Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data stealing identification system applied to wireless local area network and use method thereof

A wireless local area network and identification system technology, applied in the field of data security design, can solve the problems of inability to effectively detect ARP spoofing, and the detection terminal cannot obtain spoofing information, etc., to achieve the effect of improving network security, convenient application, and improving service life.

Active Publication Date: 2021-07-16
HANGZHOU NETBANK INTERCONNECTION TECH CO LTD
View PDF17 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this case, the detection terminal is often unable to obtain spoofing information, and cannot effectively detect ARP spoofing in the LAN

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data stealing identification system applied to wireless local area network and use method thereof
  • Data stealing identification system applied to wireless local area network and use method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] Example 1, such as figure 1 As shown, the data theft identification system applied in the wireless local area network and its application method. Wireless AP (Access Point) is a very broad name. It can also be called a wireless access node, a session point or an access bridge. It not only includes a simple wireless access point, but also a wireless router or a wireless gateway. A general term for devices such as wireless bridges. In this example, the following and figure 1 Each module mentioned in , exists in the form of software, specifically, it can be code written in C language, and exists in the driver program of the wireless AP.

[0039] First, the wireless AP exists in a certain wireless network, enter S01, the mode switching step. At this time, the mode switching module sets the wireless AP to a promiscuous mode. Promiscuous mode is a network configuration mode of wireless AP. In this mode, wireless AP monitors all network data packets in the network, but doe...

Embodiment 2

[0053] Embodiment 2, different from Embodiment 1, in step S05, in addition to disconnecting the attacker, the attack prevention module will also send an update ARP cache command to each terminal in the network in the form of broadcast, so that each terminal clears the The attacker's address information in the ARP cache, and update the group temporary key GTK in the network. Updating GTK further increases the technical difficulty for attackers to try to use other technical means in the future.

[0054] Based on the above technical solution, firstly, limited identification and detection can be performed on data spoofing in the wireless local area network, especially ARP data spoofing. Secondly, the main body of the detection is the wireless AP itself, no need to add an additional independent network terminal, and the application is convenient. Third, this type of identification can effectively identify whether ARP spoofing is broadcast mode or point-to-point transmission mode, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of network communication, in particular to a data security design in a wireless network environment. According to the technical scheme, the data stealing identification system applied to the wireless local area network comprises a mode switching module used for setting a wireless AP to be in a promiscuous mode; a data packet acquisition module which is used for enabling the wireless AP to capture a data packet in the wireless local area network; and an identification module which is used for identifying whether the captured data packet contains cheating information or not by the wireless AP. According to the data stealing identification system applied to the wireless local area network and the use method of the data stealing identification system, an additional detection terminal does not need to be additionally arranged, and the gateway can effectively detect ARP broadcast spoofing and ARP fixed-point spoofing possibly existing in the network.

Description

technical field [0001] The invention relates to the field of network communication, in particular to the data security design in the wireless network environment. Background technique [0002] In a wireless local area network, the hosts in the network can connect to the external network through a wireless AP (wireless gateway). In the network, a default gateway is usually set, and all messages sent by the hosts in the network to outside the LAN will be sent to Default gateway. [0003] The ARP protocol is used in wireless network communication. ARP (Address Resolution Protocol) address resolution protocol, the purpose is to realize the conversion of IP address to MAC address. Specifically, when network hosts communicate, a certain host needs to know the location information of the target host, and the location information involves a MAC address, which is a unique identifier of the target host. The upper layer (network layer) recognizes and reads the IP address, the lower ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/121H04W12/122H04W12/0433H04L29/06H04L29/12
CPCH04L63/101H04L61/103Y02D30/70
Inventor 余宏智王书辉
Owner HANGZHOU NETBANK INTERCONNECTION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products