Unlock instant, AI-driven research and patent intelligence for your innovation.

Detection method and detection apparatus for identifying pseudo AP based on client

A detection method and client technology, applied in security devices, electrical components, wireless communications, etc., can solve problems such as time-consuming, difficult, and limited wireless user resources, and achieve the effect of protecting user privacy and maintaining network security

Active Publication Date: 2017-09-22
OCEAN UNIV OF CHINA
View PDF9 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this administrator-based detection method is costly, expensive, and time-consuming. Most importantly, it cannot detect wireless network security for mobile terminals in real time. Users who lack professional knowledge and security awareness are easily attacked by evil twins. lead to serious consequences
The detection method of user-based evil twin attacks is to help wireless users detect whether there are evil twin attacks in the wireless network, but wireless user resources are limited and there is no authorization list, so it is very inappropriate to design a user-based method to detect evil twin attacks Easy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and detection apparatus for identifying pseudo AP based on client
  • Detection method and detection apparatus for identifying pseudo AP based on client
  • Detection method and detection apparatus for identifying pseudo AP based on client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to facilitate the understanding of the embodiments of the present invention, several specific embodiments will be taken as examples for further explanation below in conjunction with the accompanying drawings, and each embodiment does not constitute a limitation to the embodiments of the present invention.

[0041] Such as figure 1As shown, a client-based detection method for identifying false APs specifically includes:

[0042] Step S110, judging whether the wireless network environment to be detected contains multiple APs with the same SSID, and if so, judging that the AP is a suspicious AP.

[0043] Specifically, it is determined whether the wireless network environment to be detected contains multiple APs with the same SSID. If not, it indicates that there is no phishing risk in the wireless network environment to be detected, and the user can safely access any AP; Suspicious APs exist in the wireless network environment to be detected. When a user accesses...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a detection method for identifying a pseudo AP based on a client. The detection method comprises the following steps: judging whether a to-be-detected wireless network environment contains a plurality of APs having the same SSID, and if so, determining that the APs as suspicious APs; obtaining data frames of the suspicious APs, comprising obtaining the number of data frames sent by a first suspicious AP to each user within each specified time within a monitoring time, and obtaining a total number of data frames sent by a second suspicious AP to all users connected with the second suspicious AP within each specified time; and separately calculating the similarity between each data frame number of the first suspicious AP and the total number of the data frames of the second suspicious AP, and if the similarly exceeds a preset threshold, judging that the second suspicious AP is the pseudo AP. According to the detection method provided by the invention, a user can independently detect the attack of the pseudo AP in the wireless local area network so as to achieve the purposes of maintaining the network security and protecting the user privacy, and the detection method provided by the invention can realize real-time detection in different wireless network environments.

Description

technical field [0001] The invention relates to the fields of network security, wireless communication, etc., and in particular to a client-based detection method and detection device for identifying fake APs. Background technique [0002] Compared with wired networks, 802.11-based WLANs have been widely deployed and used because of the advantages of wireless local area networks (WLANs), such as flexibility, mobility, scalability, and ease of installation. Wireless users can easily use Wi-Fi access points (APs) to connect mobile terminals such as smartphones, tablets, and laptops to the Internet in places such as homes, hotels, cafes, offices, airports, and shopping malls. It uses radio waves to provide communication between the AP and the user's devices such as smartphones, laptops, etc. [0003] However, when we conveniently use WLAN to access Internet resources, it also brings huge security risks to users. At present, the common wireless network attack methods are as fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/08H04W12/12H04W84/12H04W88/08
CPCH04W12/00H04W12/08H04W12/12H04W84/12H04W88/08
Inventor 曲海鹏卢倩庄园林喜军王涛
Owner OCEAN UNIV OF CHINA