Abstract:
This paper provides an analysis of an attack on wireless networks referred to as Rogue Access Point The concept and phases of a RAP attack are presented. Different variants of the attack were presented. Difficulties and typical network security measures that an attacker may encounter are discussed. the article also contains a brief description of methods and techniques that can be used to secure a network against such an attack. The article is the result of a literature review and experiments carried out.