Detecting and Eliminating Rogue Access Points in IEEE-802.11 WLAN-Using Reserve Proxy Server Methodology

Rogue devices are an increasingly dangerous reality in the insider threat problem domain. Industry, government, and academia need to be aware of this problem and promote state-of-the-art detection methods. Rogue access points, if undetected, can be an open door to sensitive information on the network. Many data raiders have taken advantage of the undetected rogue access points in enterprises to not only get free Internet access, but also to view confidential information. Most of the current solutions to detect rouge access points are not automated and are dependent on a specific wireless technology.

Provided by: International Journal Of Current Research Topic: Networking Date Added: Apr 2014 Format: PDF

Find By Topic