A Novel Architecture to Mitigate Wireless LAN based Phishing Attack

被引:0
|
作者
Singh, Niraj Kumar [1 ]
Sridaran, R. [1 ]
机构
[1] Marwadi Univ, Rajkot, Gujarat, India
关键词
phishing attack; spoofing; sniffing; malicious network; wireless sensor networks; social engineering;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The evolvement of mobile electronic devices and gadgets has resulted in the demand for Wireless network. Creating fake authentication web-portal identical of targeted network and wireless network of the same SSID leads to spoofing of emails and passphrases causing loss of all private and confidential messages and data. The proposed paper aims at designing an automation device to detect the replicated network particularly of same SSID (Service set identifier) by analyzing all the properties including BSSID (Basic service set identifier), frequency and a channel, which can send email and message to the security incident response team and also sends the signal to jammer-a device to DE-authenticate and jam malicious network instantly as well as send an alert message to all the users to avoid such a wireless network to protect themselves from being hacked.
引用
收藏
页码:1212 / 1217
页数:6
相关论文
共 50 条
  • [41] GSWLAN: A new architecture model for a generic and secure wireless LAN system
    Virendra, M
    Upadhyaya, S
    Wang, X
    PROCEEDINGS FROM THE FIFTH IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2004, : 434 - 435
  • [42] Research on Phishing AP Attack Detection Technology Based on RSSI
    Ling Jie
    Jin Shuangqi
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 205 - 208
  • [43] Multi-threading processor architecture for wireless LAN MAC controller
    Hong, IP
    Lee, YJ
    Chun, SJ
    Lee, YS
    Joung, J
    ICCE: 2005 INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, DIGEST OF TECHNICAL PAPERS, 2005, : 379 - 380
  • [44] Client based wireless LAN indoor positioning
    Cubic, I
    Begusic, D
    Mandic, T
    ConTEL 2005: Proceedings of the 8th International Conference on Telecommunications, Vols 1 and 2, 2005, : 335 - 339
  • [45] Multiagent-based security for the wireless LAN
    Faheem, Hossam M.
    IEEE Potentials, 2005, 24 (02): : 19 - 22
  • [46] Architecture of hierarchical integrated LAN based on FDDI
    Fujita, K.
    Iwama, M.
    Miyazawa, M.
    IEE Conference Publication, 1988, (288): : 87 - 92
  • [47] Research of Intrusion and Monitoring Based on Wireless LAN
    Che, ShengBing
    Jin, Shuai
    ADVANCES IN FUTURE COMPUTER AND CONTROL SYSTEMS, VOL 1, 2012, 159 : 621 - 628
  • [48] Analysis of Optical OFDM Based Wireless LAN
    Kenshil, Salih
    Rashwan, Gasem
    Matin, Mohamed
    2017 IEEE 7TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE IEEE CCWC-2017, 2017,
  • [49] An Anti-DoS Attack Architecture for Wireless IT Infrastructure
    K'Ondiwa, N. O.
    Ochola, E. O.
    2013 Pan African International Conference on Information Science, Computing and Telecommunications (PACT), 2013, : 98 - 103
  • [50] Novel Coexistence Scheme between Wireless Sensor Network and Wireless LAN for HEMS
    Inoue, Fumihiro
    Morikura, Masahiro
    Nishio, Takayuki
    Yamamoto, Koji
    Nuno, Fusao
    Sugiyama, Takatoshi
    2013 IEEE INTERNATIONAL CONFERENCE ON SMART GRID COMMUNICATIONS (SMARTGRIDCOMM), 2013, : 271 - 276