Unlock instant, AI-driven research and patent intelligence for your innovation.

Analysis method and system of Security Vulnerability of wireless network

A wireless network and vulnerability analysis technology, applied in the field of mobile sensors, can solve problems such as the difficulty of immediately applying security regulations and the difficulty of knowing vulnerabilities, and achieve the effect of eliminating inspection loopholes and improving security awareness

Inactive Publication Date: 2019-03-29
NOMA
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this wireless network integrated security system has the effect of eliminating the need to build a separate system by integrating the wireless authentication system and the wireless intrusion prevention system, but it is difficult to verify unauthorized access points (APs) that access the wireless network at any time. , and it is difficult to know the problem of vulnerabilities before they are attacked
Furthermore, in the process of judging non-approved access points (APs) connected to wireless networks, it is difficult to immediately apply increasingly strengthened and various security regulations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Analysis method and system of Security Vulnerability of wireless network
  • Analysis method and system of Security Vulnerability of wireless network
  • Analysis method and system of Security Vulnerability of wireless network

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0045] The mobile sensor 201 perceives an access point (AP) connected to a wireless network whose vulnerability is to be analyzed, and acquires AP information of the perceived access point (AP). Here, the AP information includes a unique identifier used for communication, an encryption algorithm type, a channel, and / or information of a communication service provider.

[0046] The mobile sensor 201 classifies the types of perceived access points (APs) based on the unique identifiers, respectively.

[0047] The motion sensor 201 may, for example, refer to the AP type list to classify the types of access points (APs).

[0048] Types of access points (APs) can be distinguished, for example, as hardware type, virtual AP type, mobile AP, or wireless device. As defined in the security policy related to an embodiment of the present invention, when judging the security level of the hardware type and the virtual AP type, it is set to a better level than the mobile AP or the wireless eg...

no. 2 example

[0064] The mobile sensor 201 perceives an access point (AP) connected to a wireless network whose vulnerability is to be analyzed, and acquires AP information of the perceived access point (AP). Here, the AP information includes a unique identifier used for communication, an encryption algorithm type, a channel, and / or information of a communication service provider.

[0065] Thereafter, the mobile sensor 201 transmits the acquired AP information to the server 100 .

[0066] The server 100 classifies types of access points (APs), respectively, based on unique identifiers included in the AP information received from the mobile sensor 201 . The motion sensor 201 may, for example, classify types of access points (APs) with reference to an AP type list.

[0067] The server 100 judges whether the access point (AP) is an approved access point (AP) or an unapproved access point (AP). For example, the server 100 can determine whether an access point (AP) is an approved AP or an unap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

According to an embodiment, a wireless network vulnerability analysis method is provided, which includes the steps of: classifying types of APs of a wireless network accessing vulnerability to be analyzed based on an inherent identifier included in access point (AP) information; determining whether the access point (AP) is an approved access point (AP) or a non-authorized access point (AP) or not;and based on the first security policy, determining of the safety level of the access point of the non-authorized access point (AP), wherein the first safety policy at least considers the type and the form of the encryption algorithm included in the AP information and defines the safety level.

Description

technical field [0001] The invention relates to a wireless network vulnerability analysis method and system and a mobile sensor used therein. Background technique [0002] Compared with the wired network environment, the wireless network environment has many loopholes, and various technologies for improving the loopholes have been applied. [0003] For example, the following patent document 1 relates to a wireless network integrated security system, which includes a security server for performing permission and security processing for accessing a wireless network of a specific domain architecture; more than one access point (AP: Access Point), used to transfer the information of the user terminal trying to access the wireless network to the security server; the sensor, used to detect the communication information between the user terminal and the access point or between the access point and the security server and send the information to the security server transmission; th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04W12/12
CPCH04L63/1433H04L63/205H04W12/12H04L63/105H04W88/08H04W12/08H04W8/22
Inventor 郑现哲
Owner NOMA