Fake Access Point Detection and Prevention Techniques
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 3
Abstract
There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks are possible. The man-in-middle, session hijacking is the most common active attack today life. The session hijacking attack can be generally performed with the help of honey pot. The honey pot is just an access point without any security. In our work, fake access point is the honey. In the session hijacking attack we attract legitimate user to connect with the unencrypted access point.When the legitimate user connect with the access point, we hack the cookies, sessions of the legitimate user. In this paper, different techniques are purposed that helpful in detecting the fake access point. Most of the techniques are based on beacon frames for detection of fake access point. This paper shows how the fake access point takes place and work in real life and how the session is hijack. The fake access point creation and hijacking of session is done with the help of backtrack 5 and to detect and prevent different techniques are used.
Authors and Affiliations
Hemashu Kamboj, Gurpreet Singh
Offensive Decoy Technology For Cloud Data Attacks
Cloud Computing enables multiple users to, share common computing resources, and to access and store their personal and business information. These new paradigms have thrown new data security challenges. The majority of...
Extracting Multiwords From Large Document Collection Based N-Gram
Multiword terms (MWTs) are relevant strings of words in text collections. Once they are automatically extracted, they may be used by an Information Retrieval system, suggesting its users possible conceptual interes...
A DC–DC Quad Active Bridge Converter Based Hybrid Energy Storage Systems
The Solid-state transformer (SST) has been proposed in this paper to replace the regular distribution transformer in the future smart grid. The SST provides ports for the integration of storage and distributed generation...
Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. So that Ad hoc networks are mainly used in emergency situations where no infrastructure is available, for e.g. military battle...
Adaptive Neural Networks and Random Distribution for Cancer Tissue Detection and Localization with Random multivariable
In this paper a novel approach is described to perform detection of Cancer Tissues by directly modeling the statistical characteristics of the Cancer Cells. This approach allows us to represent Cancer Tissue Acqui...