International Journal of Scientific Engineering and Research (IJSER)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed | ISSN: 2347-3878


Downloads: 1

India | Computer Engineering | Volume 4 Issue 4, April 2016 | Pages: 54 - 58


Survey on Evil Twin Attack

Priyanka Sharma, Puneet Kumar Kaushal, Parth Rai Sharma

Abstract: During this present epoch use of Wi-Fi is not as secure as other networks principally in Public places akin to shopping complex, multiplex, coffee-shops, and university and so forth. Where there is an open access for Wi-Fi connection. Users essentially get attract towards the signal which provide high range, which may be a fake connection setup by an attacker to stole the private information of user. The target of attacker is to steal the personal data of victim such as username, password, credit numbers etc. But he is not able to copy the details of hardware details of an access points such as models, manufacture etc. Attacker setup the evil twin attack by installing it into his system by making same SSID he establish a rogue AP and enforce the victim to connect, by this he is able to accomplish his objective, after completing his objective he shut off the fake connection within a small duration of time. In this review paper we are describing a variety of techniques to detect and prevent from an evil twin attack. Because of some limitations of these previous techniques we are revealing our future approach to detect from this attack.

Keywords: SSID, Evil Twin Attack, Wi-Fi, AP, Rogue.



Citation copied to Clipboard!

Rate this Article

5

Characters: 0

Received Comments

No approved comments available.

Rating submitted successfully!


Top