Circumvention of Nascent and Potential Wi-Fi Phishing Threat Using Association Rule Mining
In the current era of technological advancement, the access to the internet has predominantly increased due to plethoric hand held devices. All day–day activities which require time and energy are being been done effortlessly in the blink of an eye. This extreme sophistication rendered to the mobile...
Gespeichert in:
Veröffentlicht in: | Wireless personal communications 2017-06, Vol.94 (4), p.2331-2361 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In the current era of technological advancement, the access to the internet has predominantly increased due to plethoric hand held devices. All day–day activities which require time and energy are being been done effortlessly in the blink of an eye. This extreme sophistication rendered to the mobile Wi-Fi users prorogues them to do all pecuniary transaction through mobile phones. A Wi-Fi hotspot which connects such hand held devices has become a temporary repository of sensitive information, thereby giving an opportunity for hackers to accrue monetary gain. Therefore information security policies addressing Wi-Fi hotspots (Wi-Fi phishing attack) has become the need of the hour. The possible ways to attack the security of Wi-Fi hotspots and counter-attack mechanisms has been addressed in this paper. In this paper a live Wi-Fi Phishing attack has been demonstrated and a novel approach based on association rule mining to circumvent the same has been discussed in this paper. |
---|---|
ISSN: | 0929-6212 1572-834X |
DOI: | 10.1007/s11277-016-3451-1 |