Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Chapter

Download BibTeX

Title

Structure and logic of the Rogue Access Point attack

Authors

[ 1 ] Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ 2 ] Instytut Sieci Teleinformatycznych, Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ DW ] applied doctorate phd student | [ S ] student | [ P ] employee

Scientific discipline (Law 2.0)

[2.3] Information and communication technology

Year of publication

2023

Chapter type

chapter in monograph / paper

Publication language

english

Keywords
EN
  • WLAN
  • Rogue Access Point
  • attack
  • open-source
Abstract

EN This paper provides an analysis of an attack on wireless networks referred to as Rogue Access Point The concept and phases of a RAP attack are presented. Different variants of the attack were presented. Difficulties and typical network security measures that an attacker may encounter are discussed. the article also contains a brief description of methods and techniques that can be used to secure a network against such an attack. The article is the result of a literature review and experiments carried out.

Pages (from - to)

406 - 414

Book

Proceedings of the 42nd International Business Information Management Association Computer Science Conference IBIMA, 29-30 November 2023, Seville, Spain. Theory and Practice in Modern Computing: From Artificial Intelligence to Computer Security

Presented on

42nd International Business Information Management Association Computer Science Conference IBIMA, 29-30.11.2023, Seville, Spain

Ministry points / chapter

5

Ministry points / conference (CORE)

70

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.