Security operation method of wireless local area network

A wireless local area network and safe operation technology, applied in the field of wireless local area network safe operation, can solve the problems of weak wireless local area network security evaluation and monitoring capabilities

Inactive Publication Date: 2015-03-11
SUZHOU DELUSEN AUTOMATION SYST
View PDF6 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] The technical problem to be solved by the present invention is to provide a safe operation method of wireless local area network, which solves the problem of weak security evaluation and monitoring ability of wireless local area network in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security operation method of wireless local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Below in conjunction with accompanying drawing, structure and working process of the present invention will be further described.

[0038] like figure 1 As shown, a method for safe operation of a wireless local area network includes the following steps:

[0039] Step 1. Perform a global scan on the wireless LAN to obtain the user names and MAC addresses of APs and clients accessing the LAN;

[0040] Step 2, monitor the running state of the client in the wireless local area network, manage the AP and the client, monitor the network configuration and usage status, detect illegal AP and client and generate an illegal user list;

[0041] Step 3, carry out cryptographic analysis to illegal AP and client, by capturing the WEB datagram of illegal AP and client, its password is cracked, obtains the key of illegal user;

[0042] Step 4. Carry out vulnerability scanning and testing on the client in the wireless local area network;

[0043] Step 5. Set up a wireless local area ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a security operation method of a wireless local area network. The security operation method comprises the following steps of firstly, obtaining an AP (Access Point) for visiting the local area network as well as a user name and an MAC (Media Access Control) address of a client; secondly, monitoring the running state of the client in the wireless local area network, managing the AP and the client and monitoring the network configuration and the use state; thirdly, carrying out cryptanalysis on the illegal AP and the client and cracking a password through capturing WEB datagrams of the illegal AP and the client; fourthly, carrying out vulnerability scanning and testing on the client in the wireless local area network; and lastly, arranging a security operation project of the wireless local area network. According to the security operation method, the running state of the 802.11b wireless local area network is automatically detected and monitored, the existing security vulnerabilities are searched and analyzed, a security evaluation report and an aid decision making report of the wireless local area network are given, and the functions of scanning detection, key analysis, vulnerability correlation, security evaluation and the like of the wireless local area network based on a 802.11 protocol are achieved.

Description

technical field [0001] The invention belongs to the field of local area network security, and in particular relates to a method for safe operation of a wireless local area network. Background technique [0002] Wireless networks are growing at an astonishing rate. At the beginning of the commercialization of the Internet, network security issues were not considered too much during network interconnection. However, with the rapid development of the network, when more and more resources are exposed on the Internet, for wireless local area networks in an open environment, due to the inherent characteristics of wireless transmission itself and the lack of wireless network technology standards The network security problem brought by the network is becoming more and more prominent, and its security problem is even more worrying when it is used as an expansion of the wired network. [0003] Overall, the security issues in wireless network environments are much more serious than in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W84/12
CPCH04W12/12H04W84/12
Inventor 徐花肖亚韪张静雅
Owner SUZHOU DELUSEN AUTOMATION SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products