Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for detecting maliciousness of wireless network

A wireless network and malicious technology, applied in the field of network security, can solve problems such as threats to users' online security, poor WIFI security, and user personal information leakage

Active Publication Date: 2017-09-15
SANGFOR TECH INC
View PDF12 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the security of WIFI in public places is generally poor, and some malicious WIFI can easily lead to the leakage of users' personal information
For example, the attacker builds a malicious AP and assigns the IP address of a malicious DNS (Domain Name System, Domain Name System) proxy to the client through the DHCP (Dynamic Host Configuration Protocol) server of the malicious AP. When surfing the Internet, the malicious DNS proxy will resolve the client's domain name request to the malicious WEB proxy, and the malicious WEB proxy will implant malicious scripts into the corresponding network data packets, thereby luring users to illegal websites, and implementing illegal activities such as packet capture and sniffing, phishing, etc. The act of stealing users' personal information will lead to users inadvertently leaking personal information, which seriously threatens users' online security. At present, there is still a lack of an effective method to detect the maliciousness of WIFI

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting maliciousness of wireless network
  • Method and device for detecting maliciousness of wireless network
  • Method and device for detecting maliciousness of wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] The invention provides a method for detecting maliciousness of a wireless network.

[0048] refer to figure 1 , figure 1 It is a schematic flowchart of the first embodiment of the method for detecting maliciousness of a wireless network according to the present invention. The method comprises the steps of:

[0049] Step S10, when the mobile terminal accesses the wireless network, a domain name resolution request is sent to the DNS server through the access point of the wireless network, and the domain name resolution request carries preset domain name data;

[0050] In this embodiment, the mobile terminal includes smart phones, tablet computers, notebooks and other devices with wireless network access functions. The wireless network is WLAN (Wireless Local Area Networks, wireless local area network). Common...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting maliciousness of a wireless network. The method comprises the steps of sending a domain name resolution request to a DNS (Domain Name System) server through an access point of the wireless network when a mobile terminal accesses the wireless network, wherein the domain name resolution request carries preset domain name data; obtaining an IP address obtained by analyzing the domain name data through the DNS server, judging whether the IP address matches a preset IP address or not and recording a first judgment result; initiating a first network access request according to the IP address, judging whether a malicious script is injected into the responded first network access request or not and recording a second judgment result; and analyzing and judging the maliciousness of the wireless network according to the first judgment result and the second judgment result. The invention also discloses a device for detecting the maliciousness of the wireless network and the security of surfing the Internet through the wireless network by the user is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for detecting maliciousness of a wireless network. Background technique [0002] Supermarkets, stores, coffee shops, airports and other public places often have public wireless networks, the most commonly used of which is WIFI. Public places use one or more APs (Access Points) to achieve WIFI within a preset range coverage, providing users with a convenient Internet environment. [0003] However, the security of WIFI in public places is generally poor, and some malicious WIFI can easily lead to the leakage of users' personal information. For example, the attacker builds a malicious AP and assigns the IP address of a malicious DNS (Domain Name System, Domain Name System) proxy to the client through the DHCP (Dynamic Host Configuration Protocol) server of the malicious AP. When surfing the Internet, the malicious DNS proxy will resolve the client's do...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12H04W12/08
CPCH04L63/1466H04W12/08H04L61/4511
Inventor 王朋涛
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products