WLAN multi-step attack intention pre-recognition method

An identification method and intent technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as the inability to apply multi-step attack identification methods, and achieve the effect of pre-identification and efficiency improvement

Active Publication Date: 2015-10-28
ZHEJIANG UNIV CITY COLLEGE
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, the research on wired network attack planning and identification mainly focuses on the protocol packet information at the network layer and above, focusing on key fields such as IP address, port number, and application layer protocol, while WLAN data packets mainly involve the physical layer and data link Layer protocol, focusing on the content below the network layer such as MAC address, Channel channel and Beacon beacon frame, so it is impossible to directly apply the multi-step attack identification method in the field of wired network intrusion detection to the wireless network environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • WLAN multi-step attack intention pre-recognition method
  • WLAN multi-step attack intention pre-recognition method
  • WLAN multi-step attack intention pre-recognition method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The present invention will be further described below in conjunction with the accompanying drawings and embodiments. While the invention will be described in conjunction with the preferred embodiments, it will be understood that it is not intended to limit the invention to the described embodiments. On the contrary, the invention is to cover alternatives, modifications and equivalents, which may be included within the scope of the invention as defined by the appended claims.

[0051] Step 1. Construct a hierarchical attack tree

[0052] For example, using the idea of ​​hierarchical planning library proposed by Geib and Goldman to describe the two multi-step attack modes of ARP+Dauthentication Flood attack to crack WEP key and wesside-ng to crack WEP key in wireless attack, the following can be obtained: figure 2 The hierarchical planning library shown.

[0053] Among them, the arcs without arrows represent the relationship of "and", which means that the realization o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a WLAN multi-step attack intention pre-recognition method. The method includes three steps: constructing a hierarchical attack tree, generating the shortest prediction sequences and recognizing an attack intention in advance. The first step (1) of constructing a hierarchical attack tree includes constructing a hierarchical attack tree including characteristic nodes, storing wireless multi-step attack modes, describing a hierarchical relation among multi-step attack steps, and increasing the efficiency of attack intention pre-recognition. The second step (2) of generating the shortest prediction sequences includes generating the shortest prediction sequences for all the wireless multi-step attack modes by means of the constructed hierarchical attack tree, and defining the prior degree to evaluate the degree of pre-recognition. The third step (3) of recognizing an attack intention in advance includes designing a multi-step attack pre-recognition algorithm based on the shortest prediction sequences, and finally achieving on-line wireless multi-step attack intention pre-recognition. The beneficial effects of the method are that the wireless multi-step attack intention pre-recognition can be effectively achieved through generation of shortest prediction sequences of wireless multi-step attacks.

Description

technical field [0001] The invention relates to a pre-identification method, more specifically, it relates to a WLAN multi-step attack intention pre-identification method. Background technique [0002] As an important network security technology, intrusion detection and defense has been widely concerned by scholars. Various intelligent technologies such as data mining, neural network, expert system, artificial immune technology, etc. have been gradually applied to intrusion detection and defense systems. In recent years, as an important research content in the field of artificial intelligence, plan recognition (Plan Recognition) has a great correlation with intrusion detection and defense. The real attack intention of network attackers has been initially applied in intrusion detection and defense, and some research results have been obtained. [0003] In 2001, Geib and Goldman introduced the planning recognition method into the intrusion detection field for the first time, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/147H04L63/14H04L63/1416
Inventor 陈观林
Owner ZHEJIANG UNIV CITY COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products