Page 69 - 2022
P. 69
additional parameter for RAP detection. This thesis's primary contributions are the
definition and classification of Rogue AP, the generation of a real-time dataset of a
network infiltrated by a Rogue AP, the Machine Learning-based approaches for detecting
and covert network-based suppression of Rogue APs. For Rogue AP identification based
on ML, the RTT attribute is typically used with the k-NN technique. I dealt with the most
well-liked approaches, applied them to real-time data settings, and generated the
outcome in the shortest possible time with the highest possible accuracy by scanning
networks for certain identifiers (such as SSIDs, BSSIDs and Channels). This
counterattack method is called "Wi-Fi deauthentication."
Key words: Rogue Access Point, WLAN, SSID, BSSID, Rogue AP Detection, Rogue AP
Suppression, Wi-Fi deauthentication, WLAN Security
38