A Novel Architecture to Mitigate Wireless LAN based Phishing Attack

被引:0
|
作者
Singh, Niraj Kumar [1 ]
Sridaran, R. [1 ]
机构
[1] Marwadi Univ, Rajkot, Gujarat, India
关键词
phishing attack; spoofing; sniffing; malicious network; wireless sensor networks; social engineering;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The evolvement of mobile electronic devices and gadgets has resulted in the demand for Wireless network. Creating fake authentication web-portal identical of targeted network and wireless network of the same SSID leads to spoofing of emails and passphrases causing loss of all private and confidential messages and data. The proposed paper aims at designing an automation device to detect the replicated network particularly of same SSID (Service set identifier) by analyzing all the properties including BSSID (Basic service set identifier), frequency and a channel, which can send email and message to the security incident response team and also sends the signal to jammer-a device to DE-authenticate and jam malicious network instantly as well as send an alert message to all the users to avoid such a wireless network to protect themselves from being hacked.
引用
收藏
页码:1212 / 1217
页数:6
相关论文
共 50 条
  • [1] A novel architecture to mitigate wireless LAN based phishing attack
    Singh, Niraj Kumar
    Sridaran, R.
    Proceedings of the 2019 6th International Conference on Computing for Sustainable Global Development, INDIACom 2019, 2019, : 1212 - 1217
  • [2] Wired LAN and Wireless LAN Attack Detection Using Signature Based and Machine Learning Tools
    Kaur, Jaspreet
    NETWORKING COMMUNICATION AND DATA KNOWLEDGE ENGINEERING, VOL 1, 2018, 3 : 15 - 24
  • [3] SWAN: A secure wireless LAN architecture
    Virendra, W
    Upadhyaya, S
    LCN 2004: 29TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON LOCAL COMPUTER NETWORKS, PROCEEDINGS, 2004, : 216 - 223
  • [4] An architecture for wireless LAN/WAN integration
    Helal, S
    Lee, CW
    Zhang, YG
    Richard, GG
    WCNC: 2000 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2000, : 1035 - 1041
  • [5] An Improved Method of Detecting Spoofed Attack in Wireless LAN
    Goel, Shikha
    Kumar, Sudesh
    2009 FIRST INTERNATIONAL CONFERENCE ON NETWORKS & COMMUNICATIONS (NETCOM 2009), 2009, : 104 - 108
  • [6] An architecture for wireless LAN/MAN packet processor
    Lee, S
    Jin, S
    Kim, Y
    Cho, KR
    VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3206 - 3209
  • [7] IBM WIRELESS RF LAN DESIGN AND ARCHITECTURE
    BAUCHOT, FJ
    LANNE, F
    IBM SYSTEMS JOURNAL, 1995, 34 (03) : 390 - 408
  • [8] Autoencoder-Based Architecture for Identification and Mitigating Phishing URL Attack in IoT Using DNN
    Gopal S.B.
    Poongodi C.
    Nanthiya D.
    Kirubakaran T.
    Kulavishnusaravanan B.
    Logeshwar D.
    Journal of The Institution of Engineers (India): Series B, 2023, 104 (06) : 1227 - 1240
  • [9] A real-time wireless LAN access unit based on a DSP architecture
    Franchina, L
    1996 IEEE DIGITAL SIGNAL PROCESSING WORKSHOP, PROCEEDINGS, 1996, : 187 - 190
  • [10] Wireless convergence architecture: A case study using GSM and wireless LAN
    Nikolaou, NA
    Vaxevanakis, KG
    Maniatis, SI
    Venieris, IS
    Zervos, NA
    MOBILE NETWORKS & APPLICATIONS, 2002, 7 (04): : 259 - 267