2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT) 2020
DOI: 10.1109/icumt51630.2020.9222455
|View full text |Cite
|
Sign up to set email alerts
|

Detection of wireless fake access points

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 18 publications
0
6
0
Order By: Relevance
“…Many studies have been published to address the problem of detecting phishing or WI Phishing attacks over the network, such as -Detecting fake access point or Evil Twin‖ as a relevant approach presented in [16] by Lovinger et al , it depends on the network probing using Raspberry Pi 4. Capability, the author creates a logging system.…”
Section: B Detecting Evil Twin Solutionsmentioning
confidence: 99%
See 3 more Smart Citations
“…Many studies have been published to address the problem of detecting phishing or WI Phishing attacks over the network, such as -Detecting fake access point or Evil Twin‖ as a relevant approach presented in [16] by Lovinger et al , it depends on the network probing using Raspberry Pi 4. Capability, the author creates a logging system.…”
Section: B Detecting Evil Twin Solutionsmentioning
confidence: 99%
“…The first part evaluates the performance of the proposed detector for classifying the types of attacks on detecting (1) KARMA attack (2) DE authentication attack [9] (3) WI-phishing [2] or Evil Twin, (4) advanced WI-phishing, (5) and differentiating them from the normal packets in real time, furthermore to database all beacon frame for visualization, forensics, and further anomaly inspection. The second part compares the results against the method in [16] proposed by Lovinger et al , Zeeshan Afzal et al in [47] and Mayank Agarwal et al in [1].…”
Section: Efficiency Of Proposed Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…This attack may help to DoS attack by sending de-authentication frames to other parties in the system. Evil Twin attack is a type of MitM attack, which is referred as Fake Access Point [88]. In this attack, the attacker's goal is to catch the connection between the device and the modem [89,90].…”
mentioning
confidence: 99%