer Application, 63(2), pp. 6-12. 64. Guzman-Quiros, R., Martinez-Sala, A., Gomez-Tornero, J. L., and Garcia-Haro, J., 2016. Integration of Directional Antennas in an RSS Fingerprint-based Indoor Localization System, Sensors, 16(1), pp. 1-23. 65. Haines, B., 2010. Seven Deadliest Wireless Technologies Attacks, 1st ed., Burlington: Syngress. 66. Han, H., Sheng, B., Tan, C. C., and Li, Q., 2011. A Timing-Based Scheme for Rogue AP Detection. IEEE Transactions on Parallel and Distributed Systems, 22(11), pp.1912-1925. 67. Hansen, P., and Jaumard, B., 1997. Cluster Analysis and Mathematical Programming. 16th International Symposium on Mathematical Programming, pp. 191-215. 68. Hastie, T., Tibshirani, R., and Friedman, J., 2009. The Element of Statistical Learning: Data Mining, Inference, and Prediction. 2nd ed., New York: Springer. 69. He, T., Huang, C., Blum, B. M., Stankovic, J. A., and Abdelzaher, T., 2003. Range-free Localization Schemes for Large Scale Sensor Networks. Proceedings of the 9th Annual International Conference on Mobile Computing and Networking, pp. 81-95. 70. He, C., and Mitchell, C., 2004. Analysis of the 802.11i 4-way Handshake. Proceedings of the ACM Workshop on Wireless Security, pp. 43–50. 71. He, S., and Chan, S. H. G., 2014. Sectjunction: Wi-Fi Indoor Localization based on Junction of Signal Sector. IEEE International Conference on Communications (ICC), pp. 2605-2610 72. He, S., and Chan, S. H. G., 2016a. Tilejunction: Mitigating Signal Noise for Fingerprintbased Indoor Localization, IEEE Transactions on Mobile Computing, 15(6), pp. 1554- 1568. 73. He, S., and Chan, S. H. G., 2016b. Wi-Fi Fingerprint-based Indoor Positioning: Recent Advances and Comparisons. IEEE Communications Surveys and Tutorials, 18(1), pp. 466- 490. 74. Honkavirta, V., Perala, T., Ali-loytty, S., and Piche, R., 2009. A Comparative Survey of WLAN Location Fingerprinting Methods. 6th Workshop on Positioning, Navigation, and Communication, pp. 243-251. 75. Hsu, F. H., Wang, C. S., Hsu, Y. L., and Cheng, Y. P., 2015. A Client-side Detection Mechanism for Evil Twins. Computers and Electrical Engineering, [online] Available at: http://www.sciencedirect.com/science/article/pii/S0045790615003559 [Accessed on 2 January 2016]. 76. Hwang, H., Jung, G., Sohn, K., and Park, S., 2008. A Study on MITM (Man in the Middle) Vulnerability in Wireless Network Using 802.1X and EAP. International Conference on Information Science and Security (ICISS 2008), pp. 164–170. 77. Hu, X., Shang, J., Gu, F., and Han, Qi., 2015. Improving Wi-Fi Indoor Positioning via AP Sets and Semi-Supervised Affinity Propagation Clustering. International Journal of Distributed Sensor Networks, 2015, pp. 1-11. 78. Idris, M., 2015. Protect your Wireless Network from Evil Access Point. [online] Available at: https://github.com/moha99sa/EvilAP_Defender [Accessed on 2 January 2015]. 79. IEEE Standard 802.1x-2001, 2001. IEEE Standard for Local and metropolitan area networks - Port-Based Network Access Control. 80. IEEE Standard 802.11i, 2004. Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements. 81. IEEE 802.11, 2012. IEEE Standard for Information Technology-Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks--Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification. 82. Informa, 2011. Wifi Hotspots Set to More than Triple by 2015. [online] Available at: http://www.informa.com/Media-centre/Press-releases--news/Latest-News/Wifi-hotspotsset- to-more-than-triple-by-2015/ [Accessed on 31 December 2014]. 83. Jain, A. K., Murty, M. N., and Flynn, P. J., 1999. Data Clustering: A Review. ACM Computing Surveys, 31(2), pp. 264-323. 84. Jana, S., and Kasera, S., 2010. On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews. IEEE Transactions on Mobile Computing, 9(3), pp. 449–462. 85. Jiang, Y., Pan, X., Li, K., Lv, Q., Dick, R. P., Hannigan, M., and Shang, L., 2012. ARIEL: Automatic Wi-Fi based Room Fingerprinting for Indoor Localization. Proceedings of the ACM Conference on Ubiquitous Computing, pp. 441-450. 86. Kaemarungsi, K., and Krishnamurthy, P., 2004. Modelling of Indoor Positioning Systems based on Location Fingerprinting. 23rd Conference of the IEEE Computer and Communications Societies (INFOCOM), pp. 1012-1022. 87. Kao, K. F., Liao, I. E., and Li, Y. C., 2009. Detecting Rogue Access Points using Clientside Bottleneck Bandwidth Analysis. Computers and Security, 28(3), pp. 144-152. 88. Kao, K. F., Yeo, T. H., Yong, W. S., and Chen, H. H., 2011. A Location-aware Rogue AP Detection System based on Wireless Packet Sniffing of Sensor APs. Proceedings of the ACM Symposium on Applied Computing, pp. 32-36. 89. Kaufman, L., and Rousseeuw, P. J., 2009. Finding Groups in Data: An Introduction to Cluster Analysis, New Jersey: John Wiley & Sons. 90. Khalilov, M., 2015. Wireless Hacking – This is Automated Wireless Hacking Tool. [online] Available at: https://github.com/entropy1337/infernal-twin [Accessed on 4 June 2015]. 91. Kim, T., Park, H., Jung, H., and Lee, H., 2012. Online Detection of Fake Access Points using Received Signal Strengths. IEEE 75th Vehicular Technology Conference, pp. 1-5. 92. Kim, Y., Chon, Y., and Cha, H., 2012. Smartphobe-based Collabrorative and Autonoums Radio Fingerprinting. IEEE Transactions on Systems, Man and Cybernatics – Part C: Aaplications and Reviews, 42(1), pp. 112-122 93. Kjaergaard, M. B., 2007. A Taxonomy for Radio Location Fingerprinting. 3rd International Symposium on Location and Context Awareness, pp. 139-156. 94. Kohavi, R., and Provost, F., 1998. Glossary of Terms – Special Issue on Applications of Machine Learning and the Knowledge Discovery Process. Journal of Machine Learning, 30, pp. 271-274. 95. Kupper, A., 2005. Location-based Services Fundamentals and Operation, Chichester: John Wiley & Sons. 96. Kushki, A., Plataniotis, K. N., and Venetsanopoulus, A. N., 2007. Kernel-based Positioning in Wireless Local Area Networks. IEEE Transactions on Mobile Computing, pp. 689-705. 97. Lanze, F., Panchenko, A., Braatz, B., and Zinnen, A., 2012. Clock Skew based Remote Device Fingerprinting Demystified. Global Communications Conference, pp. 813-819. 98. Lanze, F., Panchenko, A., Ponce-Alcaide, I., and Engel, T., 2014. Undesired Relatives: Protection Mechanisms Against the Evil Twin Attack in IEEE 802.11. Proceedings of the 10th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp. 87-94. 99. Lanze, F., Panchenko, A., Ponce-Alcaide, I., and Engel, T., 2015. Hacker’s Toolbox: Detecting Software-based 802.11 Evil Twin Access Points. Annual IEEE Consumer Communications and Networking Conference, pp. 225 – 232. 100. Laurendeau, C. and Barbeau, M., 2008. Hyperbolic Location Estimation of Malicious Nodes in Mobile WiFi/802.11 Networks. 33rd IEEE Conference on Local Computer Networks, pp. 600-607. 101. Lee, J. H., and Buehrer, R. M., 2012. Characterization and Detection of Location Spoofing Attacks, Journal of Communications and Networks, 14(4), pp. 396-409 102. Le, T. M., Liu, R. P., and Hedley, M., 2012. Rogue Access Point Detection and Localization. IEEE 23rd International Symposium on Personal, Indoor, and Mobile Radio Communications, pp. 2489-2493. 103. Li, X., and Martin, R. P., 2008. Simple Algorithm Aggregation Improves Signal Strength based Localization. 3rd International Symposium on Wireless Pervasive Computing, pp. 540-544. 104. Li, X., Chen, Y., Yang, J., and Zheng, X., 2012. Achieving Robust Wireless Localization Resilient to Signal Strength Attacks. Journal of Mobile Communication, Computation and Information, 18(1), pp. 45-58. 105. Liu, H., Darabi, H., Banerjee, P., and Liu, J., 2007. Survey of Wireless Indoor Positioning Techniques and Systems. IEEE Transactions on Systems, Man and Cybernetics, Part C (Applications and Reviews), 37(6), pp. 1067 – 1080. 106. Liu, X., Zhang, S., Quan., J., and Lin, X., 2010. The Experimental Analysis of Outdoor Positioning System based on Fingerprint Approach. 12th IEEE International Conference on Communication Technology, pp. 369-372. 107. Ma, J., Li, X., Tao, X., and Lu, J., 2008. Cluster Filtered KNN: A WLAN-based Indoor Positioning Scheme. International Symposium on a World of Wireless, Mobile and Multimedia Net., pp. 1-8. 108. Ma, L., Teymorian, A. Y., Cheng, X., and Song, M., 2007. RAP: Protecting Commodity Wi-Fi Networks from Rogue Access Points. The Fourth International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness & Workshops, pp. 1–7. 109. Ma, L., Teymorian, A. Y., and Cheng, X., 2008. A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks. The 27th IEEE Conference on Computer Communications, pp. 1894-1902. 110. Malinen, J., (2013). Hostapd: IEEE 802.11 AP, IEEE 802.1X/WPA/WPA2/EAP/RADIUS Authenticator. [online] Available at: https://w1.fi/hostapd/ [Accessed on 8 November 2014]. 111. Mano, C. D., Blaich, A., Liao, Q., Jiang, Y., Cieslak, D. A., Salyers, D. C., and Striegel, A., 2008. RIPPS: Rouge Identifying Packet Payload Slicer Detecting Unauthorized Wireless Hosts through Network Traffic Conditioning. ACM Transactions on Information and Systems Security, 11(2), pp.1–23. 112. Martinez, A., Zurutuza, U., Uribeetxeberria, R., Fernandez, M., Lizarraga, J., Serna, A., and Velez, I., 2008. Beacon Frame Spoofing Attack Detection in IEEE 802.11 Networks. 3rd International Conference on Availability, Reliability, and Security, pp. 520-525. 113. Martinovic, I., Zdarsky, F. A., Bachorek, A., Jung, C., and Schmitt, J. B., 2007. Phishing in the Wireless: Implementation and Analysis. Proceedings of the 22nd IFIP International Information Security Conference, pp. 145–156. 114. Marketsandmarkets, 2015. Global Wi-Fi Market by Business (Model Indoor Wi-Fi, Outdoor Wi-Fi, Transportation Wi-Fi), Product (Access Points, WLAN Controllers, Wireless Hotspot Gateways, Others), Service, Vertical, Region- Global Forecast to 2020. [online] Available at: http://www.marketsandmarkets.com/PressReleases/global-wi-fi.asp [Accessed on 24 December 2015]. 115. Matos, A., Romao, D., and Trezantos, P., 2012. Secure Hotspot Authentication through a Near Field Communication Side-Channel. 5th International Workshop on Selected Topics in Mobile and Wireless Computing, pp. 807 – 814. 116. Mauro, A. D., and Fafoutis, X., 2013. Detecting and Preventing Beacon Replay Attacks in Receiver-Initiated MAC Protocols for Energy Efficient WSNs. Nordic Conference, LNCS 8208, pp. 1-16. 117. Meng, W., Xiao, W., Ni, W., and Xie, L., 2011. Secure and Robust Wi-Fi Fingerprinting Indoor Localization. International Conference on Indoor Positioning and Indoor Navigation (IPIN), pp. 1-7. 118. Mhatre, V., Lundgren, H., Baccelli, F., and Diot, C., 2007. Joint MAC-aware Routing and Load Balancing in Mesh Networks. Proceedings of ACM CoNEXT Conference, pp. 1-12. 119. Mishra, A. and Arbaugh, W.A., 2002. An Initial Security Analysis of the IEEE 802.1x Standard. [online] Available at: https://www.cs.umd.edu/~waa/1x.pdf [Accessed on 4 December 2012]. 120. Monica, D., and Ribeiro, C., 2011. WiFiHop-Mitigating the Evil Twin Attack through Multi-hop Detection. 16th European Symposium on Research in Computer Security, pp. 21- 39. 121. Mooi, E., and Sarstedt, M., 2011. A Concise Guide to Market Research: The Process, Data, and Methods using IBM SPSS Statistics, Berlin Heidelberg: Springer. 122. Morales, J. A., Akopian, D., and Agaian, S., 2015. Faulty Measurement Impact on Wireless Local Area Network Positioning Performance. IET on Radar, Sonar and Navigation, 9(5), pp. 501-508. 123. Mustafa, H., and Xu, W., 2014. CETAD: Detecting Evil Twin Access Point Attacks in Wireless Hotspots. IEEE Conference on Communication and Network Security, pp. 238- 246. 124. Nakhila, O., Dondyk, E., Amjad, M. F., and Zou, C., 2015. User-side Wi-Fi Evil Twin Attack Detection using SSL/TCP Protocols. 12th Annual IEEE Consumer Communications and Networking Conference, pp. 239 – 244. 125. Netscout, 2016. AirMagnet WiFi Analyzer PRO. [online] Available at: http://enterprise.netscout.com/enterprise-network/wireless-network/AirMagnet-WiFi- Analyzer [Accessed on 3 March 2016]. 126. NetStumbler.com, 2012. NetStumbler. [online] Available at: http://www.netstumbler.com/[Accessed on 4 December 2013]. 127. Neumann, C., Heen, O., and Onno, S., 2012. An Empirical Study of Passive 802.11 Device Fingerprinting. 32nd International Conference on Distributed Computing Systems Workshops, pp. 593-602. 128. Nguyen K. A., and Luo, Z., 2014. Selective Mixture of Gaussians Clustering for Location Fingerprinting. 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 328-337. 129. Nikbakhsh, S., Abdul Manaf, A., Zamani, M., and Janbeglou, M., 2012. A Novel Approach for Rogue Access Point Detection on the Client-side. International Conference on Advanced Information Networking and Applications Wokshops, pp. 684 – 687. 130. Organero, M. M., and Pacheco, C. B., 2016. Improving Accuracy and Simplifying Training in Fingerprinting-based Indoor Location Algorithms at Room Level. Mobile Information Systems, 2016(1), pp. 1-16. 131. Oun, A. O., Bloch, C., and Spies, F., 2014. Indoor Positioning using CoLDE: An IEEE 802.11 Connectionless Extension. International Conference on Indoor Positioning and Indoor Navigation (IPIN), pp. 491-500 132. Oussar, Y., Ahriz, I., Denby, B., and Dreyfus, G., 2011. Indoor Localization based on Cellular Telephony RSSI Fingerprints Containing Very Large Numbers of Carriers. Journal of Wireless Communications and Networking, 2011(1), pp. 1-14. 133. Papini, D., 2012. Lightweight MAC-Spoof Detection Exploiting Received Signal Power and Median Filtering. International Journal of Critical Computer-based Systems, 3(4), pp. 247-261. 134. Park, C.S., 2010. Two-way Handshake Protocol for Improved Security in IEEE 802.11 Wireless LANs. Computer Communications, 33(9), pp.1133–1140. 135. Patel, S. N., Truong, K. N., and Abowd, G. D., 2006. PowerLine Positioning: A Practical Sub-room Level. 8th International Conference on Ubiquitous Computing, pp. 441-458. 136. Pielou, E. C., 1984. The Interpretation of Ecological Data: A Primer on Classification and Ordination, 1st ed., New York: John Wiley & Sons. 137. Podani, J., 2000. Introduction to the Exploration of Multivariate Biological Data, Leiden: Backhuys Publishers. 138. Pressman, R. S., 2001. Software Engineering: A Practitioner's Approach, 5thed. New York, NY: McGraw-Hill. 139. PRIVATE WiFi, 2014. Whitepaper: The Hidden Dangers of Public WiFi. [online] Available at: http://www.privatewifi.com/wpcontent/ uploads/2015/01/PWF_whitepaper_v6.pdf [Accessed on 3 January 2016]. 140. Qu, G. and Nefcy, M. M., 2010. RAPiD : An Indirect Rouge Access Points Detection System. IEEE 29th International Conference on Performance Computing and Communications (IPCCC), pp. 9–16. 141. Rappaport, T.S., 1996. Wireless Communications: Principles and Practice, NJ: Prentice Hall. 142. Reising, D. R., Temple, M. A., and Jackson, J. A., 2015. Authorized and Rogue Device Discrimination using Dimensionally Reduced RF-DNA Fingerprints. IEEE Transactions on Information Forensics and Security, 10(6), pp. 1180-1192. 143. Riaz, Z., Arslan, M., Kiani, A. K., and Azhar. S., 2014. CoSMos: A BIM and Wireless Sensor based Integrated Solution for Worker Safety in Confined Spaces. Automation in Construction, 45(1), pp. 96-106. 144. Ripley, B. D., 1996. Pattern Recognition and Neural Networks, 1st Ed., Cambridge Uni. Press. 145. Sheng, Y., Tan, K., Chen, G., Kotz, D., and Campbell, A., 2008. Detecting 802.11 MAC Layer Spoofing using Received Signal Strength. 27th IEEE Conference on Computer Communications, pp. 1-9. 146. Shetty, S., Song, M. and Ma, L., 2007. Rogue Access Point Detection by Analyzing Network Traffic Characteristics. IEEE Military Communications Conference, MILCOM, pp. 1–7. 147. Shivaraj, G., Song, M. and Shetty, S., 2008. A Hidden Markov Model based Approach to Detect Rogue Access Points. IEEE Military Communications Conference, pp. 1–7. 148. Shrestha, R., and Nam, S. Y., 2014. Access Point Selection Mechanism to Circumvent Rogue Access Points using Voting-based Query Procedure, IET Communication, 8(16), pp. 2943-2951. 149. Song, Y., Yang, C., and Gu, G., 2010. Who is Peeping at Your Passwords at Starbucks? To Catch and Evil Twin Access Point. IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 323-332. 150. Sorour, S., Lostanle, Y., Valaee, S., and Majeed, K., 2015. Joint Indoor Localization and Radio Map Construction with Limited Deployment Load. IEEE Transactions on Mobile Computing, 14(5), pp. 1031-1043. 151. Stakenburg, D., and Crampton, J., 2013. Underexposed Risks of Public Wi-Fi Hotspots. ComputerWeekly.com, 2013(3), pp. 1-7, [online] Available at: http://www.computerweekly.com/ehandbook/Underexposed-risks-of-public-Wi-Fihotspots [Accessed on 8 November 2014]. 152. Stubblefield, A., Ioannidis, J. and Rubin, A.D., 2004. A Key Recovery Attack on the 802.11b Wired Equivalent Privacy Protocol (WEP). ACM Transactions on Information and System Security, 7(2), pp. 319–332. 153. Sun, Y., Xu, Y., Ma, L., and Deng, Z., 2009. KNN-FCM Hybrid Algorithm for Indoor Location in WLAN. 2nd International Conference on Power Electronics and Intelligent Transportation System, pp. 251-254. 154. Sun, Y. L., and Xu, Y. B., 2013. Error Estimation Method for Matrix Correlation-based Wi-Fi Indoor Localization. KSII Transactions on Internet and Information Systems, 7(11), pp. 2657-2674. 155. Swangmuang, N., and Krishnamurthy, P., 2008. On Clustering RSS Fingerprints for Improving Scalability of Performance of Indoor Positioning Systems. Proceedings of 1st ACM International Workshop on Mobile Entity Localization and Tracking in GPS-less Environments, pp. 61-66. 156. Swiat, K., 2006. The Travelling Menace: Rogue Hotspot. Computer Fraud & Security, 2006(12), pp.13–15. 157. Szongott, C., Brenner, M., and Smith, M., 2015. METDS-A Self-contained, Context-based Detection System for Evil Twin Access Point. 19th International Conference on Financial Security and Data Security, pp. 370-386. 158. Tang, S., Taniguchi, N., Shagdar, O., and Tamai, M., 2010. Potential Throughput based Access Point Selection. 16th Asia-Pasific Conference on Communications, pp. 470-475. 159. Tang, Z., Zhao, Y., Yang, L., Qi, S., Fang, D., Chen, X., Gong, X., and Wang, Z., 2017. Exploiting Wireless Received Signal Strength Indicators to Detect Evil Twin Attacks in Smart Homes. Mobile Information Systems, pp. 1-14. 160. Takahashi, D., Xiao, Y., Zhang, Y., Chatzimisio, P., and Chen, H. H., 2010. IEEE 802.11 User Fingerprinting and its Applications for Intrusion Detection. Computers & Mathematics with Applications, 60(2), pp. 307–318. 161. Tian, Z., Tang, X., Zhou, M., and Tan, Z., 2013. Fingerprint Indoor Positioning Algorithm based on Affinity Propagation Clustering, EURASIP Journal on Wireless Communications and Networking, 2013, pp. 1-8. 162. Timm, C. and Perez, R., 2010. Seven Deadliest Social Network Attacks, Burlington: Syngress. 163. Tippenhauer, N. O., Rasmussen, K. B., Popper, C., and Capkun, S., 2009. Attacks on Public WLAN-based Positioning Systems. Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, pp. 29 – 40. 164. Tsai, C. T., and Jan, R. H., 2006. A Rogue AP Detection System for Wireless LANs. [online] Available at: https://www.researchgate.net/publication/228470699_A_Rogue_AP_Detection_System_for_Wireless_LANs [Accessed on 30 November 2015] 165. Venkataraman, A. and Beyah, R., 2009. Rogue Access Point Detection Using Innate Characteristics of the 802.11 MAC. Security and Privacy in Communication Networks, LNICST Vol. 19, pp. 394–416. 166. Watkins, L., Beyah, R. and Corbett, C., 2007. A Passive Approach to Rogue Access Point Detection. IEEE Global Telecommunications Conference, pp. 355–360. 167. Wei, W., Suh, K., Wang, B., Gu, Y., Kurose, J., and Towsley, D., 2007. Passive Online Rogue Access Point Detection Using Sequential Hypothesis Testing with TCP ACK-Pairs, Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp. 365 – 378. 168. Wei, W., Suh, K., Wang, B., and Gu, Y., 2009. Passive Online Detection of 802.11 Traffic Using Sequential Hypothesis Testing with TCP ACK-Pairs. IEEE Transactions on Mobile Computing, 8(3), pp.398–412. 169. Wei, W., Jaiswl, S., Kurose, J., Towsley, D., Suh, K., and Wang, B., 2012. Identifying 802.11 Traffic from Passive Measurements Using Iterative Bayesian Inference. IEEE/ACM Transactions on Networking, 20(2), pp.325–338. 170. Wi-Fi Alliance, 2012. Hotspot 2.0 (Release 1) Tech. Spec. Package v1.0.0. [online] Available at: https://www.wi-fi.org/file/hotspot-20-release-1-technical-specificationpackage- v100 171. WiMetrics.com, 2006. WiSentry. [online] Available at: http://www.wimetrics.com/ [Accessed on 8 November 2015] 172. Wirtz, H., Kunz, G., Laudenberg, J., Backhaus, R., and Wehrle, K., 2014. Highperformance, Energy-efficient Mobile Wireless Networking in 802.11 Infrastructure Mode. IEEE 11th Internation Conference on Mobile Ad Hoc and Sensor System, pp. 291-299 173. Wu, C., Yang, Z., Zhao, Z., Liu, Y., and Liu, M., 2013. DorFin: WiFi Fingerprint-based Localization Revisited, [online] Available at: http://arxiv.org/abs/1308.6663 [Accessed on 6 December 2013]. 174. Xu, Q., Zheng, R., Saad, W., and Han, Z., 2016. Device Fingerprinting in Wireless Networks: Challenges and Opportunities. IEEE Communications Surveys and Tutorials, 18(1), pp. 94-104. 175. Xu, W., Trappe, W., Zhang, Y., and Wood, T., 2005. The Feasibility of Launching and Detecting Jamming Attacks in Wireless Networks. Proc .of the 6th International Symposium on Mobile Ad Hoc Networking and Computing, pp. 46-57. 176. Xu, W., Ma, K., Trappe, W., and Zhang, Y., 2006. Jamming Sensor Networks: Attack and Defense Strategies. IEEE Network, 20(3), pp. 41-47. 177. Yager, R. R., 2000. Intelligent Control of the Hierarchical Agglomerative Clustering Process. IEEE Transactions on System, Man, Cybernatics-Part B: Cybernatics, 30(6), pp. 835-845. 178. Yan, B., Chen, G., Wang, J., and Yin, H., 2008. Robust Detection of Unauthorized Wireless Access Point. Journal of Mobile Networks and Applications, 14(4), pp. 508-522. 179. Yang, C., Song, Y. and Gu, G., 2012. Active User-Side Evil Twin Access Point Detection Using Statistical Techniques. IEEE Transactions on Information Forensics and Security, 7(5), pp. 1638–1651. 180. Yang, C., and Shao, H. R., 2015. Wi-Fi-based Indoor Positioning. IEEE Communication Magazine, 53(3), pp. 150-157. 181. Yang, F., Lu, J., Theoleyre, F., Shu, W., and Wu, M., 2015. Dynamic Active Area Clustering with Inertial Information for Fingerprinting based Indoor Localization Systems. IFIP Networking Conference, pp. 1-9. 182. Yang, J., Chen, Y., Trappe, W., and Cheng, J., 2013. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks. IEEE Transactions on Parallel and Distributed Systems, 24(1), pp. 44 – 58. 183. Yeo, J., Youssef, M. and Agrawala, A., 2004. A Framework for Wireless LAN Monitoring and its Applications. Proceedings of the ACM Workshop on Wireless Security, pp. 70–79. 184. Yin, H., Chen, G. and Wang, J., 2007. Detecting Protected Layer-3 Rogue APs. 4th International Conference on Broadband Communications, Networks and Systems, pp. 449 – 458. 185. Youssef, M. A., Agrawala, A., and Shakar, A. U., 2003. WLAN Location Determination via Clustering and Probability Distributions. 1st IEEE International Conference on Pervasive Computing and Communications, pp. 143-150. 186. Zebra, 2016. AirDefense Service Platform. [online] Available at: https://www.zebra.com/us/en.html [Accessed on 8 November 2015] 187. Zhang, C., Luo, H., Li, Z., Zhao, F., and Deng, Li., 2014. A Robust Fingerprinting Localization Algorithm against Signal Strength Attacks. In Principle and Application Progress in Location-Based Services, Lecture Notes in Geoinformation and Cartography, pp. 47-57. 188. Zhang, Y., and Sampalli, S., 2010. Client-based Intrusion Prevention System for 802.11 Wireless LANs. IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications, pp. 100-107. 189. Zhang, Y., Bethanabhotla, D., Hao, T., and Psounis, K., 2015. Near-optimal User-cell Association Schemes for Real-world Networks. Information Theory and Application Workshop (ITA), pp. 204-213. 190. Zheng, X., Wang, C., Chen, Y., and Yang, J., 2014. Accurate Rogue Access Point Localization Leveraging Fine-grained Channel Information. IEEE Conference on Communications and Network Security, pp. 211-219. 191. Zhou, Y., and Fang, Y., 2005. Defend against Topological Attacks in Sensor Networks. Military Communication Conference (MILCOM), pp. 768-773. 192. Zou, H., Lu, X., Jiang, H., and Xie, L., 2015. A Fast and Precise Indoor Localization Algorithm based on an Online Sequential Extreme Learning Machine, Sensors, 15(1), pp. 1804-1824. 193. Zovi, D.A., and Macaulay, S. A., 2005. Attacking Automatic Wireless Network Selection. Proceedings of 6th Annual IEEE SMC on Information Assurance Workshop, pp. 365-372