4.2 Rogue Access Point Detection
In this section, we perform the experiment to show
how the proposed system can detect the vaious types
of rogue access point. We define four types rogue
access point.
1. Rogue Type 1: Employee’s rogue access point, no
SSID spoof and no wireless MAC spoof.
2. Rogue Type 2: Attacker’s rogue access point,
with SSID spoof but no wireless MAC spoof
3. Rogue Type 3: Attacker’s rogue access point, with
no SSID spoof but wireless MAC spoof.
4. Rogue Type 4: Attacker’s rogue access point, with
SSID spoof and wireless MAC spoof.