PREVENTION OF “EVIL TWIN ATTACK” AHMED, TANVEER ahmed.bd@outlook.com Motivation: The wireless Communication has been popular by many favorable applications that require packet data from one or more sender and receivers. Wireless network commonly locate in public place such as cafes, office and university. These networks are suitable to use, demanding no out-of-bound key interchange trust links. Wireless LAN has a wide range of applications due to its flexibility and easy access. . On the other hand wireless used in many commercial and military applications to bring data from real time. Network research has make many security solutions. And it is remark that the pace of deliver packets drops the number of interchange increase. According to the JiWire report [1] in 2012 total Wi-Fi usage has been doubled, increasing by more than 240% since Q2, 2011.Now it’s amazing that 75% people can’t live [2] without Wi-Fi. The wireless communication has a number of tough issues. So, this networks are risk to different threats include “Evil twin attack” where clones a client’s previous used A- for a hostile reason including malware theft. Growing WLAN presented different risk of wireless attacks and “EVIL TWIN ATTACK” is one of the most challenging network security concern. Hacker set service identifier (SSID) same as access local hotspot or corporate network. By disconnecting the legitimate AP, hacker manipulate his own SSID and user lose their connection and reconnect to the “EVIL TWIN”. Naturally used modifies for IEEE 802.11 access points(APs), such as SSID, MAC (BSSID), or IP address can be trivially Fake. Imitate existing APs with duplicate ones to attract their traffic is referred to in the article like as the evil twin attack. It allows an attacker with tiny creation and consumption to fake a genuine AP and ambush, collect, or modify (potentially even encrypted) data. Proposing defense that can to maintain the simple, good and usable of open access networks when handout increased security from evil twin attacks. Notifications are critical to different types of attacks as the channels are unsafe in wireless. Due to its harshness, the topic has gained noteworthy research interest in the past decagon. In this paper, I introduce a separate attack model to express the attack in all its side and I think this is the big threaten for wireless local area network and I dedicate myself to give some solution to prevent “EVIL TWIN ATTACK” precisely.