期刊名称:International Journal of Computer Science & Technology
印刷版ISSN:2229-4333
电子版ISSN:0976-8491
出版年度:2013
卷号:4
期号:2
页码:401-404
语种:English
出版社:Ayushmaan Technologies
摘要:Nowadays, Wireless Access Points are popularly used for the convenience of mobile users. The growing popularity of Wireless Local Network (WLAN) put forth different dangers of wireless security attacks. The vicinity of Evil Access Points is a standout amongst the most difficult system security concerns for system administrator. Evil Twin Access Points, if undetected, can take important information from the network. Numerous attackers took advantages of the undetected Evil Twin Access Points in ventures to not just get free Internet Access, and yet to view classified informative content. The vast majority of the present results for identify Evil Access Points are not automated and subject to a particular wireless technology. Undetected Evil Twin Access Point is one of the genuine dangers in wireless local area network since utilizing it; attacker can start MITM and Evil Twin attack on the users. In this paper, we have presented a new approach for detection of Evil Twin attack in WLAN. An Evil Twin is essentially a rogue Wi-Fi Access Point that looks like authorized AP.