Illegal wireless AP (Access Point) detection method and device

A detection method and a detection device technology, which are applied in the field of network security, can solve the problems of undetectable illegal APs and hysteresis, and achieve the effect of improving the detection rate and reducing security risks

Active Publication Date: 2017-05-31
杭州亚古科技有限公司
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The creator of the illegal AP can easily modify the MAC address of the wireless network card, and then create an illegal AP, which will cause the original technolo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Illegal wireless AP (Access Point) detection method and device
  • Illegal wireless AP (Access Point) detection method and device
  • Illegal wireless AP (Access Point) detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] figure 1 It is a flowchart of a method for detecting an illegal wireless AP provided in Embodiment 1 of the present invention.

[0061] refer to figure 1 , the illegal wireless AP detection method comprises the steps:

[0062] Step S110, scan the network environment, and obtain the current wireless access point AP according to the service distinction number;

[0063] Specifically, all surrounding APs are scanned through the Wi-Fi module supporting the monitoring mode, and a B / S (Browser / Server, browser / server) structure is adopted to display all surrounding wireless APs through the browser. The specific display information includes SSID (Service Set IDentifier, service distinction number), MAC address, device manufacturer, protection method, encryption algorithm, authentication method of surrounding wireless APs, whether to broadcast SSID, whether to enable WPS (Wi-Fi ProtectedSetup, Wi-Fi protection settings). The Wi-Fi module here is a small portable device that c...

Embodiment 2

[0078] Such as figure 2 As shown, the acquisition method of step S110 in the illegal wireless AP detection method includes the following steps:

[0079] Step S210, using the monitoring mode to scan the network environment to obtain surrounding wireless APs;

[0080] Step S220, using a B / S structure to display peripheral wireless APs through a browser;

[0081] In step S230, the surrounding wireless APs are filtered according to the service distinction number, and the current wireless APs matching the service distinction number are obtained.

[0082] Specifically, the Wi-Fi module uses monitoring mode to scan all surrounding wireless APs in the network environment, and adopts a B / S structure to display surrounding wireless APs through a browser. The specific display information includes SSID, MAC address, etc. According to the service distinction number created by the individual, such as "yidong-00", the surrounding wireless APs are filtered to get all the current wireless A...

Embodiment 3

[0084] Such as image 3 As shown, the acquisition method of step S140 in the illegal wireless AP detection method includes the following steps:

[0085] Step S310, monitoring the management frame data sent by the legitimate wireless AP to obtain attribute information;

[0086] Step S320, according to the attribute information, judge whether the change frequency of the management frame data satisfies the frequency threshold; if yes, execute step S331; if not, execute step S332;

[0087] Step S331, re-identify the legal wireless AP, and obtain the first illegal wireless AP;

[0088] Step S332, keep the legal wireless AP.

[0089] Specifically, the Wi-Fi module monitors the management frame data sent by the MAC of the legitimate wireless AP to obtain attribute information, which includes BI, SSID, and supported rate. According to the analyzed attribute information, judge whether the change frequency of the management frame data sent by the legal wireless AP is greater than a c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an illegal wireless AP (Access Point) detection method and device and relates to the technical field of network safety. The method comprises the following steps: scanning a network environment, acquiring current wireless APs according to service dot marks, judging whether the quantity of the current wireless APs is matched with the quantity of deployment scenarios or not, performing legalized setting on the current wireless APs if the two are matched, thereby obtaining legal wireless APs; analyzing change frequency of management frame data transmitted by the legal wireless APs, acquiring the first illegal wireless AP, and judging whether the quantity of the current wireless APs is more than the quantity of the deployment scenarios if the two are not matched; and screening the current wireless APs which are mismatched with the service dot marks under the condition that the quantity of the current wireless APs is more than the quantity of the deployment scenarios, thereby obtaining the second illegal wireless AP. According to the method and device provided by the invention, the detection rate of the illegal AP can be improved, and the network security risk is reduced.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an illegal wireless AP detection method and device. Background technique [0002] At present, when the existing technologies detect illegal wireless APs (Access Points, access points), they all use black and white lists for detection, mainly for the MAC (Media Access Control, Media Access Control) addresses of illegal APs that are inconsistent with legitimate APs. Condition. Alternatively, a terminal connected to a Wi-Fi (Wireless-Fidelity, wireless broadband) network is used to perform some tests to determine whether it is an illegal AP. [0003] The creator of the illegal AP can easily modify the MAC address of the wireless network card, and then create an illegal AP, which will cause the original technology to fail to detect the illegal AP. However, the method of detecting through a terminal connected to the Wi-Fi network has certain terminal restrictions and some h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12
Inventor 洪鹏喻孝斌
Owner 杭州亚古科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products