Depending on the amount of data to process, file generation may take longer.

If it takes too long to generate, you can limit the data by, for example, reducing the range of years.

Chapter

Download BibTeX

Title

Concept and Phases of the Rogue Access Point Attack

Authors

[ 1 ] Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ 2 ] Instytut Sieci Teleinformatycznych, Wydział Informatyki i Telekomunikacji, Politechnika Poznańska | [ DW ] applied doctorate phd student | [ S ] student | [ P ] employee

Scientific discipline (Law 2.0)

[2.3] Information and communication technology

Year of publication

2025

Chapter type

chapter in monograph / paper

Publication language

english

Keywords
EN
  • Rogue Access Point
  • wireless LAN
  • MITM (Man in the Middle)
  • WLAN Security
Abstract

EN This paper provides an analysis of an attack on wireless networks referred to as Rogue Access Point The concept and phases of a RAP attack are resented. Different variants of the attack were presented. Difficulties and typical network security measures that an attacker may encounter are discussed. The article also contains a brief description of methods and techniques that can be used to secure a network against such an attack. The article is the result of a literature review and experiments carried out.

Pages (from - to)

290 - 303

DOI

10.1007/978-3-031-77493-5_25

URL

https://link.springer.com/chapter/10.1007/978-3-031-77493-5_25

Book

Artificial Intelligence and Machine Learning. 43rd IBIMA Conference, IBIMA-AI 2024, Madrid, Spain, June 26–27, 2024, Revised Selected Papers, Part-I

Presented on

43rd International Business Information Management Association Conference IBIMA 2024, 26-27.06.2024, Madrid, Spain

Ministry points / chapter

20

Ministry points / conference (CORE)

70

This website uses cookies to remember the authenticated session of the user. For more information, read about Cookies and Privacy Policy.