Page 68 - 2022
P. 68

Ph.D.
                                                                                  (Computer Applications)
          AN EXPERIMENTAL STUDY AND NOVEL APPROACH FOR
          DETECTION AND SUPPRESSION OF ROGUE ACCESS POINT IN WLAN

          Ph.D. Scholar : Patel Kashyapkumar Chaitanyakumar
          Research Supervisor :  Dr. Ajaykumar M. Patel



                                                                                Regi. No.: 17276211006
          Abstract :
          Research  into  wireless  network  communication  is  vast,  and  many  wireless  security
          companies and organisations have failed to achieve wireless airspace accuracy because
          of its narrow, limited, and restricted capacity to network teams. Information transmitted
          through a wireless network uses radio frequency. Antennas, routers, access points, Wi-Fi
          cards, and more must all be 802.11 compliant to make up a WLAN. Data transmission,
          encoding, and decoding are all taken care of by 802.11-compliant WLAN parts. Annual
          pen-testing for acceptability, especially for public Wi-Fi, will become unnecessary as the
          number  of  wireless  attacks  rises.  Any  computer  or  laptop  with  an  integrated  Wi-Fi
          network adapter and access to the internet is vulnerable to hackers while using a public
          Wi-Fi network. Infections spread rapidly through public WLANs. This study compares and
          contrasts  the  key  characteristics  and  terminology  of  a  rogue  access  point  (a  WLAN
          threat)  with  those  of  an  Access  Point,  the  dangers  of  a  rogue  AP  for  public  Wi-Fi,  the
          relationship between rogue APs and attacks, and the various ways in which a rogue AP
          could carry out malicious actions or launch attacks against a next-generation wireless
          network.  The  conventional  approach  centres  on  comparing  several  parameters  taken
          from  beacon  frames.  The  MAC  address  and  SSID  of  the  access  point  are  examined,
          among other things. A server-based technique involves installing RAP detection software
          on  a  centralised  server,  which  then  performs  an  operation  over  the  entire  network  in
          search of RAP. By contrast, a client-based approach relies on the device itself to monitor
          the  network  and  verify  the  authenticity  of  an  access  point  (AP)  before  establishing  a
          connection with it. To name just a few, recent studies make use of clock skew, wireless
          traffic  monitoring,  encryption,  authorization,  a  timing-based  technique,  RSS  analysis,
          bottleneck  bandwidth  analysis,  and  sequential  hypothesis  testing.  Some  issues  with
          current  methods  include:  reliance  on  a  faulty  clock  skew  solution  assumption;
          inconsistent inter-packet arrival times; inability to install mobile agent code on all nodes;
          spoofable  MAC  and  SSID  addresses;  varying  received  signal  strengths;  and  inability  to
          function if a central server goes down. Due to these constraints, we have developed a
          multi-parameter based method for RAP identification in WLAN. One way to reliably detect
          RAP  is  to  take  into  account  multiple  indicators  simultaneously.  The  implemented
          solution's  most  novel  aspect  is  its  reliance  on  sequence  count  and  timestamp  as  an

                                                                                             37
   63   64   65   66   67   68   69   70   71   72   73