Abstract

AbstractNumerous types of threats could become vulnerable to Wi-Fi networks. In terms of preventing and reducing their effect on the networks, it has become an imperative activity of any user to understand the threats. Even after thoroughly encrypting them, the route between the attacker’s device and the victim’s device may even be vulnerable to security attacks on Wi-Fi networks. It has also been noted that there are current shortcomings on Wi-Fi security protocols and hardware modules that are available in the market. Any device connected to the network could be a possible primary interface for attackers. Wi-Fi networks that are available in the transmission range are vulnerable to threats. For instance, if an Access Point (AP) has no encrypted traffic while it is attached to a Wi-Fi network, an intruder may run a background check to launch the attack. And then, attackers could launch more possible attacks in the targeted network, in which the Evil Twin attack have become the most prominent. This Evil Twin attack in a Wi-Fi network is a unique outbreak mostly used by attackers to make intrusion or to establish an infection where the users are exploited to connect with a victim’s network through a nearby access point. So, there are more chance to get user’s credentials by the perpetrators. An intruder wisely introduces a fake access point that is equivalent to something looks like an original access point near the network premises in this case. So, an attacker is capable of compromising the network when a user unconsciously enters by using this fake access point. Attackers could also intercept the traffic and even the login credentials used after breaching insecure networks. This could enable monitoring the users and perhaps even manipulating the behavior patterns of an authorized network user smoother for attackers. The key consideration of this research paper is the identification and avoidance of the Evil Twin attack over any Wi-Fi networks. It is named as DPETAs to address the strategies that intruders use to extract identities and what users need to do to keep them out of the networks.KeywordsManagement framesFake access points802.11 standardsWi-Fi attacksMan in the middle (MITM) attackEvil twin AP attacks

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.