Detecting And Eliminating Rogue Access Points In Ieee-802.11 Wlan - A Multi-Agent Sourcing Methodology

Authors

  • Priyanka G. Sasane

Keywords:

Wireless LAN, Rogue Access point, Mobile agent, wireless network security, fake access point, time stamp.

Abstract

For the Wireless Networks, presence of unapproved access points is becoming the major security issue. If this kind of network threats are not detected and mitigated on time, those will lead to the serious network damage and data loss. There are many researchers proposed solutions to overcome this security problem of WLAN, but those proposed tools having limitations or maybe they not automated to adopt the frequent changes in WLAN. We are into this research to present the new approach based on Master and Slave agents. This proposed approach not only looking for fast detection of Rogue Access points in the network but also presenting the solution to mitigate the WLAN from them. In short new framework is dealing with detecting as well as eliminating the Rough Access Points in the network. In proposed approach, the Master and slave agents are automatically scanning the networks for any unauthorized access points using the skew intervals. This

References

V. S. Shankar Sriram, G. Sahoo, Ashish P. Singh, Abhishek Kumar Maurya

V. S. Shankar Sriram, G. Sahoo

Mohan K Chirumamilla, Byrav Ramamurthy

Songrit Srilasak, Kitti Wongthavarawat and Anan Phonphoem, Intelligent Wireless Network Group (IWING)

Liran Ma, Amin Y. Teymorian, Xiuzhen Cheng

Lanier Watkins, Raheem Beyah, Cherita Corbett

Songrit Srilasak, Kitti Wongthavarawat, Anan Phonphoem

Manage Engine White Paper: Wireless Network Rogue Access Point Detection & Blocking

NetStumbler, http://www.netstumbler.com.

Sachin Shetty, Min Song, Liran Ma

Raheem Beyah, Shantanu Kangude, George Yu, Brian Strickland, and John Copeland

Mohan K Chirumamilla, Byrav Ramamurthy

White Paper: Access Point Detection via Crowd sourcing.

Downloads

Published

2011-05-14

How to Cite

Sasane, P. G. (2011). Detecting And Eliminating Rogue Access Points In Ieee-802.11 Wlan - A Multi-Agent Sourcing Methodology. International Journal of Sciences: Basic and Applied Research (IJSBAR), 3(1), 9–15. Retrieved from https://gssrr.org/index.php/JournalOfBasicAndApplied/article/view/944

Issue

Section

Articles