Research Article | Open Access | Download PDF
Volume 3 | Issue 2 | Year 2013 | Article Id. IJPTT-V3I3P407 | DOI : https://doi.org/10.14445/22492615/IJPTT-V3I3P407Fake Access Point Detection and Prevention Techniques
Hemashu Kamboj, Gurpreet Singh
Citation :
Hemashu Kamboj, Gurpreet Singh, "Fake Access Point Detection and Prevention Techniques," International Journal of P2P Network Trends and Technology (IJPTT), vol. 3, no. 2, pp. 34-36, 2013. Crossref, https://doi.org/10.14445/22492615/IJPTT-V3I3P407
Abstract
There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks are possible. The man-in-middle, session hijacking is the most common active attack today life. The session hijacking attack can be generally performed with the help of honey pot. The honey pot is just an access point without any security. In our work, fake access point is the honey. In the session hijacking attack we attract legitimate user to connect with the unencrypted access point.When the legitimate user connect with the access point, we hack the cookies, sessions of the legitimate user. In this paper, different techniques are purposed that helpful in detecting the fake access point. Most of the techniques are based on beacon frames for detection of fake access point. This paper shows how the fake access point takes place and work in real life and how the session is hijack. The fake access point creation and hijacking of session is done with the help of backtrack 5 and to detect and prevent different techniques are used.
Keywords
Fake Access Point, Beacon Frames, Cookies, Honey Pot, Session, Hijacking.
References
[1] “Fast and accurate detection of fake points using non-crypto
method in WLAN (2012)”International Journal of
Communications and Engineering Volume 05– No.5, Issue: 03
March 2012.
[2] “A Comparative Study of Security Level of Hotmail, Gmail and Yahoo Mail by Using Session Hijacking Hacking Test (2008) “IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.5, May 2008.
[3] “Online Detection of Fake Access Points using Received Signal Strengths” Taebeom Kim, Haemin Park, Hyunchul Jung, and Heejo Lee Div. of Computer and Communication Engineering Korea University Seoul, Korea.
[4] Session Shield: Lightweight Protection against Session Hijacking Nick Nikiforakis, Wannes Meert, Yves Younan, Martin Johns, and WouterJoosen.
[5] C. Siva Ram Murthy , B. S. Manoj,2007” Ad Hoc Wireless Networks, Architectures and Protocols”
[2] “A Comparative Study of Security Level of Hotmail, Gmail and Yahoo Mail by Using Session Hijacking Hacking Test (2008) “IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.5, May 2008.
[3] “Online Detection of Fake Access Points using Received Signal Strengths” Taebeom Kim, Haemin Park, Hyunchul Jung, and Heejo Lee Div. of Computer and Communication Engineering Korea University Seoul, Korea.
[4] Session Shield: Lightweight Protection against Session Hijacking Nick Nikiforakis, Wannes Meert, Yves Younan, Martin Johns, and WouterJoosen.
[5] C. Siva Ram Murthy , B. S. Manoj,2007” Ad Hoc Wireless Networks, Architectures and Protocols”