Wireless multi-step attack mode excavation method for WLAN
A pattern mining and wireless technology, applied in electrical components, transmission systems, etc., can solve the problems of ineffective WLAN wireless network environment and inability to accurately identify WLAN wireless multi-step attack patterns.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0059] The present invention will be further described below in conjunction with the accompanying drawings and embodiments. While the invention will be described in conjunction with the preferred embodiments, it will be understood that it is not intended to limit the invention to the described embodiments. On the contrary, the invention is to cover alternatives, modifications and equivalents, which may be included within the scope of the invention as defined by the appended claims.
[0060] The embodiment of the present invention relates to a WLAN-oriented wireless multi-step attack pattern mining method. The specific implementation steps are as follows:
[0061] Step 1. Construct a global attack library
[0062] For example, the MAC address of an AP in a WLAN is 00:B0:0C:01:3C:C0, and all alarms containing this MAC address in the source MAC address set or destination MAC address set are sorted in chronological order, and the AP can be obtained For the sake of simplicity, t...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com