Method, equipment and system for resisting wireless network flooding attack

A flood attack, wireless network technology, applied in the field of communication, can solve the problem of unable to prevent flood attack source, low security and reliability of wireless access network equipment, discarding and other problems

Active Publication Date: 2012-12-19
RUIJIE NETWORKS CO LTD
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the existing anti-flooding attack method based on flow detection, the wireless access network equipment of the entire network cannot prevent the flooding attac

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system for resisting wireless network flooding attack
  • Method, equipment and system for resisting wireless network flooding attack
  • Method, equipment and system for resisting wireless network flooding attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] The technical solution of the present invention can be applied to a wireless local area network (WLAN). The wireless local area network technology is based on the 802.11 media access control standard proposed by the Institute of Electrical and Electronics Engineers. (Access Point, AP for short) air interface specification between. The STA ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method, equipment and a system for resisting the wireless network flooding attack. The method for resisting the wireless network flooding attack comprises the following steps of: a first access point (AP) obtains the total target webpage address URL (uniform resource locator) number of access times of a wireless station (STA) in a first period; the ratio of the total number of access times and the period time is recorded; if the ratio is more than a preset threshold value, the first AP refuses STA to access the target URL; an identification comprising STA and a strategy execution request message of target URL is sent to an access controller (AC); therefore the AC sends an access denying message comprising the STA identification and the target URL to at least one second AP; and at least one second AP refuses the STA to access the target URL. According to the embodiment of the invention, the safety and the reliability of the access equipment of the whole network can be improved.

Description

technical field [0001] Embodiments of the present invention relate to communication technologies, and in particular to a method, device and system for resisting wireless network flooding attacks. Background technique [0002] WLAN (Wireless local area network, wireless local area network) is the product of the combination of computer network and wireless communication technology. Users can access the network anytime and anywhere through WLAN, so as to use network resources conveniently. [0003] In a WLAN, the forwarding of wireless network flood packets will directly affect the performance and security of the wireless network. The detection of flooding attacks in the prior art mainly includes: monitoring and collecting statistics on the traffic of wireless mobile terminals, when the message traffic of wireless mobile terminals exceeds a preset threshold, add wireless mobile terminals to the blacklist, and discard wireless mobile terminals to send message. [0004] In the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L29/12
CPCY02A30/00
Inventor 陈小龙李子泽
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products