DPETAS: DETECTION AND PREVENTION OF EVIL TWIN ATTACKS ON WI-FI NETWORKS
Numerous types of threats could become vulnerable to Wi-Fi networks. In terms of preventing and reducing their effect on the networks, it has become imperative for any user to understand the threats. Even after thoroughly encrypting them, the route between the attacker's device and the Victim's device may even be vulnerable to security attacks on Wi-Fi networks. It has also been noted that there are current shortcomings in Wi-Fi security protocols and hardware modules that are available in the market. Any device connected to the network could be a possible primary interface for attackers. Wi-Fi networks that are available in the transmission range are vulnerable to threats. For instance, if an Access Point (AP) has no encrypted traffic while it is attached to a Wi-Fi network, an intruder may run a background check to launch the attack. And then, attackers could launch more possible attacks in the targeted network, in which the Evil Twin attack has become the most prominent. This Evil Twin attack in a Wi-Fi network is a unique outbreak primarily used by attackers to make intrusion or to establish an infection where the users are exploited to connect with a victim's network through a nearby access point. So, there is more chance to get the user's credentials from the perpetrators. An intruder wisely introduces a fake access point equivalent to something that looks like an original access point near the network premises. So, an attacker can compromise the network when a user unconsciously enters by using this fake access point. Attackers could also intercept the traffic and even the login credentials used after breaching insecure networks. This could enable monitoring the users and perhaps even manipulating the behaviour patterns of an authorized network user smoother for attackers. The critical consideration of this research paper is the identification and avoidance of the Evil Twin attack over any Wi-Fi network. DPETA addresses the strategies that intruders use to extract identities and what users need to do to keep them out of the networks.