Fake Access Point Detection and Prevention Techniques

Download Now
Provided by: Creative Commons
Topic: Mobility
Format: PDF
There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks are possible. The man-in-middle, session hijacking is the most common active attack today life. The session hijacking attack can be generally performed with the help of honey pot. The honey pot is just an access point without any security. In the authors' work, fake access point is the honey. In the session hijacking attack they attract legitimate user to connect with the unencrypted access point. When the legitimate user connects with the access point, they hack the cookies, sessions of the legitimate user.
Download Now

Find By Topic