CN106131849A - The detection of a kind of rogue AP in wireless network and blocking-up method - Google Patents

The detection of a kind of rogue AP in wireless network and blocking-up method Download PDF

Info

Publication number
CN106131849A
CN106131849A CN201610463802.5A CN201610463802A CN106131849A CN 106131849 A CN106131849 A CN 106131849A CN 201610463802 A CN201610463802 A CN 201610463802A CN 106131849 A CN106131849 A CN 106131849A
Authority
CN
China
Prior art keywords
rogue
message
beacon frame
blocking
probe response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610463802.5A
Other languages
Chinese (zh)
Inventor
梁新刚
杨双汗
申伟涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Baimi Life Co Ltd
Original Assignee
Shenzhen Baimi Life Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Baimi Life Co Ltd filed Critical Shenzhen Baimi Life Co Ltd
Priority to CN201610463802.5A priority Critical patent/CN106131849A/en
Publication of CN106131849A publication Critical patent/CN106131849A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Abstract

The invention discloses detection and the blocking-up method of a kind of rogue AP in wireless network, including such as step: S1, search for and capture beacon frame and the association message of periphery AP by WIFI hot spot equipment;S2, the message after capture is resolved, whether be simultaneously rogue AP according to respective algorithms coupling, after being defined as rogue AP, it sent corresponding message and blocks.The present invention, by capturing message, analyzes message, sends blocking-up message, thus realizes the detection to rogue AP and blocking-up.

Description

The detection of a kind of rogue AP in wireless network and blocking-up method
Technical field
The present invention relates to the Network Communicate Security technical field of Netcom's equipment, be specifically related to a kind of illegal in wireless network The detection of AP and blocking-up method.
Background technology
In recent years, along with WiFi popularizing on the equipment such as mobile phone, Pad, PC, to work and the life band of people Carry out more facility, but wireless network secure problem has occurred the most therewith.Increasing is carry on these mobile terminals The information of the aspects such as people lives, entertains, work, wherein comprises substantial amounts of individual privacy even trade secret information, these information Importance self-evident.Connect owing to the information of mobile terminal the most all be unable to do without wireless network alternately, and wireless signal is Being ubiquitous in air, people naturally can produce such worry: whether my privacy can fly here along with wireless signal Fly to?Wireless network secure this how to ensure?The privacy leakage that the most wireless illegal fishing is caused is be often mentioned Individual topic, allows people talk " wireless " complexion changed, and illegal personage, by the way of one rogue AP of structure, intercepts your significant data, Owing to you are the rogue AP online using illegal personage, illegal personage can control the webpage that you are to be logged in, and entrance is in fact Being the fishing website of juridical-person scholar forgery, illegal personage can also force you to access fishing website in addition.By this method, non- Method personage can gain the individual privacy information of user, even Net silver, Alipay account and password by cheating.The most wireless illegal Hazardness is great.
If it is contemplated that a kind of detection and blocking-up method, providing relevant art for security department, providing the user safety and relaxing Suitable online environment.But the most also there is no this method.
Summary of the invention
For solving the problems referred to above, the invention provides detection and the blocking-up method of a kind of rogue AP in wireless network, logical Cross the sniff to periphery air message with resolving, therefrom find the information of illegal AP, thus realize the blocking-up to this rogue AP.
For achieving the above object, the technical scheme that the present invention takes is:
The detection of a kind of rogue AP in wireless network and blocking-up method, including such as step:
S1, search for and capture beacon frame and the association message of periphery AP by WIFI hot spot equipment;
S2, the message after capture is resolved, whether be simultaneously rogue AP according to respective algorithms coupling, be defined as rogue AP After, it is sent corresponding message and blocks.
Concrete, comprise the following steps:
Step one, by the WIFI hot spot equipment search Beacon frame of periphery AP and Probe Response frame;
Step 2, the Beacon frame received or Probe Response frame being carried out algorithmic match, specific algorithm is:
(1) whether the vendor specific field the 5th in the beacon frame that receives and Probe Response frame is judged It is 01;
(2) bssid and ssid in the beacon frame that receives and Probe Response frame message, and wireless encryption are judged Mode whether with as oneself, if vendor specific field the 5th is not 01, and bssid and ssid, Yi Jiwu Line cipher mode all with as oneself, then be judged to rogue AP.
Step 3, the data communication detected between certain client and rogue AP
Step 4, one this client of forgery are sent to the Deauthentication frame of rogue AP, and issue rogue AP, block visitor Family end and the connection of rogue AP.
Wherein, the present invention is applicable not only to WLAN hot spot equipment, applies also for particular device.As: net peace audit device, visit Measurement equipment, attack-prevention-device.
The method have the advantages that
By capturing message, analyze message, send blocking-up message, thus realize the detection to rogue AP and blocking-up.
Accompanying drawing explanation
Fig. 1 is a kind of detection of rogue AP and flow chart of blocking-up method in wireless network of the embodiment of the present invention.
Fig. 2 is a kind of detection of rogue AP and device interior tool in blocking-up method in wireless network of the embodiment of the present invention Body flow chart.
Fig. 3 is a kind of detection of rogue AP and message mechanism flow chart in blocking-up method in wireless network of the present invention.
Detailed description of the invention
In order to make objects and advantages of the present invention clearer, below in conjunction with embodiment, the present invention is carried out the most in detail Explanation.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
As it is shown in figure 1, embodiments provide detection and the blocking-up method of a kind of rogue AP in wireless network, bag Include such as step:
S1, search for and capture beacon frame and the association message of periphery AP by WIFI hot spot equipment;
S2, the message after capture is resolved, whether be simultaneously rogue AP according to respective algorithms coupling, be defined as rogue AP After, it is sent corresponding message and blocks.
As described in Fig. 2-Fig. 3, comprise the following steps:
Step one, by the WIFI hot spot equipment search Beacon frame of periphery AP and Probe Response frame;
Step 2, the Beacon frame received or Probe Response frame being carried out algorithmic match, specific algorithm is:
(1) whether the vendor specific field the 5th in the beacon frame that receives and Probe Response frame is judged It is 01;
(2) bssid and ssid in the beacon frame that receives and Probe Response frame message, and wireless encryption are judged Mode whether with as oneself, if vendor specific field the 5th is not 01, and bssid and ssid, Yi Jiwu Line cipher mode all with as oneself, then be judged to rogue AP.
Step 3, the data communication detected between certain client and rogue AP
Step 4, one this client of forgery are sent to the Deauthentication frame of rogue AP, and issue rogue AP, block visitor Family end and the connection of rogue AP.
Embodiment 1
Step one, the Beacon frame being pacified audit device search periphery AP by net and Probe Response frame;
Step 2, the Beacon frame received or Probe Response frame being carried out algorithmic match, specific algorithm is:
(1) whether the vendor specific field the 5th in the beacon frame that receives and Probe Response frame is judged It is 01;
(2) bssid and ssid in the beacon frame that receives and Probe Response frame message, and wireless encryption are judged Mode whether with as oneself, if vendor specific field the 5th is not 01, and bssid and ssid, Yi Jiwu Line cipher mode all with as oneself, then be judged to rogue AP.
Step 3, the data communication detected between certain client and rogue AP
Step 4, one this client of forgery are sent to the Deauthentication frame of rogue AP, and issue rogue AP, block visitor Family end and the connection of rogue AP.
Embodiment 2
Step one, by the detecting devices search Beacon frame of periphery AP and Probe Response frame;
Step 2, the Beacon frame received or Probe Response frame being carried out algorithmic match, specific algorithm is:
(1) whether the vendor specific field the 5th in the beacon frame that receives and Probe Response frame is judged It is 01;
(2) bssid and ssid in the beacon frame that receives and Probe Response frame message, and wireless encryption are judged Mode whether with as oneself, if vendor specific field the 5th is not 01, and bssid and ssid, Yi Jiwu Line cipher mode all with as oneself, then be judged to rogue AP.
Step 3, the data communication detected between certain client and rogue AP
Step 4, one this client of forgery are sent to the Deauthentication frame of rogue AP, and issue rogue AP, block visitor Family end and the connection of rogue AP.
Embodiment 3
Step one, by the attack-prevention-device search Beacon frame of periphery AP and Probe Response frame;
Step 2, the Beacon frame received or Probe Response frame being carried out algorithmic match, specific algorithm is:
(1) whether the vendor specific field the 5th in the beacon frame that receives and Probe Response frame is judged It is 01;(2) bssid and ssid in the beacon frame that receives and Probe Response frame message, and wireless encryption are judged Mode whether with as oneself, if vendor specific field the 5th is not 01, and bssid and ssid, Yi Jiwu Line cipher mode all with as oneself, then be judged to rogue AP.
Step 3, the data communication detected between certain client and rogue AP
Step 4, one this client of forgery are sent to the Deauthentication frame of rogue AP, and issue rogue AP, block visitor Family end and the connection of rogue AP.
The above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art For Yuan, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, these improvements and modifications also should It is considered as protection scope of the present invention.

Claims (2)

1. the detection being used for rogue AP in wireless network and blocking-up method, it is characterised in that include such as step:
S1, search for and capture beacon frame and the association message of periphery AP by WIFI hot spot equipment;
S2, the message after capture is resolved, whether be simultaneously rogue AP according to respective algorithms coupling, be defined as rogue AP After, it is sent corresponding message and blocks.
The detection of rogue AP the most according to claim 1 and blocking-up method, it is characterised in that comprise the following steps:
Step one, by the WIFI hot spot equipment search Beacon frame of periphery AP and Probe Response frame;
Step 2, the Beacon frame received or Probe Response frame being carried out algorithmic match, specific algorithm is:
(1) whether the vendor specific field the 5th in the beacon frame that receives and Probe Response frame is judged It is 01;
(2) bssid and ssid in the beacon frame that receives and Probe Response frame message, and wireless encryption side are judged Formula whether with as oneself, if vendor specific field the 5th is not 01, and bssid and ssid and wireless Cipher mode all with as oneself, then be judged to rogue AP.
Step 3, the data communication detected between certain client and rogue AP
Step 4, one this client of forgery are sent to the Deauthentication frame of rogue AP, and issue rogue AP, block visitor Family end and the connection of rogue AP.
CN201610463802.5A 2016-06-23 2016-06-23 The detection of a kind of rogue AP in wireless network and blocking-up method Pending CN106131849A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610463802.5A CN106131849A (en) 2016-06-23 2016-06-23 The detection of a kind of rogue AP in wireless network and blocking-up method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610463802.5A CN106131849A (en) 2016-06-23 2016-06-23 The detection of a kind of rogue AP in wireless network and blocking-up method

Publications (1)

Publication Number Publication Date
CN106131849A true CN106131849A (en) 2016-11-16

Family

ID=57268085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610463802.5A Pending CN106131849A (en) 2016-06-23 2016-06-23 The detection of a kind of rogue AP in wireless network and blocking-up method

Country Status (1)

Country Link
CN (1) CN106131849A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106921460A (en) * 2017-02-23 2017-07-04 武汉虹旭信息技术有限责任公司 Signal shielding system and method based on wireless network
CN108134996A (en) * 2017-12-22 2018-06-08 成都飞鱼星科技股份有限公司 A kind of detection of illegal wireless access point and blocking-up method
CN108173978A (en) * 2017-11-23 2018-06-15 浙江大学 Unmanned plane detection method based on smart machine parsing Wi-Fi MAC Address
CN108696482A (en) * 2017-04-07 2018-10-23 武汉安天信息技术有限责任公司 A kind of method and device blocking Wi-Fi malicious attacks

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014378A (en) * 2010-11-29 2011-04-13 北京星网锐捷网络技术有限公司 Method and system for detecting rogue access point device and access point device
CN105430651A (en) * 2015-11-02 2016-03-23 上海斐讯数据通信技术有限公司 Method and system used for detecting illegal wireless access points
CN105657713A (en) * 2016-03-25 2016-06-08 珠海网博信息科技股份有限公司 False-AP detecting and blocking method, wireless device and router

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102014378A (en) * 2010-11-29 2011-04-13 北京星网锐捷网络技术有限公司 Method and system for detecting rogue access point device and access point device
CN105430651A (en) * 2015-11-02 2016-03-23 上海斐讯数据通信技术有限公司 Method and system used for detecting illegal wireless access points
CN105657713A (en) * 2016-03-25 2016-06-08 珠海网博信息科技股份有限公司 False-AP detecting and blocking method, wireless device and router

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
崔鹏: "简析BYOD时代的wi-fi信息泄露风险", 《保密科学技术》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106921460A (en) * 2017-02-23 2017-07-04 武汉虹旭信息技术有限责任公司 Signal shielding system and method based on wireless network
CN108696482A (en) * 2017-04-07 2018-10-23 武汉安天信息技术有限责任公司 A kind of method and device blocking Wi-Fi malicious attacks
CN108173978A (en) * 2017-11-23 2018-06-15 浙江大学 Unmanned plane detection method based on smart machine parsing Wi-Fi MAC Address
CN108134996A (en) * 2017-12-22 2018-06-08 成都飞鱼星科技股份有限公司 A kind of detection of illegal wireless access point and blocking-up method

Similar Documents

Publication Publication Date Title
JP5454574B2 (en) Communication apparatus and secret information sharing method
CN106131849A (en) The detection of a kind of rogue AP in wireless network and blocking-up method
CN107197456B (en) Detection method and detection device for identifying pseudo AP (access point) based on client
WO2014113073A1 (en) Device-to-device discovery with direct radio signals
JP2016519451A5 (en)
CN110069229B (en) Screen sharing method, mobile terminal and computer readable storage medium
CN103763695B (en) Method for evaluating safety of internet of things
TWM483988U (en) Integrated bluetooth and NFC with image transmission that access control system
KR20190087206A (en) An electronic device providing call continuity in a weak signal environment and control method thereof
US10111095B2 (en) Caching a pairwise master key for dropped wireless local area network (WLAN) connections to prevent re-authentication
CN105915336A (en) Object cooperative decryption method and device thereof
Abedi et al. WiFi Says" Hi!" Back to Strangers!
Beyer et al. Pattern-of-life modeling in smart homes
CN107734528A (en) Wireless network detection method, device, storage medium and terminal
US20120315886A1 (en) Method and communication device for assisting mobile data offloading and mobile device
KR101764127B1 (en) The smart water leakage prevention system processed remote control and the way to make
Tchakounté et al. Recognizing illegitimate access points based on static features: A case study in a campus WiFi network
CN106937289B (en) Network access method and electronic equipment
JP7459548B2 (en) Number of people estimation system, number of people estimation device, number of people estimation method, and number of people estimation program
CN106358182A (en) Communication method and communication equipment
WO2014030105A3 (en) Wireless communication system and method
JP6318640B2 (en) Wireless connection apparatus, method for controlling wireless connection apparatus, and network system
Nazerian et al. Passive iot device fingerprinting using wifi
Patrikakis et al. A method for measuring urban space density of people and deliver notification, with respect to privacy
CN109672759A (en) The MAC Address detection method of WiFi equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161116

RJ01 Rejection of invention patent application after publication