I. INTRODUCTION
As users realize the benefits of wireless networking at
home, they begin to desire the same flexibility in the
workplace. Rather than waiting for their IT organizations to
install a wireless network, users are taking matters into their
own hands. Employees are deploying rogue APs and building
large grassroots wireless networks without the knowledge or
consent of their IT departments. These rogue APs represent a
serious breach of network security. They are typically
connected to a network port behind the corporate firewall.
Additionally, employees rarely enable even the most basic
security settings on rogue APs, making it easy for
unauthorized outsiders to use the AP and eavesdrop on
network traffic.