A Novel Architecture to Mitigate Wireless LAN based Phishing Attack

被引:0
|
作者
Singh, Niraj Kumar [1 ]
Sridaran, R. [1 ]
机构
[1] Marwadi Univ, Rajkot, Gujarat, India
关键词
phishing attack; spoofing; sniffing; malicious network; wireless sensor networks; social engineering;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The evolvement of mobile electronic devices and gadgets has resulted in the demand for Wireless network. Creating fake authentication web-portal identical of targeted network and wireless network of the same SSID leads to spoofing of emails and passphrases causing loss of all private and confidential messages and data. The proposed paper aims at designing an automation device to detect the replicated network particularly of same SSID (Service set identifier) by analyzing all the properties including BSSID (Basic service set identifier), frequency and a channel, which can send email and message to the security incident response team and also sends the signal to jammer-a device to DE-authenticate and jam malicious network instantly as well as send an alert message to all the users to avoid such a wireless network to protect themselves from being hacked.
引用
收藏
页码:1212 / 1217
页数:6
相关论文
共 50 条
  • [21] E-mail-Based Phishing Attack Taxonomy
    Rastenis, Justinas
    Ramanauskaite, Simona
    Janulevicius, Justinas
    Cenys, Antanas
    Slotkiene, Asta
    Pakrijauskas, Kestutis
    APPLIED SCIENCES-BASEL, 2020, 10 (07):
  • [22] Analysis of Localized Quality of Service Improvement Architecture for Wireless LAN
    N. Arun Vignesh
    P. Poongodi
    Wireless Personal Communications, 2016, 90 : 701 - 711
  • [23] A wireless LAN architecture using PANA for secure network selection
    Tanizawa, Y
    Goto, M
    Fajardo, VI
    Ohba, Y
    WiMob'2005: IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, Vol 2, Proceedings: MOBILE NETWORKING, 2005, : 111 - 118
  • [24] Broadband wireless infrared LAN architecture compatible with Ethernet protocol
    Jungnickel, V
    Helmolt, CV
    Krüger, U
    ELECTRONICS LETTERS, 1998, 34 (25) : 2371 - 2372
  • [25] Machine learning-based phishing attack detection
    Hossain S.
    Sarma D.
    Chakma R.J.
    International Journal of Advanced Computer Science and Applications, 2020, 11 (09): : 378 - 388
  • [26] Analysis of Localized Quality of Service Improvement Architecture for Wireless LAN
    Vignesh, N. Arun
    Poongodi, P.
    WIRELESS PERSONAL COMMUNICATIONS, 2016, 90 (02) : 701 - 711
  • [27] Efficient pipelined multistream AES CCMP architecture for wireless LAN
    Rha, Haeyoung
    Choi, Hae-Wook
    2012 International Conference on Information Science and Applications, ICISA 2012, 2012,
  • [28] Broadband wireless infrared LAN architecture compatible with ethernet protocol
    Heinrich-Hertz-Inst fuer, Nachrichtentechnik Berlin GmbH, Berlin, Germany
    Electron Lett, 25 (2371-2372):
  • [29] A high-capacity indoor optical wireless LAN architecture
    Singh, C
    John, J
    Singh, YN
    Tripathi, KK
    IEEE TENCON 2003: CONFERENCE ON CONVERGENT TECHNOLOGIES FOR THE ASIA-PACIFIC REGION, VOLS 1-4, 2003, : 1316 - 1319
  • [30] Machine Learning-Based Phishing Attack Detection
    Hossain, Sohrab
    Sarma, Dhiman
    Chakma, Rana Joyti
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (09) : 378 - 388