Active intrusion detection system and method for wireless mesh network
An intrusion detection system and active detection technology, applied in network topology, transmission system, wireless communication, etc., can solve problems such as node detection failure, bandwidth consumption, and difficulty in establishing a detection system
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] The present invention is an active intrusion detection system for a wireless Mesh network. The system includes a data acquisition module, an intermediate module and a system response module. The data acquisition module acquires detection data from the wireless Mesh network. The wireless Mesh network is referred to as for the network. The usual intrusion detection system is processed by the intermediate module, and then the system response module makes the result response, see the appendix figure 1 , the intermediate module of the present invention is an active detection module, and the active detection module actively sends detection information to target nodes in the network to form active detection. The entire intrusion detection system of the present invention only needs to be deployed on a mobile node in the wireless Mesh network to complete the active detection of the entire wireless Mesh network intrusion. This node is called the host node of the system, because t...
Embodiment 2
[0056] The composition and work of the active intrusion detection system of the wireless Mesh network are the same as in embodiment 1, wherein each detection rule in the detection rule submodule includes an active detection packet structure and a detection instruction group, for each specific detection process , both need to independently define the active detection packet structure and detection instruction group.
[0057] The independent definition of the active detection packet structure refers to defining the protocol set that needs to be used in the active detection process and the specific protocol to be used in the protocol set in the form of an XML file. The packet structure of the specific protocol includes pre-filled class fields and random selection Class fields, where the fields given in the form of the default binary or hexadecimal data of the field are called pre-populated class fields, and the fields given in the form of functions are called random selection clas...
Embodiment 3
[0061] The composition and work of the active intrusion detection system of the wireless Mesh network are the same as those in Embodiment 1-2. In this example, a specific protocol set dot11s is provided to illustrate the self-definition and pairing of the active detection packet structure in the detection rules of the present invention. Actively detect the masquerading process of data packets. The protocol set includes two specific protocols and their packet structures, namely dot11sdata and dot11spreq. The specific content is as follows:
[0062]
[0063]
[0064]
[0065] Among them, the fields filled in with binary or hexadecimal data as the default value are the pre-filled fields described in the claims, and the fields filled in in the form of functions are the random selection fields described in the claims; Randomly select the class field to camouflage the active detection data packet sent by the detection system to achieve the purpose of hiding the detection nod...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


