Check patentability & draft patents in minutes with Patsnap Eureka AI!

Wireless phishing access point detection method based on authentication

A wireless access point and detection method technology, applied in the field of network security, can solve problems such as complex settings, short attack duration, high network construction and maintenance costs, and achieve the effect of low cost and reduced detection and processing costs

Active Publication Date: 2016-07-20
SHANGHAI JIAO TONG UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the technology is complicated to set up and takes up a lot of system resources
Specifically: first, this technology needs to configure a wireless controller for each wireless AP, the cost of network construction and maintenance is high, and the deployment is difficult
Second, the time and location of phishing access points in the wireless network are highly uncertain, and the attack duration is short. However, this technology requires all-round and all-weather scanning in an environment covering legal wireless network services. Great unnecessary consumption of system resources
Third, one of the conditions for a successful phishing attack on a wireless network is that the victim client is in an environment where the signal strength of the phishing access point is higher than that of a legally authorized wireless AP. Set up phishing access points in weak (or no signal) places. The effective scanning range of the wireless AP itself is limited, and generally cannot cover beyond the effective range of its wireless signal strength. This technology may have identification blind spots

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless phishing access point detection method based on authentication
  • Wireless phishing access point detection method based on authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0019] In this embodiment, at first set up in the network the authentication server 1 that is used to store the routing node information database of all legal wireless access points, then the authentication server 1 sends the routing node information of the client 4 according to the authentication request of the client 4 Perform matching authentication with the routing node information in the database, and finally send the matching authentication result to the client 4 . The routing node information includes the IP addresses and the number of nodes through which the message arrives at the authentication server 1 .

[0020] Deploy the authentication server 1 in the WLAN, and use the difference in routing node information between the client 4 connected to the legitimate access point 2 and the client 4 connected to the phishing access point 3 to the authentication server 1 to provide the user Identify whether the wireless access point currently connected to the user is an illegal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A wireless phishing access point detection method based on authentication is provided. The method comprises following steps: first, setting up an authentication server which is used for storing a routing node information database of all valid wireless access points; then the authentication server performing authentication by matching routing node information of a client side with the routing node information in the database according to an authentication request from the client side; finally, sending a matching authentication result to the client side. By means of the method, immediate check is realized when accessing a network, wireless phishing access points can be effectively identified, the detection and processing cost are reduced, and normal service traffic is not influenced. The method has practicability and low cost.

Description

technical field [0001] The invention relates to a technology in the field of network security, in particular to an authentication-based wireless phishing access point detection method. Background technique [0002] With the large-scale deployment of wireless access points (APs) in urban public places, wireless phishing access points have become a serious threat in wireless networks. A wireless phishing access point attack refers to an attacker setting up a disguised wireless access point in a public place, that is, a phishing access point, and setting the same service set identifier (SSID) as the real AP, so that the victim mistakenly connects to the wireless phishing access point. Access point, further attacks such as stealing passwords and personal sensitive information. A wireless phishing access point is defined as an illegal access point, which is not set up by the WLAN operator or administrator. Usually, the attacker connects the host device to a legally authorized o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04W12/122
CPCH04W12/12
Inventor 易平陈郑珊吴越邹福泰
Owner SHANGHAI JIAO TONG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More