dc.description.abstract |
As the popularity of wireless networks soars, maintaining their security is a significant challenge. Wi-Fi networks are susceptible to Rogue Access Points because of the open medium, inadequate software implementation, potential for hardware deficiencies, and inappropriate configuration (RAP). Unauthorized access points known as "rogue access points" can be installed by end users without the security administrator's knowledge. When this malicious device is linked to the Internet, an attacker can utilize it to compromise the network's security. I ran various port and service script configurations, simulated operating systems, and tested which formats worked best as a research honey pot and which formats worked best as a decoy to safeguard other network users. In order to get better results for both goals in the coming weeks, we examined the results. However, configurations successful for one objective were not always successful for the other.Nevertheless, I did uncover promising setups for both purposes. Additionally, I determined the most typical attacks, the most typical ports utilized by attackers, and the level of effectiveness of decoy service scripts. I'll examine the system's architecture, configuration, and operation. After the system's operational phases are complete, I'll look at how the results are pulled from the database and how they're analyzed. In order to create new rules that might prevent them in the future, I must mine through the retrieved results to try to locate the harmful data. I will have a solid understanding of the network traffic that has been recorded and what makes up some of the more intriguing packets at the project's conclusion. |
en_US |