Abstract

This paper focuses on rogue access points (rogue APs) and how they can impact the security and stability of a network, and consequently, the safety and privacy of the users. Wireless access points (WAPs) are nodes that allow a user to connect to a local network. This includes devices such as the routers typically used in a home network. This paper examines how an unauthorized WAP may pose a threat to a network in both a public environment and an enterprise environment. Furthermore, it shows how a hacker can mimic a real wireless network and gain access to both user information as well as the information of a company through what is known as an evil twin attack. The findings show how such a straightforward attack can cause distress to both a user and a company.

Faculty Advisor/Mentor

Teresa Duvall

Document Type

Paper

Disciplines

Cybersecurity

DOI

10.25776/h2c7-3166

Upload File

wf_yes

Included in

Cybersecurity Commons

Share

COinS
 

Rogue Access Points and Their Impact on Networks

This paper focuses on rogue access points (rogue APs) and how they can impact the security and stability of a network, and consequently, the safety and privacy of the users. Wireless access points (WAPs) are nodes that allow a user to connect to a local network. This includes devices such as the routers typically used in a home network. This paper examines how an unauthorized WAP may pose a threat to a network in both a public environment and an enterprise environment. Furthermore, it shows how a hacker can mimic a real wireless network and gain access to both user information as well as the information of a company through what is known as an evil twin attack. The findings show how such a straightforward attack can cause distress to both a user and a company.