Page 69 - 2022
P. 69

additional  parameter  for  RAP  detection.  This  thesis's  primary  contributions  are  the
          definition  and  classification  of  Rogue  AP,  the  generation  of  a  real-time  dataset  of  a
          network infiltrated by a Rogue AP, the Machine Learning-based approaches for detecting
          and covert network-based suppression of Rogue APs. For Rogue AP identification based
          on ML, the RTT attribute is typically used with the k-NN technique. I dealt with the most
          well-liked  approaches,  applied  them  to  real-time  data  settings,  and  generated  the
          outcome in the shortest possible time with the highest possible accuracy by scanning
          networks  for  certain  identifiers  (such  as  SSIDs,  BSSIDs  and  Channels).  This
          counterattack method is called "Wi-Fi deauthentication."

          Key  words:  Rogue  Access    Point,  WLAN,  SSID,  BSSID,  Rogue  AP  Detection,  Rogue  AP
          Suppression,  Wi-Fi deauthentication, WLAN Security



















































                                                                                             38
   64   65   66   67   68   69   70   71   72   73   74