CFP last date
20 January 2025
Reseach Article

Using Multi-agent Sourcing Method for Detection and Elimination of Rogue Access Points in WLAN-802.11

by Dnyanada S. Patil, P. N. Mahalle
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 67 - Number 25
Year of Publication: 2013
Authors: Dnyanada S. Patil, P. N. Mahalle
10.5120/11746-7381

Dnyanada S. Patil, P. N. Mahalle . Using Multi-agent Sourcing Method for Detection and Elimination of Rogue Access Points in WLAN-802.11. International Journal of Computer Applications. 67, 25 ( April 2013), 31-34. DOI=10.5120/11746-7381

@article{ 10.5120/11746-7381,
author = { Dnyanada S. Patil, P. N. Mahalle },
title = { Using Multi-agent Sourcing Method for Detection and Elimination of Rogue Access Points in WLAN-802.11 },
journal = { International Journal of Computer Applications },
issue_date = { April 2013 },
volume = { 67 },
number = { 25 },
month = { April },
year = { 2013 },
issn = { 0975-8887 },
pages = { 31-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume67/number25/11746-7381/ },
doi = { 10.5120/11746-7381 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:26:26.942087+05:30
%A Dnyanada S. Patil
%A P. N. Mahalle
%T Using Multi-agent Sourcing Method for Detection and Elimination of Rogue Access Points in WLAN-802.11
%J International Journal of Computer Applications
%@ 0975-8887
%V 67
%N 25
%P 31-34
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Due to the popularity of WLAN's there is tremendous rise in number of wireless attacks on Wireless LANs. Since, Security is a primary concern of any organizational network all threats to security of network must be eliminated properly before they cause harm to company network . One of such security threat is presence of rogue access point in the network. If these rogue access points are not handled properly in time may cause a serious loss to company network. Hence, there is need to detect and eliminate such rogue access points in the WLANs. Proposed system provides a cost effective solution for detection and elimination of rogue access points in network. The system has such eminent properties that assure complete elimination of rogue access point & it does not require any specialized hardware or software for its use . Also does an automatic scan without human intervention saving user's time.

References
  1. V. S. Shankar Sriram, G. Sahoo, Ashish P. Singh, Abhishek Kumar Maurya "Securing IEEE 802. 11 Wireless LANs - A Mobile Agent Based Architecture" 2009 IEEE International Advance Computing Conference
  2. Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng "A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks" published in the IEEE INFOCOM 2008 distributed system" CSCIT,Nanded on 09 Jan 2010.
  3. Mohan K Chirumamilla, Byrav Ramamurthy "Agent Based Intrusion Detection and Response System for Wireless LANs" 0-7803-7802- 4/03/$17. 00 © 2003 IEEE
  4. Mrs. Fatima D. Mulla, Mr. Sandeep Vanjale, Prof. Dr. P. B. Mane " PROVIDING DATA SECURITY FOR WI-FI NETWORK USING MOBILE AGENT IN DISTRIBUTED SYSTEM " International Journal of Advanced Engineering Technology E-ISSN0976-3945 IJAET/Vol. III/ Issue II/April-June, 2012/127-130 Research Article
  5. Prof. Suryawanshi Govind R,Prof. S. B. Vanjale "Architecture of mobile agent for Distributed rogue access point detection in distributed system" CSCIT,Nanded on 09 Jan 2010.
  6. Lanier Watkins, Raheem Beyah, Cherita Corbett "A Passive Approach to Rogue Access Point Detection" 1930-529X/07/$25. 00 © 2007 IEEE
  7. Songrit Srilasak,, Kitti Wongthavarawat and Anan Phonphoem, Intelligent Wireless Network Group (IWING) "Integrated Wireless Rogue Access Point Detection and Counterattack System" published in 2008 International Conference on Information Security and Assurance.
  8. V. S. Shankar Sriram, G. Sahoo "A Mobile Agent Based Architecture for Securing WLANs" International Journal of Recent Trends in Engineering, Vol 1, No. 1, May 2009
  9. MS. SnehalBehede,S. B. Vanjale,P. B. Mane"Provoding data security in WLAN by detecting unauthorized access points and attacks"Intenational Journal Of Engineering Science And Technology.
  10. NetStumbler- http://www. netstumbler. com
  11. AirMagnet-http://www. airmagnet. com
  12. http://www. softpedia. com/get/NetworkTools/Network- Monitoring/NetStumbler. shtml
  13. www. ias. ac. in/resonance/July2002/pdf/July2002p35 43. pdf
  14. http://www. engeniustech. com. au/EnGeniusV2/knowlage. php?itemAppId=28
Index Terms

Computer Science
Information Sciences

Keywords

Multi-agent Clone Agent Master Agent