Wireless network attack positioning method

A wireless network and positioning method technology, applied in the field of network security, can solve the problems of personal information leakage, inability to adapt to application scenarios, etc., and achieve the effect of rapid response

Active Publication Date: 2017-06-27
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In 2006, California passed a Wi-Fi Security Act, requiring network equipment manufacturers to attach instructions to their products, reminding users that using wireless networks may lead to the disclosure of personal information
Therefore, the existing wireless network positioning technology cannot adapt to the application scenario of wireless attack positioning

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless network attack positioning method
  • Wireless network attack positioning method
  • Wireless network attack positioning method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]First of all, it should be explained that the present invention relates to web page information processing technology, and is an application of computer technology in the field of Internet technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. The aforementioned software function modules include but are not limited to: attack detection module, Packet_Capture algorithm, RSSI_Computation algorithm, etc. All mentioned in the application documents of the present invention belong to this category, and the applicant will not list them one by one.

[0039] Below in conjunction w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to network security, and aims at providing a wireless network attack positioning method. Through the wireless network attack positioning method, at least three attack detection sensors are deployed in a target monitoring region, the attack detection sensors are connected with the same CEP positioning server, and an attacker in a wireless network is positioned in the target monitoring region, wherein the wireless network attack positioning method comprises the specific steps as follows: each attack detection sensor performs attack detection, and the CEP positioning server perform the attack positioning. The positioning method disclosed by the invention is fast in response, tightly combined with the attack detection process, and capable of starting positioning at once after detecting the attack; mass of historic data can be used for positioning without sending mass of data packets after detecting the attack; a positioning result with higher precision is formed by actively associating multiple attack detection sensors and synthesizing a detection result; and a rough trajectory of the attacker can be obtained by synthetically computing historic RSSI information at different time frames.

Description

technical field [0001] The invention relates to the field of network security, in particular to a wireless network attack positioning method. Background technique [0002] Wireless Local Area Network (WLAN) has been widely used because of its mobility and flexibility, and many public places provide WLAN services, such as stations, hotels, cafes, etc. However, when WLAN was first proposed, it was pointed out that there were some security flaws, mainly due to its characteristics of open transmission medium and mobile wireless devices, which made many mature and efficient security defense methods in traditional wired networks unable to be directly applied to WLAN. Therefore, although many enterprises believe that WLAN can provide convenience for their production and work, they still dare not use WLAN, or even strictly prohibit it, for fear of being attacked by illegal users and causing information leakage and destruction. In 2005, when Intel Corporation provided public WLAN se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W64/00H04L29/06
CPCH04L63/1416H04L2463/146H04W12/12H04W64/00
Inventor 范渊方黎明张小孟莫金友
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products