The rogue, or unauthorized, wireless access point (RWAP) now presents significant security threats by creating network attack vectors behind firewalls, exposing confidential information, and allowing unauthorized utilization of network resources.
Further, the RWAP may affect network performance by interfering with nearby legitimate WAPs.
In fact, RWAPs present such risks and problems that many products now exist to detect them [7-10], albeit with their respective limitations. In all, RWAPs cause a multitude of problems and are one of the more challenging security topics facing network administration today.
In doing so, the user inadvertently bypasses the inherent physical end point security of the wired network, possibly subverting careful access control policies like WPA2 for easily spoofed MAC filtering [5, 6]