DPETAs: Detection and Prevention of Evil Twin Attacks on Wi-Fi Networks
- Title
- DPETAs: Detection and Prevention of Evil Twin Attacks on Wi-Fi Networks
- Creator
- Rofoo F.F.H.; Galety M.G.; Arulkumar N.; Maaroof R.
- Description
- Numerous types of threats could become vulnerable to Wi-Fi networks. In terms of preventing and reducing their effect on the networks, it has become an imperative activity of any user to understand the threats. Even after thoroughly encrypting them, the route between the attackers device and the victims device may even be vulnerable to security attacks on Wi-Fi networks. It has also been noted that there are current shortcomings on Wi-Fi security protocols and hardware modules that are available in the market. Any device connected to the network could be a possible primary interface for attackers. Wi-Fi networks that are available in the transmission range are vulnerable to threats. For instance, if an Access Point(AP) has no encrypted traffic while it is attached to a Wi-Fi network, an intruder may run a background check to launch the attack.And then, attackers could launch more possible attacks in the targeted network, in which the Evil Twin attack have become the most prominent. This Evil Twin attack in a Wi-Fi network is a unique outbreak mostly used by attackers to make intrusion or to establish an infection where the users are exploited to connect with a victims network through a nearby access point. So, there are more chance to get users credentials by the perpetrators. An intruder wisely introduces a fake access point that is equivalent to something looks like an original access point near the network premises in this case. So, an attacker is capable of compromising the network when a user unconsciously enters by using this fake access point. Attackers could also intercept the traffic and even the login credentials used after breaching insecure networks. This could enable monitoring the users and perhaps even manipulating the behavior patterns of an authorized network user smoother for attackers. The key consideration of this research paper is the identification and avoidance of the Evil Twin attack over any Wi-Fi networks. It is named as DPETAs to address the strategies that intruders use to extract identities and what users need to do to keep them out of the networks. 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
- Source
- Lecture Notes in Electrical Engineering, Vol-840, pp. 559-568.
- Date
- 2022-01-01
- Publisher
- Springer Science and Business Media Deutschland GmbH
- Subject
- 802.11 standards; Evil twin AP attacks; Fake access points; Man in the middle (MITM) attack; Management frames; Wi-Fi attacks
- Coverage
- Rofoo F.F.H., Department of Information Technology, Catholic University, Kurdistan Region, Erbil, Iraq; Galety M.G., Department of Information Technology, Catholic University, Kurdistan Region, Erbil, Iraq; Arulkumar N., Department of Computer Science, CHRIST (Deemed to be University), Bangalore, India; Maaroof R., Department of Information Technology, Catholic University, Kurdistan Region, Erbil, Iraq
- Rights
- Restricted Access
- Relation
- ISSN: 18761100; ISBN: 978-981169011-2
- Format
- Online
- Language
- English
- Type
- Conference paper
Collection
Citation
Rofoo F.F.H.; Galety M.G.; Arulkumar N.; Maaroof R., “DPETAs: Detection and Prevention of Evil Twin Attacks on Wi-Fi Networks,” CHRIST (Deemed To Be University) Institutional Repository, accessed February 24, 2025, https://archives.christuniversity.in/items/show/20402.