Wireless LAN Intrusion Detection and Prevention system for Malicious Access Point

In current trends, A Malicious AP might be set in any open spaces so as to imitate honest to goodness APs for adaptation. Existing malicious AP detection methods analyze wireless traffic by using extra devices, and the data of traffic is collected by servers. Malicious Access Points, if undetected,...

Full description

Saved in:
Bibliographic Details
Published in2015 2nd International Conference on Computing for Sustainable Global Development (INDIACom) pp. 487 - 490
Main Authors Vanjale, Sandeep B., Mane, P. B., Patil, Sandip V.
Format Conference Proceeding
LanguageEnglish
Published Bharati Vidyapeeth, New Delhi 01.03.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In current trends, A Malicious AP might be set in any open spaces so as to imitate honest to goodness APs for adaptation. Existing malicious AP detection methods analyze wireless traffic by using extra devices, and the data of traffic is collected by servers. Malicious Access Points, if undetected, can take important data from the network. So many attackers took advantages of the undetected Malicious Access Points in ventures to not just get free Internet. In this paper, we consider the problem of "malicious" attacks in wireless local area networks (WLANs). A Malicious is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID) and we consider an unprotected client, other networks client to avoid wireless unauthorized clients.
ISBN:9380544154
9789380544151