International Conference on Information Communication and Embedded Systems (ICICES2014) 2014
DOI: 10.1109/icices.2014.7034106
|View full text |Cite
|
Sign up to set email alerts
|

Rogue access point detection methods: A review

Abstract: Rogues are unwanted whether they are access points or clients as they steal critical data and bandwidth. To detect a rogue access point different approaches are used. These approaches are briefly classified as Client-side approach, Server-side and Hybrid approach. Every approach has its own advantages and disadvantages. Clients have limited resources and do not possess much control over network when compared with servers. Amongst all approaches Hybrid approach is efficient because it minimizes the inabilities … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
0
0
3

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 13 publications
0
0
0
3
Order By: Relevance
“…Furthermore, the particular probe packets are easily detected by an experienced attacker who can ignore the probe packets to bypass the detection of Wi-Fi. The WPFD does not have this problem On the other hand, in the previous research on general rogue APs there is a summary or a discussion like Sweta et al [26], and for a round-trip time measurement with a machine learning algorithm, in Songrit et al [27]. Furthermore, as mentioned above, there are also algorithms like Ganesh et al, which is a standard algorithm of the LAN network environment [28], and Neha et al [29], which is a hash algorithm focused on WLAN security.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, the particular probe packets are easily detected by an experienced attacker who can ignore the probe packets to bypass the detection of Wi-Fi. The WPFD does not have this problem On the other hand, in the previous research on general rogue APs there is a summary or a discussion like Sweta et al [26], and for a round-trip time measurement with a machine learning algorithm, in Songrit et al [27]. Furthermore, as mentioned above, there are also algorithms like Ganesh et al, which is a standard algorithm of the LAN network environment [28], and Neha et al [29], which is a hash algorithm focused on WLAN security.…”
Section: Related Workmentioning
confidence: 99%
“…Jenis ancaman-ancaman yang sering terjadi pada jaringan Wifi adalah ETA (Evil Twin Attack). Serangan ini dilakukan dengan memanfaatkan AP (Acsess Point) palsu yang dibuat sama persis dengan legitimate AP dengan tujuan untuk menjebak para pengguna jaringan Wifi [1], kemudian pelaku dapat melancarkan serangan MITM (Man In The Middle Attack) untuk melakukan aktivitas snifing, spofing dan kegiatan ilegal lainya.…”
Section: Pendahuluanunclassified
“…Keterangan no 1 ditemukan dua file yaitu file Html dengan sessions index. (1) dan file Css dengan seissions css. (1), yang mana merupakan Website "mangaku.web.id" yang kemudian dibelokkan ke situs yang sengaja dibuat.…”
Section: Gambar 6 Wireshark Hierarki Modulunclassified
See 1 more Smart Citation