CFP last date
20 December 2024
Reseach Article

Rogue Access Point Detection in WLAN by Analyzing Network Traffic and Behavior

by Shital V Jagtap, K N Honwadkar
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 22
Year of Publication: 2010
Authors: Shital V Jagtap, K N Honwadkar
10.5120/522-682

Shital V Jagtap, K N Honwadkar . Rogue Access Point Detection in WLAN by Analyzing Network Traffic and Behavior. International Journal of Computer Applications. 1, 22 ( February 2010), 25-27. DOI=10.5120/522-682

@article{ 10.5120/522-682,
author = { Shital V Jagtap, K N Honwadkar },
title = { Rogue Access Point Detection in WLAN by Analyzing Network Traffic and Behavior },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 22 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 25-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number22/522-682/ },
doi = { 10.5120/522-682 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:47:45.920489+05:30
%A Shital V Jagtap
%A K N Honwadkar
%T Rogue Access Point Detection in WLAN by Analyzing Network Traffic and Behavior
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 22
%P 25-27
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the most challenging network security concerns for network administrators is the presence of rogue access points. Rogue access points, if undetected, can be an open door to sensitive information on the network. Many data raiders have taken advantage of the undetected rogue access points to view confidential information. In this paper, we present a rogue access point detection approach. In this approach we are extending the functionality of basic analyzer. It will deeply analyse different properties of WLAN. If required it will calculate statistics and store it in databse. We can use this result to compare next data. Besides analyzing wireless data, some filters are implemented that can be used to identify rogue APs in WLAN. Actually people thinks that analyzer is just common approach but we can use this tool in WLAN in very efficient way ie to reduce time and cost. This topic comes under wireless security

References
  1. Mike Emery, Mieso K. Denko- "IEEE 802.11 WLAN based Real-time Location Tracking in Indoor and Outdoor Environments", 2007 IEEE
  2. Raheem Beyah, Shantanu Kangude, George Yu, Brian Strickland, and John Copeland, "Rogue Access Point Detection using Temporal Traffic Characteristics," in Proc. of IEEE GLOBECOM, Dec. 2004.
  3. Sachin Shetty, Min Song, Liran Ma, "Rogue Access Point Detection by Analyzing Network Traffic Characteristics" IEEE 2007
  4. http://www.practicallynetworked.com/ support/ 030306wirelesssecurity.htm
Index Terms

Computer Science
Information Sciences

Keywords

Rogue access point analyzer traffic statistics