scholarly journals The rogue access point identification: a model and classification review

Author(s):  
Diki Arisandi ◽  
Nazrul Muhaimin Ahmad ◽  
Subarmaniam Kannan

Most people around the world make use of public Wi-Fi hotspots, as their daily routine companion in communication. The access points (APs) of public Wi-Fi are easily deployed by anyone and everywhere, to provide hassle-free Internet connectivity. The availability of Wi-Fi increases the danger of adversaries, taking advantages of sniffing the sensitive data. One of the most serious security issues encountered by Wi-Fi users, is the presence of rogue access points (RAP). Several studies have been published regarding how to identify the RAP. Using systematic literature review, this research aims to explore the various methods on how to distinguish the AP, as a rogue or legitimate, based on the hardware and software approach model. In conclusion, all the classifications were summarized, and produced an alternative solution using beacon frame manipulation technique. Therefore, further research is needed to identify the RAP.

2021 ◽  
Vol 3 (11) ◽  
pp. 144-154
Author(s):  
Roman Korolkov

One of the most serious security threats to wireless local area networks (WLANs) in recent years is rogue access points that intruders use to spy on and attack. Due to the open nature of the wireless transmission medium, an attacker can easily detect the MAC addresses of other devices, commonly used as unique identifiers for all nodes in the network, and implement a spoofing attack, creating a rogue access point, the so-called "Evil Twin". The attacker goal is to connect legitimate users to a rogue access point and gain access to confidential information. This article discusses the concept, demonstrates the practical implementation and analysis of the “Evil Twin” attack. The algorithm of the intruder's actions, the scenario of attack on the client, and also procedure for setting up the program-implemented rogue access point is shown. It has been proven that the implementation of the attack is possible due to the existence of several access points with the same service set identifier and MAC address in the same area, allowed by 802.11 standard. The reasons for failure operation of the network and possible interception of information as a result of the attack are identified, methods of detecting rogue access points are analyzed. During the experiment, observations of the 802.11 frames showed that there were deviations in the behavior of beacon frames at the time of the "Evil Twin" attack. First, the number of beacon frames coming from the access point which succumbed to the attack is increasing. Secondly, the traffic analyzer detected significant fluctuations in the values of the received signal level, which simultaneously come from a legitimate and rogue access point, which allows to distinguish two groups of beacon frames. The "Evil Twin" attack was implemented and researched using Aircrack-ng – a package of software for auditing wireless networks, and Wireshark – network traffic analyzer. In the future, the results obtained can be used to improve methods of protection against intrusion into wireless networks, in order to develop effective systems for detecting and preventing intrusions into WLAN.


Author(s):  
S. B. Vanjal ◽  
Amol K. Kadam ◽  
Pramod A. Jadhav

Rogue Access Points (RAPs) is one of the leading security threats in current network scenario, if not properly handled in time could lead from minor network faults to serious network failure. Most of the current solutions to detect rogue access points are not automated and are dependent on a specific wireless technology. In this paper we propose the integrated solution for detection and eliminate the rogue access points. Rogue detection algorithm is also proposed. This Methodology has the following properties: (1) it doesn’t require any specialized hardware; (2) the proposed algorithm detects and completely eliminates the RAPs from network; Our proposed solution is effective and low cost.


Author(s):  
Suci Tri Lestari ◽  
Suroso Suroso ◽  
Ibnu Ziad

Nowadays wireless communication has become a basic necessity for the community. WiFi (wireless fidelity) One of them, which is a local network that uses an electromagnetic signal that works at a frequency of 2.4 GHz. Tool to implement WiFi is Access point (AP). The toughest bully in the world of WiFi is known for interference. Interference is the use of the same frequency or channel on a network. Interference can cause service quality to decline so that it is less optimal in its usage, therefore the optimization needs to the network so that users can use the network without constraints. From the results of the research that has been done, the optimization is done by evaluating the selection of the channel from each access point studied with the access point that was concluded that the optimization of the results of all access points experienced Improved signal quality as in AP 1 prior to optimized (-64.0) dBm to (-56.0) dBm category good and after optimized (-56.0) dBm to (-48) dBm category excellent.


Author(s):  
Menal Dahiya ◽  
Sumeet Gill

The serious issue in the field of wireless communication is the security and how an organization implements the steps against security breach. The major attack on any organization is Man in the Middle attack which is difficult to manage. This attack leads to number of unauthorized access points, called rogue access points which are not detected easily. In this paper, we proposed a Hopfield Neural Network approach for an automatic detection of these rogue access points in wireless networking. Here, we store the passwords of the authentic devices in the weight matrix format and match the patterns at the time of login. Simulation experiment shows that this method is more secure than the traditional one in WLAN.


2021 ◽  
Vol 11 (1) ◽  
pp. 13-20
Author(s):  
Roman Y. Korolkov ◽  
Serhii V. Kutsak

The “Evil twin” rogue access point is one of the most serious security threats to wireless LANs. To solve this problem, a practical approach has been proposed for detecting rogue access points using the received signal strength indicator (RSSI). First, a distributed architecture is presented, which consists of three network analyzers. Then, a cluster analysis of the RSSI vectors is performed to determine the attack. The coordinates of the centroids of clusters obtained were converted into the distance by using an empirical model of signal propagation under indoor conditions. The obtained distances are used to determine the localization of a rogue access point (RAP) using the trilateration method. Finally, we are conducting experiments to evaluate the performance of practical RAP detection. The results show that the proposed approach to detecting rogue access points can significantly reduce the frequency of false alarms, while providing an average localization error of 1.5m, which is quite acceptable for RAP localization in real indoor conditions.


2013 ◽  
Vol 1 (1) ◽  
pp. 100
Author(s):  
Selçuk Yurtsever

It has been known that both in the world and in Turkey a continuous change has been experienced in the provision of health services in recent years. In this sense by adopting the customer(client) focused approach of either public or private sector hospitals; it has been seen that they are in the struggle for presenting a right, fast, trustuble, comfy service. The purpose of this research is to measure the satisfaction degree, expectations and perceptions of the patients in Karabük State Hospital through comparison. In this context, the patient satisfaction scale which has been developed as a result of literature review has been used and by this scale it has been tried to measure the satisfaction levels of the patients in terms of material and human factors which are the two main factors of the service that was presented. In the study, with the scales of Servqual and 0-100 Points together, in the part of the analysis MANOVA have been used. The expectations and the perceptions of the patient has been compared first by generally and then by separating to different groups according to the various criterias and in thisway it has been tried to be measured their satisfaction levels. According to the results that were obtained, although, the satisfaction levels of the patients who have taken service from Karabük State Hospital are high in terms of thedoctors and the nurses; it has been reached to the result that their satisfaction levels are low in terms of the materials that have been used at the presenting of the service and the management.


2020 ◽  
Vol 9 (3) ◽  
pp. 111-119
Author(s):  
Yu.Yu. IERUSALIMSKY ◽  
◽  
A.B. RUDAKOV ◽  

The article is devoted to the study of such an important aspect of the activities of the World Russian People's Council (until 1995 it was called the World Russian Council) in the 90-s of the 20-th century as a discussion of national security issues and nuclear disarmament. At that time, a number of political and public figures actively called for the nuclear disarmament of Russia. Founded in 1993, the World Russian Council called for the Russian Federation to maintain a reasonable balance between reducing the arms race and fighting for the resumption of detente in international relations, on the one hand, and maintaining a powerful nuclear component of the armed forces of the country, on the other. The resolutions of the World Russian Council and the World Russian People's Council on the problems of the new concepts formation of foreign policy and national security of Russia in the context of NATO's eastward movement are analyzed in the article. It also shows the relationship between the provisions of the WRNS on security and nuclear weapons issues with Chapter VIII of the «Fundamentals of the Social Concept of the Russian Orthodox Church».


Author(s):  
Paul J. Bolt ◽  
Sharyl N. Cross

Chapter 1 explores perspectives on world order, including power relationships and the rules that shape state behavior and perceptions of legitimacy. After outlining a brief history of the relationship between Russia and China that ranged from cooperation to military clashes, the chapter details Chinese and Russian perspectives on the contemporary international order as shaped by their histories and current political situation. Chinese and Russian views largely coincide on security issues, the desirability of a more multipolar order, and institutions that would enhance their standing in the world. While the Chinese–Russian partnership has accelerated considerably, particularly since the crisis in Ukraine in 2014, there are still some areas of competition that limit the extent of the relationship.


Sign in / Sign up

Export Citation Format

Share Document