Method, apparatus and electronic device for detecting man-in-the-middle attack
A man-in-the-middle, preset time technology, applied in electrical components, transmission systems, etc., can solve problems such as difficult and effective detection of man-in-the-middle attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] A method for detecting a man-in-the-middle attack provided by an embodiment of the present invention is applied to a network monitor, such as figure 1 Shown, including:
[0048] S11: Calculate the mapping relationship between the IP address and the MAC address in the network communication within the preset time to obtain the first mapping relationship, and count the handle data of the network communication under the first mapping relationship to obtain the first handle data.
[0049] Under normal circumstances, collect and count the mapping relationship data between independent IP addresses and independent MAC addresses within a period of time through network probes, and collect and record the session handle identifier data generated when the IP address and MAC address match, Obtain a series of baselines when the IP address matches the MAC address, and the data baseline of the session handle identifier generated when the IP address matches the MAC address. The statistical dat...
Embodiment 2
[0061] A method for detecting a man-in-the-middle attack provided by an embodiment of the present invention is applied to a network monitor, such as figure 2 Shown, including:
[0062] S21: Calculate the mapping relationship between the IP address and the MAC address in the network communication within the preset time to obtain the first mapping relationship, and count the handle data of the network communication under the first mapping relationship to obtain the first handle data.
[0063] As a preferred implementation of this embodiment, the first mapping relationship is a one-to-one correspondence between each independent IP address and one MAC address.
[0064] Further, the data collection module can collect and count the mapping relationship between the IP address and the MAC address in the network communication within the preset time through the network probe. The preset time period can be one week or one month. Just make sure that this period of time is the period when networ...
Embodiment 3
[0087] An apparatus for detecting a man-in-the-middle attack provided by an embodiment of the present invention is applied to a network monitor, such as Figure 4 As shown, the device 3 for detecting a man-in-the-middle attack includes: a statistics module 31, an acquisition module 32, a comparison module 33, and a determination module 34.
[0088] Among them, the statistics module is used to count the mapping relationship between the IP address and the MAC address in the network communication within the preset time to obtain the first mapping relationship, and to count the handle data of the network communication under the first mapping relationship to obtain the first handle data.
[0089] As a preferred implementation of this embodiment, the collection module is used to collect the mapping relationship between the IP address and the MAC address in the current network communication to obtain the second mapping relationship.
[0090] Specifically, the comparison module is used to co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


