Comparison of systems to detect rogue access points
2019 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE credits
Student thesis
Abstract [en]
A hacker might use a rogue access point to gain access to a network, this poses athreat to the individuals connected to it. The hacker might have the potential to leakcorporate data or steal private information. The detection of rogue access points istherefore of importance to prevent any damage to both businesses and individuals.Comparing different software that detects rogue access points increases the chanceof someone finding a solution that suits their network. The different type of softwarethat are compared are intrusion detection systems, wireless scanners and a Ciscowireless lan controller. The parameters that are being compared are; cost, compat-ibility, detection capability and implementation difficulty. In order to obtain resultssome of the parameters require testing. As there are three types of software, threeexperiment environments should be conducted. Our research indicates that alreadyexisting network equipment or the size of the network affects the results from theexperiments.
Place, publisher, year, edition, pages
2019. , p. 24
Keywords [en]
Network Intrusion Detection, Rogue Access Points, WirelessScanner, Wireless Lan Controller, Software Comparisons
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:lnu:diva-88592OAI: oai:DiVA.org:lnu-88592DiVA, id: diva2:1345458
Subject / course
Computer Science
Educational program
Network Security Programme, 180 credits
Presentation
2019-06-04, D1173A_V, Universitetsplatsen 1 351 95, Växjö, 11:21 (English)
Supervisors
Examiners
2019-08-272019-08-252019-08-27Bibliographically approved