Abstract
This paper focuses on rogue access points (rogue APs) and how they can impact the security and stability of a network, and consequently, the safety and privacy of the users. Wireless access points (WAPs) are nodes that allow a user to connect to a local network. This includes devices such as the routers typically used in a home network. This paper examines how an unauthorized WAP may pose a threat to a network in both a public environment and an enterprise environment. Furthermore, it shows how a hacker can mimic a real wireless network and gain access to both user information as well as the information of a company through what is known as an evil twin attack. The findings show how such a straightforward attack can cause distress to both a user and a company.
Faculty Advisor/Mentor
Teresa Duvall
Document Type
Paper
Disciplines
Cybersecurity
DOI
10.25776/h2c7-3166
Upload File
wf_yes
Included in
Rogue Access Points and Their Impact on Networks
This paper focuses on rogue access points (rogue APs) and how they can impact the security and stability of a network, and consequently, the safety and privacy of the users. Wireless access points (WAPs) are nodes that allow a user to connect to a local network. This includes devices such as the routers typically used in a home network. This paper examines how an unauthorized WAP may pose a threat to a network in both a public environment and an enterprise environment. Furthermore, it shows how a hacker can mimic a real wireless network and gain access to both user information as well as the information of a company through what is known as an evil twin attack. The findings show how such a straightforward attack can cause distress to both a user and a company.