National Repository of Grey Literature 4 records found  Search took 0.01 seconds. 
Advanced detection of rogue access point in wireless networks
Šebestová, Dominika ; Pospíšil, Jan (referee) ; Fujdiak, Radek (advisor)
The aim of the bachelor’s thesis is to get acquainted with the available implementation options of Rogue Access Point (RAP) and the detection methods used to detect such points from the side of the client or server, and from the principles of the studied methods implement a solution that is able to detect various types of the Evil Twin (ET). The thesis covers implementation of detection methods based on TCP connection properties and a method monitoring data frames, specifically their arrival time, specific length and source and destination MAC address. Connection of these methods creates an universal detection methods on the client’s side that is tested on the experimental network.
Detection of fake access points
Lővinger, Norbert ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The risk of cyber-attacks in the local networks is constantly increasing due to the underestimation of their security. In wireless LANs, an attacker does not require physical access to the network. These types of attacks are almost impossible to spot. The typical signature of fake access point is the same configuration as the legitimate access point, which increases the effectivness of the attack. Detection systems are used to detect these cyber-attacks in local networks. Detection systems offer advanced methods for real-time analysis of captured network communication. In this bachelor thesis two open detection systems – Suricata and Kismet are analysed and compared. Custom implementation of detection system is based on functionality analysis of these two detection systems. Custom implemetation is programmed in Python at an affordable Raspberry Pi 4. The success of detecting cyber-attacks using fake access point was tested in 4 different scenarios at the experimental testbed.
Advanced detection of rogue access point in wireless networks
Šebestová, Dominika ; Pospíšil, Jan (referee) ; Fujdiak, Radek (advisor)
The aim of the bachelor’s thesis is to get acquainted with the available implementation options of Rogue Access Point (RAP) and the detection methods used to detect such points from the side of the client or server, and from the principles of the studied methods implement a solution that is able to detect various types of the Evil Twin (ET). The thesis covers implementation of detection methods based on TCP connection properties and a method monitoring data frames, specifically their arrival time, specific length and source and destination MAC address. Connection of these methods creates an universal detection methods on the client’s side that is tested on the experimental network.
Detection of fake access points
Lővinger, Norbert ; Gerlich, Tomáš (referee) ; Martinásek, Zdeněk (advisor)
The risk of cyber-attacks in the local networks is constantly increasing due to the underestimation of their security. In wireless LANs, an attacker does not require physical access to the network. These types of attacks are almost impossible to spot. The typical signature of fake access point is the same configuration as the legitimate access point, which increases the effectivness of the attack. Detection systems are used to detect these cyber-attacks in local networks. Detection systems offer advanced methods for real-time analysis of captured network communication. In this bachelor thesis two open detection systems – Suricata and Kismet are analysed and compared. Custom implementation of detection system is based on functionality analysis of these two detection systems. Custom implemetation is programmed in Python at an affordable Raspberry Pi 4. The success of detecting cyber-attacks using fake access point was tested in 4 different scenarios at the experimental testbed.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.