Fake Access Point Detection and Prevention Techniques

  IJPTT-book-cover
 
International Journal of P2P Network Trends and Technology (IJPTT)          
 
© 2013 by IJPTT Journal
Volume-3 Issue-2                           
Year of Publication : 2013
Authors : Hemashu Kamboj, Gurpreet Singh

Citation

Hemashu Kamboj, Gurpreet Singh."Fake Access Point Detection and Prevention Techniques". International Journal of P2P Network Trends and Technology (IJPTT), V3(2):34 - 36  Mar - Apr 2013, ISSN:2249-2615, www.ijpttjournal.org. Published by Seventh Sense Research Group.

Abstract

     There are mainly two type of networks, wired and wireless. The wireless network is much vulnerable to security attacks as compared to wired network. In wireless networks there are both active and passive attacks are possible. The man-in-middle, session hijacking is the most common active attack today life. The session hijacking attack can be generally performed with the help of honey pot. The honey pot is just an access point without any security. In our work, fake access point is the honey. In the session hijacking attack we attract legitimate user to connect with the unencrypted access point.When the legitimate user connect with the access point, we hack the cookies, sessions of the legitimate user. In this paper, different techniques are purposed that helpful in detecting the fake access point. Most of the techniques are based on beacon frames for detection of fake access point. This paper shows how the fake access point takes place and work in real life and how the session is hijack. The fake access point creation and hijacking of session is done with the help of backtrack 5 and to detect and prevent different techniques are used.

References

[1] “A Comparative Study of Security Level of Hotmail, Gmail and Yahoo Mail by Using Session Hijacking Hacking Test (2008) “IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.5, May 2008.
[2] “Online Detection of Fake Access Points using Received Signal Strengths” Taebeom Kim, Haemin Park, Hyunchul Jung, and Heejo Lee Div. of Computer and Communication Engineering Korea University Seoul, Korea
[3] SessionShield: Lightweight Protection against Session Hijacking Nick Nikiforakis1 , Wannes Meert1 , Yves Younan1 , Martin Johns2 , and WouterJoosen.
[4] C. Siva Ram Murthy , B. S. Manoj,2007” Ad Hoc Wireless Networks, Architectures and Protocols”

Keywords

- Fake Access Point, Beacon Frames, Cookies ,Honey Pot, Session, Hijacking.