Open Access   Article Go Back

A Survey on Wireless Malevolent Access Point Detection Methods for WLAN

Punam Rajput1 , Prasad Kulkarni2

Section:Survey Paper, Product Type: Journal Paper
Volume-4 , Issue-4 , Page no. 48-50, Apr-2016

Online published on Apr 27, 2016

Copyright © Punam Rajput , Prasad Kulkarni . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Punam Rajput , Prasad Kulkarni, “A Survey on Wireless Malevolent Access Point Detection Methods for WLAN,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.48-50, 2016.

MLA Style Citation: Punam Rajput , Prasad Kulkarni "A Survey on Wireless Malevolent Access Point Detection Methods for WLAN." International Journal of Computer Sciences and Engineering 4.4 (2016): 48-50.

APA Style Citation: Punam Rajput , Prasad Kulkarni, (2016). A Survey on Wireless Malevolent Access Point Detection Methods for WLAN. International Journal of Computer Sciences and Engineering, 4(4), 48-50.

BibTex Style Citation:
@article{Rajput_2016,
author = {Punam Rajput , Prasad Kulkarni},
title = {A Survey on Wireless Malevolent Access Point Detection Methods for WLAN},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {48-50},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=855},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=855
TI - A Survey on Wireless Malevolent Access Point Detection Methods for WLAN
T2 - International Journal of Computer Sciences and Engineering
AU - Punam Rajput , Prasad Kulkarni
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 48-50
IS - 4
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
1915 1598 downloads 1467 downloads
  
  
           

Abstract

In Current Trends many public places like bus stations, restaurant, malls etc. provides Wi-Fi connectivity to the users with free of cost. These public places having a device like wireless access point through which they provide service to the end users. . It is designed to utilize the existing wireless LAN infrastructure. These rogue access points (APs) expose the enterprise network to a barrage of security vulnerabilities in that they are typically connected to a network port behind the firewall. The growing acceptance of wireless local area network causes a risk of wireless security attacks. The attacker creates a malevolent access point to attract the users and perform attacks on user devices through WLAN. Malevolent access point is one of the serious threats in wireless local area network. We Study in this paper survey on recent different fake access point detection methods and identified their advantages and disadvantages.

Key-Words / Index Term

FAP, WLAN , MITMA, Evil Twin Attatck

References

[1] W.wei,S.Jaiswal,J.Kurose and D.Towsley,Identifying 802.11 traffic from passive measurments using iterative Bayesian inference in Proc. IEEE INFOCOM 06,2006.
[2] L.Watkins,R.Beyah, and C. Corbett, Apassive apporach to rogue access point detection,in Proc. IEEE INFOCOM 06,2006.
[3] Active User-side Evil Twin Access Point Detection Using Statistical Techniques Chao Yang, Yimin Song, and Guofei Gu, Member, IEEE.
[4] Roth, V., Polak, W., Rieffel, E. Turner, T.,"Simple and effective defense against Evil Twin Access Points", WiSec’08, March 31–April 2, 2008, Virginia,USA, 2008.
[5] S. B. Patil, S. M. Deshmukh, Dr. Preeti Patil and Nitin Chavan, “Intrusion Detection Probability Identification in Homogeneous System of Wireless Sensor Network”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 2, 2012, pp. 12 - 18, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[6] Ajay M. Patel, Dr. A. R. Patel and Ms. Hiral R. Patel, “A Comparative Analysis of Data Mining Tools for Performance Mapping of WLAN Data”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 241 - 251, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.
[7] Sandip Patil and Vanjale S.B,”Wireless LAN Intrusion Detection and Prevention System for Malicious Access Point ”, Proceedings of the 9th INDIACom; INDIACom-2015; IEEE Conference,11-13th March ,2015
[8] Sandip Patil, Sandeep Vanjale, “Wireless LAN Intrusion Detection System (WLIDS) for Malicious Access Point:” Goa Conference IRAJ, and 13 July 2014.
[9] Sandip Patil and Sandeep Vanjale, “A Survey on Malicious Access Point Detection Methods for Wireless Local Area Network”, IJCSE (E-ISSN: 2347-2693) Vol.2, Issue 3, March 2014.