Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A detection method of wlan spoofing attack based on rss

A spoofing attack and detection method technology, applied in network topology, electrical components, security devices, etc., can solve the problems of spoofing attack detection effect, multiple RSS noise values, and inability to locate the physical location of the attacker, so as to improve the attack detection rate, The effect of eliminating security threats

Active Publication Date: 2019-04-12
GUANGZHOU ZHONGCHANG KANGDA INFORMATION TECH +1
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when there are multiple attackers using the same identity to cooperate with each other to launch a spoofing attack, none of the current methods can determine the number of attackers, and further, they cannot locate the physical location of the attackers.
[0006] 3. RSS data clustering processing technology is related to the detection effect of spoofing attacks. There are still a series of problems in the application of current clustering analysis algorithms to RSS data processing. The reason is that many RSS noise values ​​are generated due to various wireless signal interferences. In the case of some outliers, large and small clusters, slight overlap between clusters, etc., most existing methods cannot produce good clustering results
[0007] Therefore, the complex WLAN application environment brings greater difficulty to WLAN attack detection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A detection method of wlan spoofing attack based on rss
  • A detection method of wlan spoofing attack based on rss
  • A detection method of wlan spoofing attack based on rss

Examples

Experimental program
Comparison scheme
Effect test

no. 2 example

[0075] figure 2 It is a flow chart of the second embodiment of the RSS-based WLAN spoofing attack detection method of the present invention, including:

[0076] S201. Deploy a beacon in the WLAN.

[0077] S202. The beacon collects the RSS data stream corresponding to each node identity in the WLAN.

[0078] S203. The beacon sequentially extracts RSS data streams corresponding to the same node identity.

[0079] S204. Perform cluster analysis on the RSS data streams corresponding to the same node identity to determine whether there is a spoofing attack in the WLAN.

[0080] S205, when it is detected that there is a spoofing attack in the WLAN, use the K-center point algorithm to sequentially increase the K value (let K=2, 3, ...), and sequentially cluster the RSS data streams corresponding to the same node identity Analyze and output the clustering results corresponding to each K value, and use the clustering evaluation algorithm to evaluate the clustering results obtained ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an RSS-based WLAN spoofing attack detection method, comprising: deploying a beacon in the WLAN; the beacon collects the RSS data stream corresponding to each node identity in the WLAN; and the beacon sequentially extracts the same node The RSS data flow corresponding to the identity; performing cluster analysis on the RSS data flow corresponding to the identity of the same node, and judging whether there is a spoofing attack behavior in the WLAN. The present invention utilizes the clustering result evaluation algorithm to effectively overcome various singular cluster distribution conditions, improve the WLAN attack detection rate, effectively detect whether there is a deception attack in the WLAN, and accurately determine the number of attackers.

Description

technical field [0001] The invention relates to the field of WLAN attack detection, in particular to an RSS-based WLAN spoofing attack detection method. Background technique [0002] The wireless local area network (WLAN) based on the IEEE 802.11 protocol has rapidly occupied the market due to its convenient network access, flexible networking, mobile portability, and low deployment cost. However, due to the openness of wireless medium transmission, attackers can monitor any transmission. In addition, attackers can easily purchase low-cost wireless devices and use many wireless tools to launch wireless attacks through war driving. Among most wireless attacks, identity-based spoofing attacks are the most common and serious. For example, in a WLAN, when a wireless node passively monitors the network, an attacker can easily collect useful MAC address and SSID information, and then execute the ifconfig command to modify the attacker’s MAC address, configure the same SSID inform...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04L29/06H04W12/122
CPCH04L63/1416H04L63/1441H04W12/12H04W84/12
Inventor 江枚元易瑰然钟奇柳毅李洪莉
Owner GUANGZHOU ZHONGCHANG KANGDA INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products