A Novel Architecture to Mitigate Wireless LAN based Phishing Attack

The evolvement of mobile electronic devices and gadgets has resulted in the demand for Wireless network. Creating fake authentication web-portal identical of targeted network and wireless network of the same SSID leads to spoofing of emails and passphrases causing loss of all private and confidential messages and data. The proposed paper aims at designing an automation device to detect the replicated network particularly of same SSID (Service set identifier) by analyzing all the properties including BSSID (Basic service set identifier), frequency and a channel, which can send email and message to the security incident response team and also sends the signal to jammer-a device to DE-authenticate and jam malicious network instantly as well as send an alert message to all the users to avoid such a wireless network to protect themselves from being hacked.

[1]  Sapna Gambhir,et al.  A Literature Review of Security Threats to Wireless Networks , 2014 .

[2]  H. Rao,et al.  An Exploration of the Design Features of Phishing Attacks , 2012 .

[3]  Yada Zhu,et al.  Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..

[4]  Da-Yu Kao,et al.  User-side evil twin attack detection using time-delay statistics of TCP connection termination , 2018, 2018 20th International Conference on Advanced Communication Technology (ICACT).

[5]  Saurabh Malgaonkar,et al.  Research on Wi-Fi Security Protocols , 2017 .

[6]  Guofei Gu,et al.  EvilDirect: A New Wi-Fi Direct Hijacking Attack and Countermeasures , 2017, 2017 26th International Conference on Computer Communication and Networks (ICCCN).

[7]  Chen Wang,et al.  Accurate rogue access point localization leveraging fine-grained channel information , 2014, 2014 IEEE Conference on Communications and Network Security.

[8]  Min Wu,et al.  Do security toolbars actually prevent phishing attacks? , 2006, CHI.

[9]  Vandana Wekhande WI-FI TECHNOLOGY: SECURITY ISSUES , 2006 .

[10]  Smita Parte,et al.  A Comprehensive Study of Wi-Fi Security - Challenges and solutions , 2012 .