Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and equipment for detecting man-in-the-middle attack by user equipment

A technology of user equipment and man-in-the-middle, applied in the field of communication, can solve problems such as user communication dangerous network environment, achieve the effects of shortening the waiting time for TCP response, accurate identification of attacks, and wide application range

Active Publication Date: 2018-11-06
上海尚往网络科技有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The "man-in-the-middle" computer will forward frame data packets between two destination hosts communicating with each other, and the two destination hosts are unaware of this, which puts user communications in a dangerous network environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The application will be described in further detail below in conjunction with the accompanying drawings.

[0031] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0032] Memory may include non-permanent storage in computer readable media, in the form of random access memory (RAM) and / or nonvolatile memory such as read only memory (ROM) or flash RAM. Memory is an example of computer readable media.

[0033] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The purpose of the invention is to provide a method for detecting man-in-the-middle attack by user equipment. The method comprises the following steps: transmitting a plurality of corresponding TCP (Transmission Control Protocol) handshake requests to a plurality of random IP (Internet Protocol) addresses; determining TCP handshake success count corresponding to the corresponding TCP handshake requests according to whether the corresponding TCP handshake requests succeed in preset time; and determining whether man-in-the-middle attack does not exist or not in a current network of the user equipment if the TCP handshake success count is less than or equal to a TCP handshake success threshold. According to the method disclosed by the invention, SSLSniff man-in-the-middle attack, SSLStrip man-in-the-middle attack and website distortion man-in-the-middle attack in the man-in-the-middle attack can be actively detected, the coverage area is wide, the man-in-the-middle attack is rapidly recognized, the user waiting time is greatly shortened, and the user side can conveniently take corresponding defensive measures in the shortest time.

Description

technical field [0001] The present application relates to the communication field, and in particular to a technology for detecting man-in-the-middle attacks through user equipment. Background technique [0002] The rapid development of the network has brought convenience to human life, but it has also put forward higher requirements for network security. The network can be said to be a double-edged sword. In terms of network security, MITM (Man-in-the-Middle) attack has long been an ancient attack method commonly used by hackers, and it still has great room for expansion until today. [0003] Man-in-the-Middle Attack ("MITM attack") is an "indirect" intrusion attack. This attack mode is to place a computer controlled by the intruder virtually in the Between two communicating computers in a network connection, this computer is called a "middleman". The "man-in-the-middle" computer will forward frame data packets between two destination hosts communicating with each other, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1441H04L67/02
Inventor 高迪
Owner 上海尚往网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products