Digitala Vetenskapliga Arkivet

Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Comparison of systems to detect rogue access points
Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
Linnaeus University, Faculty of Technology, Department of computer science and media technology (CM).
2019 (English)Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

A hacker might use a rogue access point to gain access to a network, this poses athreat to the individuals connected to it. The hacker might have the potential to leakcorporate data or steal private information. The detection of rogue access points istherefore of importance to prevent any damage to both businesses and individuals.Comparing different software that detects rogue access points increases the chanceof someone finding a solution that suits their network. The different type of softwarethat are compared are intrusion detection systems, wireless scanners and a Ciscowireless lan controller. The parameters that are being compared are; cost, compat-ibility, detection capability and implementation difficulty. In order to obtain resultssome of the parameters require testing. As there are three types of software, threeexperiment environments should be conducted. Our research indicates that alreadyexisting network equipment or the size of the network affects the results from theexperiments.

Place, publisher, year, edition, pages
2019. , p. 24
Keywords [en]
Network Intrusion Detection, Rogue Access Points, WirelessScanner, Wireless Lan Controller, Software Comparisons
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:lnu:diva-88592OAI: oai:DiVA.org:lnu-88592DiVA, id: diva2:1345458
Subject / course
Computer Science
Educational program
Network Security Programme, 180 credits
Presentation
2019-06-04, D1173A_V, Universitetsplatsen 1 351 95, Växjö, 11:21 (English)
Supervisors
Examiners
Available from: 2019-08-27 Created: 2019-08-25 Last updated: 2019-08-27Bibliographically approved

Open Access in DiVA

Comparison of systems to detect rogue access points(769 kB)711 downloads
File information
File name FULLTEXT01.pdfFile size 769 kBChecksum SHA-512
72a1b40eb8dead6a8d8c78e80c14efe2e6a373448de9a89a59af6969698b252aeaa4c3ee86d051878edf0ed00a625061928bffb8e260d2e1998d6b16dccec270
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Lennartsson, AlexanderMelander, Hilda
By organisation
Department of computer science and media technology (CM)
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 711 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 894 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf