Detecting And Eliminating Rogue Access Points In Ieee-802.11 Wlan - A Multi-Agent Sourcing Methodology
Keywords:
Wireless LAN, Rogue Access point, Mobile agent, wireless network security, fake access point, time stamp.Abstract
For the Wireless Networks, presence of unapproved access points is becoming the major security issue. If this kind of network threats are not detected and mitigated on time, those will lead to the serious network damage and data loss. There are many researchers proposed solutions to overcome this security problem of WLAN, but those proposed tools having limitations or maybe they not automated to adopt the frequent changes in WLAN. We are into this research to present the new approach based on Master and Slave agents. This proposed approach not only looking for fast detection of Rogue Access points in the network but also presenting the solution to mitigate the WLAN from them. In short new framework is dealing with detecting as well as eliminating the Rough Access Points in the network. In proposed approach, the Master and slave agents are automatically scanning the networks for any unauthorized access points using the skew intervals. This
References
V. S. Shankar Sriram, G. Sahoo, Ashish P. Singh, Abhishek Kumar Maurya
V. S. Shankar Sriram, G. Sahoo
Mohan K Chirumamilla, Byrav Ramamurthy
Songrit Srilasak, Kitti Wongthavarawat and Anan Phonphoem, Intelligent Wireless Network Group (IWING)
Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng
Lanier Watkins, Raheem Beyah, Cherita Corbett
Songrit Srilasak, Kitti Wongthavarawat, Anan Phonphoem
Manage Engine White Paper: Wireless Network Rogue Access Point Detection & Blocking
NetStumbler, http://www.netstumbler.com.
Sachin Shetty, Min Song, Liran Ma
Raheem Beyah, Shantanu Kangude, George Yu, Brian Strickland, and John Copeland
Mohan K Chirumamilla, Byrav Ramamurthy
White Paper: Access Point Detection via Crowd sourcing.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2011 International Journal of Sciences: Basic and Applied Research (IJSBAR)
![Creative Commons License](http://i.creativecommons.org/l/by-nc-nd/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who submit papers with this journal agree to the following terms.