Previous works in rouge access point detection
focus on two approaches: 1) Client based rogue access
point detection and 2) Network based rogue access
point detection. Client based rogue access point
detection use the client computer to implement the
rogue access point detection [2][20]. [2] proposed
technique called Client Conduit to detect rogue access
point by changing wireless network interface card (i.e,
client NIC) to act like an access point then collect
wireless data for analysis. [20] proposed agent-based
solution install on the client computer to operate the
real time rogue access point detection by compairing
MAC address from sniffing with the registered MAC.
Network based rogue access point was proposed in
[3][4]. [3] proposed rogue access point detection based
on temporal traffic characteristics. The paper measured
inter-packet time of the traffic to differentiate between
traffic from regular wired LAN and traffic from
wireless LAN. Result of paper described 80% of wired
LAN inter-packet time is less than 1ms, while 90% of
wireless LAN inter-packet time is greater than 1ms. [4]
proposed the measurement of TCP-Ack pairs traffic to
differentiate between traffic from wired LAN and from
wireless LAN. In addition, there are quite a few
commercial rogue access point detection available in
the marker. Most of them are based on the dedicated
wireless sensor to perform the RF detection. The
commercial products like AirWave[5], AirDefense [6],
AirMagnet [7], Wifi Manager [8] and Cisco WLSE [9]
are proprietary.