Wireless attack detection and defense device and method thereof

An attack detection, wireless technology, applied in wireless communication, security devices, electrical components, etc., can solve the problem of inability to distinguish whether it is a counterfeiter, legitimate client accidental injury, providing information, etc.

Active Publication Date: 2013-11-13
NEW H3C TECH CO LTD
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, when there is an attacker who fakes the client, the existing technology will not be able to distinguish whether it is a fa...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless attack detection and defense device and method thereof
  • Wireless attack detection and defense device and method thereof
  • Wireless attack detection and defense device and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to realize the object of the present invention, the present invention judges whether the attacker is a legitimate client or a counterfeiter according to attack reports sent by different wireless access points AP, and takes corresponding defense measures. Specifically, the present invention is based on whether the wireless access point AP corresponding to the attacker's source MAC address is the wireless access point AP associated with the legal client, that is to say, whether the wireless access point AP that sends the attack report is the source of the attacker The wireless access point AP corresponding to the MAC address. Then determine whether the source MAC address used by the assailant is sent to the dynamic blacklist, and determine whether the assailant Counterfeiters. Therefore, the present invention prevents the legal client from being accidentally injured.

[0045] Specifically, see figure 1, the wireless attack detection and defense device of the p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a wireless attack detection and defense device. The device is applied to a wireless access controller (AC) which is applied to management of wireless access points (APs). The device comprises a report receiving unit, a source determining unit and a dynamic operation unit. The report receiving unit is used for receiving attack reports reported by the wireless APs, reporting and determining source MAC addresses of attackers in the reports. The source determining unit is used for determining whether the APs corresponding to the source MAC addresses of the attackers are wireless APs associated with legal clients. The dynamic operation unit is used for sending the source MAC addresses used by the attackers to dynamic blacklists of the wireless APs which send the attack reports when the wireless APs corresponding to the source MAC addresses of the attackers are not wireless APs associated with legal clients. By means of the wireless attack detection and defense device, whether legal clients or counterfeiting persons send the attacks can be recognized, and corresponding defensive measures can be adopted, so that legal clients can be prevented from being accidentally injured.

Description

technical field [0001] The invention relates to wireless network technology, in particular to a wireless attack detection and defense device and method thereof. Background technique [0002] With the development of wireless network technology, wireless attack detection and defense mechanisms have become the focus of wireless network technology. The existing wireless attack detection and defense technology is to add the source MAC address of the attacker to the dynamic blacklist of the wireless access point AP that discovers the attack behavior after discovering the attack behavior from the wireless side. At the same time, force the client to go offline on the wireless controller AC. During the aging time of the dynamic blacklist, the client with this MAC address will not be able to access the network on the current wireless access point AP. [0003] Because the wireless attack detection and defense technology in the prior art only determines the attacker according to the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/08H04L29/12H04L29/06H04W12/122
Inventor 傅嘉嘉余波
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products