The experimental results of the rogue wireless access point detection system are presented in this section.
The indirect RWAP detection approach used in this study is dependent on wireless host discovery and subsequent authorization verification.
Here, wireless host discovery is the critical component, and different algorithms for such discovery were tested on both the datasets presented in Section V.
How well each algorithm found wireless hosts thus determines how well RWAPs were detected.