Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for preventing flooding attack in wireless local area network

A technology of wireless local area network and flooding attack, which is applied in the field of defense against flooding attack, to achieve the effect of defending against flooding attack, the method is simple and feasible, and the effect is remarkable

Inactive Publication Date: 2012-07-04
FUJIAN SUNNADA COMM
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, the prior art cannot realize the defense against flooding attacks of wireless data frames and management frames on the wireless local area network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing flooding attack in wireless local area network
  • Method for preventing flooding attack in wireless local area network
  • Method for preventing flooding attack in wireless local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] see figure 1 , figure 2 As shown, the embodiments of the present invention will be described in detail.

[0021] The way to launch flooding attacks now is mainly to send a large number of wireless management frames and wireless data frame messages, such as figure 1 , the attacker floods the AP by sending a large number of data frames and management frames. So many wireless data frames and wireless management frames will occupy a large amount of network bandwidth and AP device resources, and a large number of wireless management frames will also make other legitimate users frequently switch between authentication and deauthentication. The present invention solves the flooding attack aiming at this problem.

[0022] refer to figure 2 , the present invention is a method for defending against flooding attacks in a wireless local area network. The AP is provided with a wireless packet classification module, a data frame monitoring module, a management frame monitoring ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for preventing flooding attack in a wireless local area network, which comprises the following steps that: 10, after a wireless message is received by an access point (AP), a wireless management frame and a wireless data frame are separated out through a wireless message classification module; 20, the wireless management frame and the wireless data frame enter a monitoring module to undergo flow monitoring; 30, when the message flow exceeds a preset threshold value, the monitoring module sends an overproof signal which contains a source media access control (MAC) address to a time statistic module, and the time statistic module is started to time, if the preset time is exceeded, the source MAC address is sent to an access control list (ACL) strategy module; and 40, after the ACL strategy module receives the source MAC address from the time statistic module, the AP is controlled to reject the receiving of the MAC address message. The method can prevent the flooding attack in a mode of sending a large number of data frames and management frames.

Description

【Technical field】 [0001] The invention relates to a method for defending against flood attacks in a wireless local area network. 【Background technique】 [0002] With the development of wireless network technology, the security of wireless network nodes has been greatly threatened. Flooding attack is the simplest attack, but also a relatively serious attack. In a WLAN, an attacker launches a flood attack on a wireless access point, causing the access point to run out of resources and fail to work normally. In a WLAN, the main way to launch a flood attack is to send a large number of wireless management frames and wireless data frame messages. The flood attack will occupy a large amount of network bandwidth and access point device resources, and the wireless management frame attack will also make legitimate Users frequently switch between authentication and de-authentication, which cannot work normally. Therefore, it is essential to defend against flooding attacks of wireles...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04W12/122
Inventor 张水生黄海峰张媛
Owner FUJIAN SUNNADA COMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products