Method and system for security detection and repair of wireless network

A wireless network and security detection technology, applied in the field of security detection and repair systems, can solve problems such as home routers are easy to intrude, wireless network security is low, router firmware security loopholes, etc., and achieve the effect of curbing phishing

Active Publication Date: 2014-03-12
三六零数字安全科技集团有限公司
View PDF5 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The first is that due to the security loopholes in the router firmware, hackers can control the router through the loopholes, monitor the online behavior of all devices such as users' computers, mobile phones, and pads, wait for opportunities to steal online banking and online shopping account passwords, and even hijack users to visit phishing websites.
[0005] The second is that most users have low awareness of wireless network security, such as using the default router user name and password, using low-level encryption technology, using the default router management IP address, etc., resulting in the vast majority of home routers being easily hacked. Intrusion, thereby tampering with arbitrary settings on the router, including DNS (Domain Name System, Domain Name System) settings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for security detection and repair of wireless network
  • Method and system for security detection and repair of wireless network
  • Method and system for security detection and repair of wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] refer to figure 1 , shows a flow chart of steps of a method for security detection and repair of a wireless network according to an embodiment of the present invention, the method for security detection and repair of a wireless network may specifically include the following steps:

[0043] Step S101, the client detects the network configuration of the wireless network, and sends a security detection request to the cloud detection server. The security detection request carries the detection result of the network configuration, wherein the network configuration includes: DNS (domain name) of the WAN (wide area network) interface system), DNS for DHCP (Dynamic Host Configuration Protocol).

[0044] The WAN (Wide Area Network, wide area network) interface is the port where the network device connects to the external network. Hackers often change the DNS of the WAN interface of the network connection device to malicious DNS. Malicious DNS resolves normal URLs to phishing web...

Embodiment 2

[0053] refer to figure 2 , shows a flow chart of steps of a method for security detection and repair of a wireless network according to an embodiment of the present invention, the method for security detection and repair of a wireless network may specifically include the following steps:

[0054] Step S201, the client downloads the security level judgment rules from the cloud detection server, and saves them locally on the client.

[0055] Step S202, the client detects the network configuration of the wireless network, and sends a security detection request to the cloud detection server. The security detection request carries the detection result of the network configuration. If the communication between the client and the cloud detection server is normal, step S203 is executed. ; If the communication between the client and the cloud detection server is abnormal, execute step S204.

[0056] Wherein, the network configuration includes: the DNS of the WAN interface, the DNS of...

Embodiment 3

[0111] The following assumptions are only for describing the present invention more clearly, and do not constitute undue limitation to the protection scope of the present invention.

[0112] Assumption: the client is a Windows client, the wireless network connection device used is a TP-LINK router, the model is R860, the TP-LINK router uses the DHCP service, and the TP-LINK router uses the default management username and password , that is, the management user name and management password are both admin, the hacker tampered with the DNS of the router’s WAN interface to a malicious DNS (184.105.175.69, 66.102.253.29), and the TP-LINK router adopted WEP encrypted password authentication.

[0113] When a Windows client connects to the above router, the IP address is automatically obtained: 192.168.1.100, and the DNS server is also automatically set to (184.105.175.69, 66.102.253.29).

[0114] To ensure wireless network security, refer to Figure 4 , shows a flow chart of steps o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a system for the security detection and repair of a wireless network. The method for the security detection and repair of the wireless network comprises the following steps: detecting the network configuration of the wireless network and sending a security detection request to a cloud detection side server by a client-side, wherein the detection result of the network configuration is carried in the security detection request; determining the security grade corresponding to the wireless network of the client-side according to the detection result and set security grade judgment rules and sending the determined security grade to the client-side by the cloud detection side server, wherein the security grade judgment rules comprise: if a DNS (Domain Name Server) conforms with a first DNS security rule, the security grade of the DNS is dangerous; if the DNS conforms with a second DNS security rule, the security grade of the DNS is secure; if the DNS conforms with a third DNS security rule, the security grade of the DNS is warning; repairing the network configuration of which the determined security grade is dangerous or warning by the client-side. Through the method and the system, the security risk of the DNS is inhibited and changed.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a method for security detection and repair of a wireless network, and a system for security detection and repair of a wireless network. Background technique [0002] With the continuous popularization of wireless Internet access technology, more and more users use computers, mobile phones, Pads and other devices to access the Internet through wireless network connection devices. Among them, routers can implement functions such as addressing, route selection, segmentation / combination, store-and-forward, and packet filtering. Many families and businesses use routers to realize network interconnection. [0003] However, due to the popularity of computer security software, routers have become new targets for hackers. Once routers are hacked, users' money and privacy will face great risks. Large-scale router hacking incidents have also begun to appear in China, and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W24/04H04W12/088H04W12/122
Inventor 江爱军刘智锋李勇高祎玮
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products