Described are a system and method for detecting an unauthorized access
point accessing a communication network. An authorized access point
and/or an authorized mobile unit detects a beacon generated by a
transmitting access point. The beacon includes identification information
of the transmitting access point. A computing arrangement verifies the
identification information of the transmitting access point with a
preexisting database of the communication network. The preexisting
database includes data corresponding to identification information of a
plurality of authorized access points. The computing arrangement
initiates a tracking procedure to determine a location of the
unauthorized access point where the verification of the transmitting
access point identification information with the preexisting database
fails.