CFP last date
20 January 2025
Reseach Article

Fake Access Point and Invalid Client Detection and Elimination using Agent Multi Sourcing

Published on May 2016 by Prachi M. Kharat, N.d. Kale
National Conference on Advancements in Computer & Information Technology
Foundation of Computer Science USA
NCACIT2016 - Number 2
May 2016
Authors: Prachi M. Kharat, N.d. Kale
8cb33177-ace3-4e6d-80af-00be0fd56077

Prachi M. Kharat, N.d. Kale . Fake Access Point and Invalid Client Detection and Elimination using Agent Multi Sourcing. National Conference on Advancements in Computer & Information Technology. NCACIT2016, 2 (May 2016), 1-5.

@article{
author = { Prachi M. Kharat, N.d. Kale },
title = { Fake Access Point and Invalid Client Detection and Elimination using Agent Multi Sourcing },
journal = { National Conference on Advancements in Computer & Information Technology },
issue_date = { May 2016 },
volume = { NCACIT2016 },
number = { 2 },
month = { May },
year = { 2016 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /proceedings/ncacit2016/number2/24702-3036/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Advancements in Computer & Information Technology
%A Prachi M. Kharat
%A N.d. Kale
%T Fake Access Point and Invalid Client Detection and Elimination using Agent Multi Sourcing
%J National Conference on Advancements in Computer & Information Technology
%@ 0975-8887
%V NCACIT2016
%N 2
%P 1-5
%D 2016
%I International Journal of Computer Applications
Abstract

In presently a day's remote (wireless) LAN is broadly utilized as a part of many public open spaces. Wireless access points expand wired network. It gives more flexibility to the clients. One of the fundamental concerns is that of Rogue Access Points (RAP). These security threads which bring about extreme damage to hierarchical information and assets could be because of inside or outer cause. Access point could be one reason which might permit attackers to break the security of authoritative system and permit them to get to sensitive data from system. The access points deployed without clear and definite permission from network administrator are called unauthorized, fake or rogue access point. There are numerous chances of presences of RAP in LAN data. Rogue Access Points (RAPs) is one of the foremost security threats in current network scenario, if not properly handled in time could lead from slight network faults to serious network failure. Most of the current solutions to detect rogue access points are not automatic and are dependent on a specific wireless technology. In this paper, we propose a Multi-Agent Based Methodology, which not only identifies Rogue Access Point but also completely eliminates it. This Methodology has the following exceptional properties: (1) it doesn't require any specialized hardware; (2) the proposed algorithm detects and totally removes the RAPs from network; (3) it provides a cost-effective solution. The proposed technique can block RAPs as well as eliminate them from the networks both in form of Unauthorized APs or as a Rogue Clients Acting as APs.

References
  1. Prof. Sandeep Vanjale, Dr. P. B. Mane, "A Novel approach for Elimination of Rogue Access Point in Wireless Network",IEEE,2014.
  2. Hao Han, Fengyuan Xu, Chiu C. Tan,Yifan Zhang, and Qun Li, "VR-Defender: Self-Defense Against Vehicular Rogue APs for Drive-Thru Internet", IEEE trans. , Vol. 63, No. 8,October 2014.
  3. Liran Ma,AminY. Teymorian, Xiuzhen Cheng "A Hybrid Rogue Access Point Protection Framework for Commodity Wi-Fi Networks"publishedin the IEEE INFOCOM 2008
  4. M. K. Nivangune, Prof. S. B. Vanjale, Dr. P. B. Mane,"Detecting Unauthorized Access Point in WLAN by using CTT", IJARCSSE, vol 5, Issue 7, July 2015.
  5. Mrs. Fatima D. Mulla, Mr. Sandeep Vanjale, Prof. Dr. P. B. Mane " PROVIDING DATA SECURITY FOR WI-FI NETWORK USING MOBILE AGENT IN DISTRIBUTED SYSTEM" International Journalof Advanced Engineering Technology E-ISSN 0976-3945 IJAET/Vol. III/ Issue II/April-June, 2012/127-130 Research Article.
  6. Prof. Suryawanshi Govind R,Prof. S. B. Vanjale "Architecture of mobile agent for Distributed rogue access point detection in distributed system" CSCIT,Nanded on09Jan2010.
  7. MohanK Chirumamilla,Byrav Ramamurthy"Agent Based Intrusion Detection and Response System for Wireless LANs"CSE
  8. Lanier Watkins, Raheem Beyah, Cherita Corbett "A Passive Approach to Rogue Access Point Detection"1930-529X/07/$25. 00 © 2007 IEEE
  9. Songrit Srilasak,, Kitti Wongthavarawat and Anan Phonphoem, Intelligent Wireless Network Group(IWING) "Integrated Wireless Rogue Access Point Detection and Counterattack System"publishedin2008 International Conference on Information Security andAssurance.
  10. V. S. Shankar Sriram,G. Sahoo "A Mobile Agent Based Architecture for Securing WLANs" International Journal of RecentTrendsinEngineering, Vol 1, No. 1, May2009
  11. MS. Snehal Behede,S. B. Vanjale,P. B. Mane"Provoding data security in WLAN by detecting unauthorized access points and attacks"Intenational JournalOf Engineering Science And Technology.
  12. NetStumbler- http://www. netstumbler. com
  13. AirMagnet-http://www. airmagnet. com
  14. http://www. softpedia. com/get/Network-Tools/Network-Monitoring/NetStumbler. shtml
  15. http://www. leger. ca/pages/CHAMPLAIN/WLAN-tools. htm
  16. www. ias. ac. in/resonance/July2002/pdf/July2002p35-43. pdf
  17. http://www. kismetwireless. net
Index Terms

Computer Science
Information Sciences

Keywords

Rogue Access Point Wlan