Professional Documents
Culture Documents
ISSN 2278-6856
Abstract
On the basis of Gartner research, now a day 20% of IEEE
802.11 WLAN worldwide is vulnerable due to deployment of
Rogue Access Points. This paper identifies and summarizes all
threats due to deployment of Rogue Access Points and their
possible solutions to detect and prevent them in IEEE 802.11
Wireless Network.
1. INTRODUCTION
IEEE 802.11 WLAN specifically named as infrastructure
network bridges a wireless network to a wired network
through Wireless Access Points (WAPs). Therefore it is
necessary to configure the Access Point and all local
wireless clients in order to use the same network.
Unfortunately, due to low cost and plug and play facility,
employee brings in an unsecured access point, plugs it in
to an available wired port and now has wireless access to
the larger wired network. Due to this, attacker can gain
access to sensitive information of an organization. It gives
an attacker a cutting edge over the established security
policies. Also it is not only an AP which is being targeted,
but also acting as normal users having an open access of
wireless network. Due to open wireless network, an
attacker can attack on the whole open wireless network
infrastructure including the clients who are getting
connected to the wireless access point. Attacker can apply
Different methodologies by taking advantage of the
security flaws in the implementation of the IEEE
802.11WLAN. These threats becomes more complicated
as more and more innovative technologies become
available enabling further network attack vectors. So
network administrators must maintain security against old
and emerging threats that depends largely on the
deployment of firewalls, intrusion detection systems and
other network defense tools. Also detecting rogue APs is
one of the most important tasks for a network manager.
This paper discusses all threats and security issues due to
deployment of Rogue Access Points (RAP) in IEEE
802.11 WLAN and also describes all possible solutions for
detecting this Rogue Access Point (RAP). The last section
gives the conclusion of the whole paper.
ISSN 2278-6856
ISSN 2278-6856
5. Conclusion
In this paper, we surveyed various types of attacks as well
as solutions against Deployment of Rogue Access Points
in IEEE 802.11 Wireless LAN. Due to continuous growth
in wireless communication in IEEE 802.11 WLAN, there
is a great scope in finding the solutions against the threats
due to deployment of RAPs in IEEE 802.11 WLAN
ISSN 2278-6856
AUTHOR
Mr. Ganesh B. Bandal. Research
Scholar, G.H. Raisoni College of
Engg. & Management, wagholi, pune.
References
[1] Sandip Patil, A Survey on Malicious Access Point
Detection Methods for Wireless LAN, International
Journal of Computer Sciences and Engineering,
Volume-2 Issue-3, E-ISSN: 2347-2693, pp. 22-25,
March 2014.
[2] Guangzhi Qu, RAPiD:An Indirect Rogue Access
Points
Detection
System
978-1-4244-93289/10/$26.00 2010 IEEE
[3] Ibrahim Halil Saruhan Detecting and Preventing
Rogue Devices on the Network, Sans Institute
[4] Prof. Pranit S. Thakur, Review on RAP: Protecting
Wi-Fi Networks from Rogue Access Points, 1st
International Conference on Recent Trends in
Engineering & Technology, ISSN:2277-9477, Mar2012
[5] Prof. S. B. Vanjale, International Journal of
Engineering Science & Technology Vol-4,No-2,Feb2012, ISSN:0975-5462
[6] Wen Chuan Hsieh, Chi Chun Lo, Jing Chi Lee, The
Implementation of a Proactive Wireless Intrusion
Detection System, IEEE 2004
[7] Kaixing Wu, Wei Zhang and Wenzeng Zhu, A
Study on the Application of Intrusion Detection
Technology to WLAN 978-1-61284-486-2/11/$26.00
2011 IEEE
[8] Motorola, Tired of Rogues? Solutions for detecting
and eliminating Rogue Wireless Networks White
Paper,October 2011
[9] Brad Antoniewicz, 802.11 Attacks White Paper
[10] Aruba Networks, Building global security policy for
Wireless LANs White Paper
[11] Kangsuk Chae, Jiawei Shao, Souhwan Jung, A
Scheme of Detection and Prevention Rogue AP using
Comparison Security Condition of AP International
Conference on Advances in Computer Science and
Electronics Engineering, ISBN: 978-981-07-14031_647, 2012
Page 268