Fake Access Point Detection and Prevention Techniques
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2013, Vol 3, Issue 3
Abstract
There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks are possible. The man-in-middle, session hijacking is the most common active attack today life. The session hijacking attack can be generally performed with the help of honey pot. The honey pot is just an access point without any security. In our work, fake access point is the honey. In the session hijacking attack we attract legitimate user to connect with the unencrypted access point.When the legitimate user connect with the access point, we hack the cookies, sessions of the legitimate user. In this paper, different techniques are purposed that helpful in detecting the fake access point. Most of the techniques are based on beacon frames for detection of fake access point. This paper shows how the fake access point takes place and work in real life and how the session is hijack. The fake access point creation and hijacking of session is done with the help of backtrack 5 and to detect and prevent different techniques are used.
Authors and Affiliations
Hemashu Kamboj, Gurpreet Singh
Malware Propagation Detection in Mobile Cloud Infrastructure with Architectural Change
Now a day’s a lot mobile services are converting to cloud depended mobile services with highly communications and higher flexibility. We explore a unique mobile cloud infrastructure that attaches mobiles and cloud servic...
Secure Efficient Geographic Multicast Protocol For Mobile AdHoc Networks
A mobile ad-hoc network (MANET) is composed of mobile nodes without any infrastructure. So that Ad hoc networks are mainly used in emergency situations where no infrastructure is available, for e.g. military battle...
Software Code Clone Detection Using AST
The research which exists suggests that a considerable portion (10-15%) of the source code of large-scale computer programs is duplicate code. Detection and removal of such clones promises decreased software maintenance...
A Study on Steganography to Hide Secret Message inside an Image
Steganography hides the very existence of a message so that if successful it generally attracts no suspicion at all. There are many techniques to perform Steganography on electronic media, most notably audio and im...
Comparative Analysis Of Leach And Its Descendant Protocols In Wireless Sensor Network
Wireless sensor networks are composed of low cost and extremely power constrained sensor nodes. In many applications of wireless sensor networks, a sensor node senses the environment to get data and delivers them t...