Access detecting method and device

A detection device and a technology for accessing terminals, applied in the network field

Active Publication Date: 2012-12-12
ZHEJIANG UNIVIEW TECH CO LTD
View PDF3 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

802.1x is difficult to be attacked in a conventional network environment (such as a home or office), because it is difficult for illegal users to access their own HUB devices in such an environment, but this problem is very obvious in the monitoring network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access detecting method and device
  • Access detecting method and device
  • Access detecting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention discovers the existence of illegal users by identifying the abnormal behavior of users, and takes certain countermeasures to reduce the security risk caused by the access of illegal users. The following uses computer program implementation as an example for introduction, but the present invention does not exclude other implementation manners. In one embodiment of the present invention, an access detection device is provided at an access terminal (taking an encoder as an example), and the access device includes: a device discovery unit, an authentication processing unit, a packet statistics unit, an access analysis unit, and an access analysis unit. Unit, exception processing unit and message analysis unit, the device cooperates with the switch to perform the following steps when running.

[0020] In step 101, the device discovery unit uses a neighbor discovery protocol to interact with an authentication switch to complete neighbor discovery.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an access detecting method, which is applied to the access terminal, comprising the following steps: A, initiating authentication to the authentication switch to make the authentication switch open the corresponding port to access the network for the access terminal; B, after checking the authentication, counting the packet sending number of the device; C, obtaining the packet receiving number counted by the switch on the corresponding port from the predetermined packet sent by the authentication switch, and comparing the packet receiving number with the packet sending number counted by the device, if the packet receiving number is greater than the packet sending number, determining the existence of the illegal user. According to the access detecting method, the existence of the illegal access user is determined by comparing the packet sending number of the access terminal with the packet receiving number of the authentication switch on the corresponding port, thereby effectively solving the problem that the illegal user pretends to be the legal user through Hub in the prior art.

Description

technical field [0001] The invention relates to network technology, in particular to a method and device for detecting illegal user access. Background technique [0002] With the rapid development of video surveillance technology, monitoring points have been deployed in every corner of the city. Many encoders (EC) or IP cameras (IPC) need to be deployed on both sides of the road, on top of mountains, on top of buildings, etc. This requires the user's network to extend to every corner of the city or even the wild environment, so that monitoring equipment such as encoders can be connected to the user's network. For network security and to prevent illegal users from using access points to attack user networks, users must enable authentication mechanisms at the edge of the network to authenticate each connected device. Please refer to figure 1 At present, 802.1x authentication is a very popular authentication method. It can authenticate the identity of the access device at th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04N7/18
Inventor 任俊峰周迪
Owner ZHEJIANG UNIVIEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products