This document summarizes a survey of recent methods for detecting evil twin access points in wireless local area networks (WLANs). It describes the background and challenges of evil twin attacks, where attackers create rogue access points that mimic authorized ones to steal user information. The document categorizes detection methods as network admin-side or client-side solutions. It reviews several specific detection techniques, such as those based on timing analysis, received signal strength, or separating one-hop from two-hop wireless connections. Finally, it discusses issues like the difficulty of completely detecting evil twins and challenges with wireless-only versus wired-side detection approaches.