Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for discovering a fake mac group

A discovery method and MAC address technology, applied in the field of discovery of fake MAC groups, can solve problems such as complex login behavior, inability to detect fake MAC addresses, loss of effect, etc.

Active Publication Date: 2022-02-11
SHANGHAI GUAN AN INFORMATION TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the existing abnormal login checks are mostly based on whether the IP is legal, the geographical location of the IP, and the user's login behavior, when criminals modify the IP continuously and the login behavior is complicated, the existing methods will lose their due Effect
[0004] Therefore, the prior art has the technical problem of being unable to detect forged MAC addresses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for discovering a fake mac group
  • A method and device for discovering a fake mac group

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] figure 1 A schematic flowchart of a method for discovering a fake MAC group provided by an embodiment of the present invention, such as figure 1 As shown, the method includes:

[0047] S101: For each to-be-identified MAC address in the to-be-identified MAC address set, divide the to-be-identified MAC address into at least two character strings; combine the to-be-identified MAC addresses in pairs to obtain a MAC address pair.

[0048] Define the length of the time window according to the requirements of the scenario, and obtain the list of MAC addresses to be identified of the logged-in users within the time window, and then divide each MAC address to be identified in bytes to obtain the corresponding MAC address to be identified. character of. It should be emphasized that a string can contain one character, or two or more characters.

[0049] The MAC address is represented in binary in the computer, with a length of 48 bits, that is, 6 bytes, which is usually express...

Embodiment 2

[0077] figure 2 A schematic structural diagram of a device for discovering forged MAC groups provided by an embodiment of the present invention, such as figure 2 As shown, the device includes:

[0078] The segmentation module 201 is configured to divide the to-be-recognized MAC address into at least two character strings for each to-be-recognized MAC address in the to-be-recognized MAC address set; combine the to-be-recognized MAC addresses to obtain a pair of MAC addresses;

[0079] a first obtaining module 202, configured to obtain the distance between the MAC addresses included in the MAC address pair;

[0080] The screening module 203 is configured to screen out the MAC address pairs whose distance between addresses is less than the first preset threshold, take the MAC addresses in the MAC address pairs as nodes of the relational graph, and draw edges between the MAC address pairs to obtain the initial relational graph ;

[0081] The second obtaining module 204 is con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present invention provides a method and device for discovering a fake MAC group, the method comprising: for each unidentified MAC address in the unidentified MAC address set, dividing the unidentified MAC address into at least two character strings; Combine the MAC addresses to be identified in pairs to obtain a MAC address pair; obtain the distance between the MAC addresses included in the MAC address pair; filter out the MAC address pairs whose distance between the addresses is smaller than the first preset threshold, and center the MAC addresses The MAC address of the MAC address is used as a node in the relationship graph, and an edge is made between the MAC address pairs to obtain an initial relationship graph; a sub-connected graph whose number of vertices is greater than a second preset threshold is obtained from the initial relationship graph, and the corresponding sub-connected graph MAC addresses are used as a group of forged MAC addresses. Applying the embodiment of the present invention can solve the technical problem that the prior art cannot identify forged MAC addresses.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for discovering forged MAC groups. Background technique [0002] When users use the clients of various network platforms, they need to log in through hardware such as mobile phones, computers, and tablet computers. The server identifies and records information such as IP (Internet Protocol, Internet Protocol) address, MAC (Media Access Control Address, media access control address) of the logged-in client to ensure that data can be exchanged correctly. [0003] At present, the existing technology mainly identifies abnormal users through IP and user behavior after login. If the criminals have a clear target and have detailed account information and operation targets, they can bypass the existing security configuration. Considering that a large number of accounts may be required to log in, criminals may generate MAC addresses in batches through certain rules and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L101/622
CPCH04L63/0876H04L63/0815H04L63/1416H04L2101/622
Inventor 余贤喆梁淑云刘胜马影陶景龙王启凡魏国富徐明殷钱安周晓勇
Owner SHANGHAI GUAN AN INFORMATION TECH