Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting illegal AP (Assembly Program) under centralized WLAN (Wireless Local Area Network) environment

A detection method and centralized technology, which is applied in the field of detection of illegal APs, to achieve the effect of protecting Internet security, protecting interests, and optimizing WLAN networks

Inactive Publication Date: 2012-05-02
WUHAN HONGXU INFORMATION TECH
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although IEEE802.1x has a relatively complete security mechanism, most of them resist attacks by improving the system's own immunity. It is still powerless against attacks such as illegal APs. Therefore, a means is needed to help network managers actively discover Hidden dangers in the network, active defense and anti-attack against wireless attackers at the first time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting illegal AP (Assembly Program) under centralized WLAN (Wireless Local Area Network) environment
  • Method for detecting illegal AP (Assembly Program) under centralized WLAN (Wireless Local Area Network) environment
  • Method for detecting illegal AP (Assembly Program) under centralized WLAN (Wireless Local Area Network) environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] Below in conjunction with accompanying drawing and embodiment describe in detail:

[0051] 1. Detection system

[0052] 1. Overall

[0053] Such as figure 1 , the detection system includes an AP device 20 and an illegal AP device 30;

[0054] AC equipment 10 is provided;

[0055] The AC device 10 is a wireless controller for managing APs, establishing WLANs, and detecting illegal APs, including sequentially interacting WLAN establishment module 11, binary recording module 12, illegal AP identification module 13, collection module 14 and wireless scanning module 15;

[0056] The binary recording module 12 interacts with the AP device 20;

[0057] The wireless scanning module 15 interacts with the AP device 20 and the illegal AP device 30 respectively.

[0058] 2. Function block

[0059] 1) AC equipment 10

[0060] ① The WLAN establishment module 11 is a module for assembling and creating a message code stream of a WLAN, which is used for the AC device to send a m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting an illegal AP (Assembly Program) under a centralized WLAN (Wireless Local Area Network) environment and relates to a wireless intrusion detection technique. An AP device and an illegal AP device are adopted in the method; an AC (Automatic Control) device is arranged; the AC device is a wireless controller used for managing the AP, establishing a WLAN and detecting the illegal AP; the AC device comprises a WLAN establishing module, a binary recording module, an illegal AP identifying module, a collecting module and a wireless scanning module which are interacted in turn; the binary recording module is interacted with the AP device; and the wireless scanning module is respectively interacted with the AP device and the illegal AP device. The method can be easily realized; a physical position of the illegal AP can be accurately positioned; the illegal AP in a space can be effectively found; same frequency interference or adjacent frequency interference between the illegal AP and legal AP is avoided; and the method is suitable for the WLAN under various complex networking environments, is free from being restricted by space and field as well as time and weather and can be implemented under any environment.

Description

technical field [0001] The invention relates to a wireless intrusion detection technology, in particular to a method for detecting an illegal AP (Access Point wireless access point) in a centralized WLAN (Wireless Local Area Networks) environment. The method is simple and easy to be used in various environments, and detects illegal APs (rogue APs) in complex WLAN environments through a dynamic detection method. Background technique [0002] The modern WLAN environment is becoming more and more common and widely used; it enables people to connect to the Internet through WLAN hotspots anytime and anywhere, making people's lives more and more rich, but there are many Illegal intrusion technology, illegal AP is a kind of illegal intrusion technology. [0003] Rogue AP refers to an unauthenticated access point in a wireless network, which can provide an entry point for unauthorized network access. [0004] Although IEEE802.1x has a relatively complete security mechanism, most o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W24/04H04W12/122
Inventor 张钟凯张光华
Owner WUHAN HONGXU INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products