National Repository of Grey Literature 3 records found  Search took 0.01 seconds. 
Advanced detection of rogue access point in wireless networks
Šebestová, Dominika ; Pospíšil, Jan (referee) ; Fujdiak, Radek (advisor)
The aim of the bachelor’s thesis is to get acquainted with the available implementation options of Rogue Access Point (RAP) and the detection methods used to detect such points from the side of the client or server, and from the principles of the studied methods implement a solution that is able to detect various types of the Evil Twin (ET). The thesis covers implementation of detection methods based on TCP connection properties and a method monitoring data frames, specifically their arrival time, specific length and source and destination MAC address. Connection of these methods creates an universal detection methods on the client’s side that is tested on the experimental network.
Advanced detection of rogue access point in wireless networks
Šebestová, Dominika ; Pospíšil, Jan (referee) ; Fujdiak, Radek (advisor)
The aim of the bachelor’s thesis is to get acquainted with the available implementation options of Rogue Access Point (RAP) and the detection methods used to detect such points from the side of the client or server, and from the principles of the studied methods implement a solution that is able to detect various types of the Evil Twin (ET). The thesis covers implementation of detection methods based on TCP connection properties and a method monitoring data frames, specifically their arrival time, specific length and source and destination MAC address. Connection of these methods creates an universal detection methods on the client’s side that is tested on the experimental network.
Analýza a prevence podvržení falešného přístupového bodu
PÍCHA, David
This thesis begins with a general security of Wi-Fi router. Specifically, I deal with vulnerabilities that an attacker can use to set up a rogue access point. In theoretical part I describe the striker's methodology in the act. In the other important part of work i point out on the legislation which is in this proces violated. The main practical part is a simulation of attack with a pre-arranged group of people. The final outcome of the work are the results of simulation and informations earned from survey.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.