Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Chapter

Download BibTeX

Title

Theoretical and Practical Aspects of the Evil Twin Attack. The Attacker’s Perspective and Defense Methodology

Authors

[ 1 ] Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ 2 ] Instytut Sieci Teleinformatycznych, Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ DW ] applied doctorate phd student | [ S ] student | [ P ] employee

Scientific discipline (Law 2.0)

[2.3] Information and communication technology

Year of publication

2024

Chapter type

chapter in monograph / paper

Publication language

english

Keywords
EN
  • evil twin
  • wireless LAN
  • MITM (Man in the Middle)
  • WLAN Security
Abstract

EN This article provides an analysis of an attack on wireless networks referred to as Evil Twin. In addition to a theoretical description, the article discusses the hardware and system combination used, while pointing out its relatively low complexity, and the complimentary nature of the solutions used, both the operating system and the software used are presented. This clearly translates into the potential when attempting to break through security and gain specific data. Furthermore, the authors present the individual phases of the attack, including the proposed subsequent optimisations, in order to make the attack practically applicable in most cases, regardless of the location and shape of the network under investigation. The paper additionally presents methods for tuning the functionality itself, in order to ultimately increase the probability of success of the attack itself. The article is the result of work devoted to reviewing the literature on the subject and conducting experiments with various scripts including their optimisation.

Pages (from - to)

224 - 236

DOI

10.1007/978-3-031-62843-6_23

URL

https://link.springer.com/chapter/10.1007/978-3-031-62843-6_23

Comments

Artykuł stanowi przedruk wcześniejszego artykułu pt. "Structure and Logic of the Evil Twin Attack in the context of Open Source Software":

https://sin.put.poznan.pl/publications/details/i53490

Book

Artificial intelligence and Machine Learning. 41st IBIMA International Conference, IBIMA-AI 2023, Granada, Spain, June 26–27, 2023, Revised Selected Papers

Presented on

41st International Business Information Management Association Conference IBIMA 2023, 26-27.06.2023, Granada, Spain

Ministry points / chapter

20

Ministry points / conference (CORE)

70

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.