Multi-model pseudo AP detection method and device based on bidirectional SYN reflection
A detection method and reflection detection technology, which are applied in the field of communication security, can solve the problems of judging the type of phishing APs without a solution, identifying obstacles to the attack types of phishing APs, etc., and achieve the effect of maintaining network security and protecting user privacy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] Such as figure 1 As shown, the multi-model false AP detection method based on two-way SYN reflection includes:
[0042] Step S110, judging whether the AP detection set designated by the user has two or more APs with the same SSID, and if so, judging that the AP is a target AP.
[0043] Specifically, it is determined whether the wireless network environment to be detected contains two or more APs with the same SSID, if not, it indicates that there is no phishing risk in the wireless network environment to be detected, and the user can safely access any AP; If yes, it means that there is a suspicious AP in the wireless network environment to be detected. When the user accesses the suspicious AP, there will be a phishing risk, and further judgment is required to confirm whether the user can access it.
[0044] As an embodiment of the present invention, the Wi-Fi corresponding to the AP specified by the user is the detection range specified by the user according to the req...
Embodiment 2
[0065] see figure 2 As shown, the present invention provides the detection device of the multi-model false AP based on two-way SYN reflection, comprising:
[0066] The selection module is used to screen whether the AP detection set specified by the user has two or more APs with the same SSID, and if so, then determine that the AP is a target AP;
[0067] The reflection module is used to perform two-way SYN reflection detection, including constructing a SYN handshake packet to perform forward SYN reflection detection, and constructing a SYN handshake packet to perform reverse SYN reflection detection;
[0068] The judging module is used to judge whether there is a phishing AP attack and an attack model in the target network according to the situation of the received SYN-ACK packet. If two expected SYN-ACK packets are received, it is determined that the target AP is a legitimate AP. If only one expected SYN-ACK packet is received, it is determined that there is a serial phishi...
Embodiment 3
[0071] see image 3 As shown, the present invention also provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the following steps are implemented:
[0072] First, through the selection module, the client selects the Wi-Fi to be connected or the Wi-Fi to be detected, and generates a valid set of APs to be detected. A valid AP to be detected refers to a different AP with the same SSID, that is, a target AP (suspect AP).
[0073] Then, through the reflection module, the two-way SYN reflection detection is performed. This step specifically includes three operations.
[0074] First, connect two network cards to two suspicious APs and obtain IP addresses.
[0075] Second, NIC one performs forward SYN reflection detection. At the same time, network card two sniffs whether a correct SYN-ACK packet arrives at network card two.
[0076] Third, network card two performs reverse SYN reflection det...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


