Math-Driven Detection
Statistical analysis with confidence scoring, not simple thresholds
Most PCAP analyzers just count packets. We built custom detection engines that understand WiFi threats at a protocol level.
Statistical analysis with confidence scoring, not simple thresholds
Every finding includes specific proof, not vague warnings
Thresholds adapt to network conditions automatically
The Result: Fewer false positives. Higher accuracy. Faster decisions.
Each detection method uses custom algorithms analyzing timing patterns, signal behaviors, and packet sequences. Every finding includes:
How it works: Vendor database lookup + signal fingerprinting
Confidence: 90%+ when no whitelist match
Why different: Automatic vendor verification
How it works: SSID collision + signal overlap + beacon rate comparison
Evidence: "8 dB signal difference with encryption mismatch"
Why different: Groups duplicates to prevent spam
How it works: Vendor history tracking + sequence gap analysis
Confidence: 96% when vendor switches detected
Why different: Monitors vendor transitions over time
How it works: Reverse-indexed probe-response matching (O(N) complexity)
Threshold: 5+ fake SSID responses in 60 seconds
Why different: Optimized for noisy environments
How it works: Dynamic threshold based on environment (office: 100/s, urban: 200/s)
Adaptation: 2x multiplier in crowded spaces
Why different: Environment-aware to reduce false alerts
How it works: Deauth frame rate (20+/sec) + client correlation
Why different: Confirms by verifying actual disconnections
Weak Security, Rogue DHCP, Open Honeypot, Clone AP, Signal Anomaly (ฯ > 15%), Timing Attack, Channel Drift (3+ changes/5min)
We don't just list MAC addresses. We analyze how devices behave and how they're being tracked.
Detects fake "random" MACs via sequence jumps (>100) and timing glitches
Tracks devices across changes using probe patterns (>500 SSIDs)
Flags 5+ personal SSID probes at 80%+ confidence
5+ responses to unusual SSIDs in 60 seconds
Hidden networks don't broadcast SSIDs. We find them passively by analyzing client behavior.
Links client probes to AP responses
Confidence: 70%+ with 2+ matching probes
Derives SSIDs from device associations
Accuracy: 90%+ with 3+ clients connecting
Sorts by confirmation level (High/Medium/Low)
+0.05 boost per correlated probe
The Problem: Fixed thresholds cause false positives in busy areas and miss threats in quiet networks.
Our Solution: Automatic classification based on device density and packet volume.
Impact: Reduces noise in crowded spaces while staying sensitive where it counts.
Real-world PCAP files contain errors. We handle them gracefully.
Impact: Tools like tcpdump produce imperfect captures โ we keep going instead of failing silently.
Impact: Reliable processing in constrained serverless environments without crashes.
Unified filtering (JSON/TXT) across all detection engines.
Impact: Your office APs won't flag as rogue. Drastically cuts false positives.
Impact: Enables verification without re-analyzing captures. Critical for audits.
| Feature | Basic Tools | NoorSentinel |
|---|---|---|
| Detection Methods | Generic pattern matching | 13 specialized signatures + stats |
| Thresholds | Fixed values | Environment-aware, dynamic |
| Error Handling | Crash or silent failure | Graceful + clear reporting |
| Evidence | Raw packet dumps | Specific proof with scores |
| Whitelist Support | Manual filtering | Unified, automatic |
| Performance | Varies, often slow | Optimized O(N), 1GB+ reliable |
| Privacy | Often stores data | Zero retention, instant deletion |
We didn't build a generic packet viewer.
We engineered specialized detection engines that understand WiFi threats at a protocol level โ analyzing behaviors, patterns, and anomalies that basic tools ignore.
Clean, trustworthy reports in seconds โ not hours of manual filtering.