Identifying 802.11 Traffic From Passive Measurements Using Iterative Bayesian Inference

@article{Wei2012Identifying8T,
  title={Identifying 802.11 Traffic From Passive Measurements Using Iterative Bayesian Inference},
  author={Wei Wei and Sharad Jaiswal and James F. Kurose and Don Towsley and Kyoungwon Suh and Bing Wang},
  journal={IEEE/ACM Trans. Netw.},
  year={2012},
  volume={20},
  pages={325-338}
}
In this paper, we propose a classification scheme that differentiates Ethernet and WLAN TCP flows based on measurements collected passively at the edge of a network. This scheme computes two quantities, the fraction of wireless TCP flows and the degree of belief that a TCP flow traverses a WLAN inside the network, using an iterative Bayesian inference algorithm that we developed. We prove that this iterative Bayesian inference algorithm converges to the unique maximum likelihood estimate (MLE… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 28 CITATIONS

Algorithms and Architectures for Parallel Processing

VIEW 10 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

SLFAT: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames

VIEW 1 EXCERPT
CITES BACKGROUND

A Lightweight Scheme for Rapid and Accurate WiFi Path Characterization

  • Lixing Song, Aaron Striegel
  • Computer Science
  • 2018 27th International Conference on Computer Communication and Networks (ICCCN)
  • 2018

A Passive Client-based Approach to Detect Evil Twin Attacks

VIEW 2 EXCERPTS
CITES BACKGROUND & METHODS

EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures

VIEW 3 EXCERPTS
CITES BACKGROUND

Locating Rogue Access Point Using Fine-Grained Channel Information

VIEW 1 EXCERPT
CITES BACKGROUND

Rogue Access Point Detector Using Characteristics of Channel Overlapping in 802.11n

VIEW 1 EXCERPT

CrowdAP: Crowdsourcing driven AP coordination for improving energy efficiency in wireless access networks

VIEW 1 EXCERPT
CITES BACKGROUND

Detection of man-in-the-middle attacks using physical layer wireless security techniques

VIEW 1 EXCERPT
CITES BACKGROUND