ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Survey on Evil Twin Attack

Journal: International Journal of Scientific Engineering and Research (IJSER) (Vol.4, No. 4)

Publication Date:

Authors : ; ; ;

Page : 54-58

Keywords : SSID; Evil Twin Attack; Wi-Fi; AP; Rogue.;

Source : Downloadexternal Find it from : Google Scholarexternal


During this present epoch use of Wi-Fi is not as secure as other networks principally in Public places akin to shopping complex, multiplex, coffee-shops, and university and so forth. Where there is an open access for Wi-Fi connection. Users essentially get attract towards the signal which provide high range, which may be a fake connection setup by an attacker to stole the private information of user. The target of attacker is to steal the personal data of victim such as username, password, credit numbers etc. But he is not able to copy the details of hardware details of an access points such as models, manufacture etc. Attacker setup the evil twin attack by installing it into his system by making same SSID he establish a rogue AP and enforce the victim to connect, by this he is able to accomplish his objective, after completing his objective he shut off the fake connection within a small duration of time. In this review paper we are describing a variety of techniques to detect and prevent from an evil twin attack. Because of some limitations of these previous techniques we are revealing our future approach to detect from this attack.

Last modified: 2021-07-08 15:37:10