CN106454847A - Method and device for detecting phishing risk of public WiFi - Google Patents

Method and device for detecting phishing risk of public WiFi Download PDF

Info

Publication number
CN106454847A
CN106454847A CN201611191620.3A CN201611191620A CN106454847A CN 106454847 A CN106454847 A CN 106454847A CN 201611191620 A CN201611191620 A CN 201611191620A CN 106454847 A CN106454847 A CN 106454847A
Authority
CN
China
Prior art keywords
mac
information
destination
safe
mac information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611191620.3A
Other languages
Chinese (zh)
Inventor
张建新
高永岗
刘天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201611191620.3A priority Critical patent/CN106454847A/en
Publication of CN106454847A publication Critical patent/CN106454847A/en
Priority to PCT/CN2017/117690 priority patent/WO2018113728A1/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Abstract

The embodiment of the invention provides a method and a device for detecting a phishing risk of a public WiFi, used for achieving the technical effect of detecting the phishing risk of the public WiFi without depending on additional hardware deployment. The method comprises the steps of acquiring information by detecting a wireless access point (AP) of the public wireless-fidelity (WiFi) by using user equipment, wherein the acquired information comprises a target service set identifier (SSID) of the AP and target media access control (MAC) information of the AP; judging whether the target MAC information is accordant with one piece of security MAC information corresponding to the target SSID recorded by a MAC information reference library based on the pre-stored MAC information reference library, wherein the target SSID corresponds to one or more pieces of security MAC information; and determining that the public WiFi has the phishing risk, when the target MAC information is not accordant with any piece of security MAC information corresponding to the target SSID recorded by the MAC information reference library.

Description

A kind of detection method of public WiFi fishing risk and device
Technical field
The present invention relates to field of computer technology, the detection method of more particularly, to a kind of public WiFi fishing risk and dress Put.
Background technology
Increase with public WiFi (Wireless Fidelity, WIreless-FIdelity) quantity and popularization, the peace of public WiFi It is increasingly severeer that full problem also becomes.According to statistics, current 66% public WiFi is not safe.The lawless person WiFi that will go fishing imitates Cause public WiFi, cause user access fishing WiFi after property and privacy impaired.
In the related, for the fishing risk of public WiFi, a kind of solution is to dispose within the specific limits WIDS (wireless invasive detects, Wireless Intrusion Detection Systems) testing equipment, using WIDS detection Equipment is detecting the fishing WiFi in coverage.
However, above-mentioned detection is gone fishing, the mode of risk has to rely on equipment for surfing the net (as user equipment, gateway device, service Device etc.) beyond hardware deployment (i.e. WIDS testing equipment) just enable.
Content of the invention
Embodiments provide a kind of detection method of public WiFi fishing risk and device, for realizing being independent of Additional hardware is disposed and public WiFi is carried out with the technique effect of risk supervision of going fishing.
In a first aspect, the invention provides a kind of public WiFi goes fishing the detection method of risk, including:
Obtain the information that user equipment (UE) is detected and obtained to the wireless access point AP of public wireless fidelity WiFi, institute The information stating acquisition includes destination service set identifier SSID of described AP and the target medium access control MAC letter of described AP Breath;
Based on the MAC information pattern library prestoring, judge described Destination MAC information whether with described MAC information benchmark The corresponding safe MAC information of described target SSID of storehouse record is consistent, the corresponding described safe MAC letter of described target SSID Cease for one or more;
When described Destination MAC information corresponding with described target SSID of described MAC information pattern library record any one When safe MAC information is all inconsistent, determine that described public WiFi has fishing risk.
Optionally, described Destination MAC information includes destination-mac address, and described safe MAC information includes secure mac address, Judge the corresponding safe MAC of described target SSID whether with described MAC information pattern library record for the described Destination MAC information Information is consistent, including:
Judge described target SSID corresponding whether with described MAC information pattern library record for the described destination-mac address Individual described secure mac address is consistent;
Wherein, when described destination-mac address and any one described secure mac address are all inconsistent, represent described mesh Mark MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all differs Cause.
Optionally, described Destination MAC information includes Destination MAC manufacturer, and described safe MAC information includes safe MAC life Business men, judges whether corresponding with described target SSID of the described MAC information pattern library record peace of described Destination MAC information Full MAC information is consistent, including:
Judge whether described Destination MAC manufacturer is corresponding with described target SSID of described MAC information pattern library record One described safe MAC manufacturer is consistent;
Wherein, when described Destination MAC manufacturer and any one described safe MAC manufacturer are all inconsistent, represent institute State Destination MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all not Unanimously.
Optionally, described Destination MAC information also includes Destination MAC manufacturer, and described safe MAC information also includes safety MAC manufacturer, when described destination-mac address and any one described secure mac address are all inconsistent, judges described target Whether MAC information is consistent with the corresponding safe MAC information of described target SSID of described MAC information pattern library record, also Including:
Judge whether described Destination MAC manufacturer is corresponding with described target SSID of described MAC information pattern library record One described safe MAC manufacturer is consistent;
Wherein, when described destination-mac address is all inconsistent with secure mac address any one described, and described target When MAC manufacturer and any one described safe MAC manufacturer are also all inconsistent, represent described Destination MAC information and described MAC Described target SSID any one safe MAC information corresponding of information reference recording is all inconsistent.
Optionally, methods described also includes:
When described destination-mac address is all inconsistent with secure mac address any one described, and described Destination MAC produces When business safe MAC manufacturer described with is consistent, described destination-mac address is recorded as described target SSID corresponding described Secure mac address.
Second aspect, the detection means of risk the invention provides a kind of public WiFi goes fishing, including:
Obtain module, for obtain user equipment (UE) the wireless access point AP of public wireless fidelity WiFi is detected and The information obtaining, the information of described acquisition includes destination service set identifier SSID of described AP and the target medium visit of described AP Ask control MAC information;
Judge module, for based on the MAC information pattern library prestoring, judge described Destination MAC information whether with institute The corresponding safe MAC information of described target SSID stating MAC information pattern library record is consistent, and described target SSID is corresponding Described safe MAC information is one or more;
Determining module, for when described target SSID pair of described Destination MAC information and described MAC information pattern library record When any one the safe MAC information answered is all inconsistent, determine that described public WiFi has fishing risk.
Optionally, described Destination MAC information includes destination-mac address, and described safe MAC information includes secure mac address, Described judge module is used for judging described target SSID whether with described MAC information pattern library record for the described destination-mac address A corresponding described secure mac address is consistent;
Wherein, when described destination-mac address and any one described secure mac address are all inconsistent, represent described mesh Mark MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all differs Cause.
Optionally, described Destination MAC information includes Destination MAC manufacturer, and described safe MAC information includes safe MAC life Business men, described judge module is used for judging the described mesh whether with described MAC information pattern library record for the described Destination MAC manufacturer The corresponding described safe MAC manufacturer of SSID is consistent for mark;
Wherein, when described Destination MAC manufacturer and any one described safe MAC manufacturer are all inconsistent, represent institute State Destination MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all not Unanimously.
Optionally, described Destination MAC information also includes Destination MAC manufacturer, and described safe MAC information also includes safety MAC manufacturer, when described destination-mac address and any one described secure mac address are all inconsistent, described judge module is also For judging corresponding one of described target SSID whether with described MAC information pattern library record for the described Destination MAC manufacturer Described safe MAC manufacturer is consistent;
Wherein, when described destination-mac address is all inconsistent with secure mac address any one described, and described target When MAC manufacturer and any one described safe MAC manufacturer are also all inconsistent, represent described Destination MAC information and described MAC Described target SSID any one safe MAC information corresponding of information reference recording is all inconsistent.
Optionally, described device also includes:
Logging modle, for when described destination-mac address all inconsistent with secure mac address any one described, and institute State Destination MAC manufacturer safe MAC manufacturer described with consistent when, described destination-mac address is recorded as described target The corresponding described secure mac address of SSID.
Said one in the embodiment of the present application or multiple technical scheme, at least have following one or more technology effect Really:
In the technical scheme of the embodiment of the present invention, obtain user equipment (UE) first and the wireless access point AP of WiFi is carried out The information detecting and obtaining, the information of described acquisition includes destination service set identifier SSID of described AP and the target of described AP Media access control MAC information, is then based on the MAC information pattern library prestoring, judge described Destination MAC information whether with Consistent in the corresponding safe MAC information of described target SSID of described MAC information pattern library record, described target SSID pair The described safe MAC information answered includes one or more, when described Destination MAC information and described MAC information pattern library record When the corresponding any safe MAC information of described target SSID is all inconsistent, determine that described public WiFi has fishing risk.Institute With, in the case of not needing additional hardware deployment, by contrast the described Destination MAC information of described public WiFi whether with institute The corresponding safe MAC information of described target SSID stating record in MAC information pattern library is consistent, and then the fishing to public WiFi Risk is detected.Thus solving prior art can only be real by the technical problem of additional hardware deployment detection fishing risk Show the technique effect being independent of additional hardware deployment and public WiFi being detected, and then reduced to public WiFi safety The cost safeguarded.
Brief description
By reading the detailed description of hereafter preferred implementation, various other advantages and benefit are common for this area Technical staff will be clear from understanding.Accompanying drawing is only used for illustrating the purpose of preferred implementation, and is not considered as to the present invention Restriction.And in whole accompanying drawing, it is denoted by the same reference numerals identical part.In the accompanying drawings:
Fig. 1 is the detection method flow chart of public WiFi fishing risk in the embodiment of the present invention;
Fig. 2 is the structure of the detecting device schematic diagram of public WiFi fishing risk in the embodiment of the present invention.
Specific embodiment
Embodiments provide a kind of detection method of public WiFi fishing risk and device, for realizing being independent of Additional hardware is disposed and public WiFi is carried out with the technique effect of risk supervision of going fishing.
In order to solve above-mentioned technical problem, the technical scheme thinking that the present invention provides is as follows:
In the technical scheme of the embodiment of the present invention, obtain user equipment (UE) first and the wireless access point AP of WiFi is carried out The information detecting and obtaining, the information of described acquisition includes destination service set identifier SSID of described AP and the target of described AP Media access control MAC information, is then based on the MAC information pattern library prestoring, judge described Destination MAC information whether with Consistent in the corresponding safe MAC information of described target SSID of described MAC information pattern library record, described target SSID pair The described safe MAC information answered includes one or more, when described Destination MAC information and described MAC information pattern library record When the corresponding any safe MAC information of described target SSID is all inconsistent, determine that described public WiFi has fishing risk.Institute With, in the case of not needing additional hardware deployment, by contrast the described Destination MAC information of described public WiFi whether with institute The corresponding safe MAC information of described target SSID stating record in MAC information pattern library is consistent, and then the fishing to public WiFi Risk is detected.Thus solving prior art can only be real by the technical problem of additional hardware deployment detection fishing risk Show the technique effect being independent of additional hardware deployment and public WiFi being detected, and then reduced to public WiFi safety The cost safeguarded.
Below by accompanying drawing and technical solution of the present invention is described in detail specific embodiment it should be understood that the application Specific features in embodiment and embodiment are the detailed description to technical scheme, rather than to present techniques The restriction of scheme, in the case of not conflicting, the technical characteristic in the embodiment of the present application and embodiment can be mutually combined.
The terms "and/or", only a kind of incidence relation of description affiliated partner, represents there may be three kinds of passes System, for example, A and/or B, can represent:, there are A and B, these three situations of individualism B in individualism A simultaneously.In addition, herein Middle character "/", typically represent forward-backward correlation to as if a kind of relation of "or".
First aspect present invention provides a kind of detection method of public WiFi fishing risk, refer to Fig. 1, is the present invention The detection method flow chart of public WiFi fishing risk in embodiment.The method includes:
S101:Obtain the letter that user equipment (UE) is detected and obtained to the wireless access point AP of public wireless fidelity WiFi Breath, the information of described acquisition includes destination service set identifier SSID of described AP and the target medium access control of described AP MAC information;
S102:Based on the MAC information pattern library prestoring, judge described Destination MAC information whether with described MAC information The corresponding safe MAC information of described target SSID of pattern library record is consistent, the corresponding described safety of described target SSID MAC information is one or more;
S103:When described Destination MAC information is corresponding any with described target SSID of described MAC information pattern library record When one safe MAC information is all inconsistent, determine that described public WiFi has fishing risk.
Specifically, the public WiFi in the embodiment of the present invention refer to security attribute be OPEN AP (WAP, Access Point), such as CMCC-WEB, ChinaNet, ChinaUnicom and 16wifi etc..
Detect in S101 to S103 in the embodiment of the present invention that the go fishing executive agent of method of risk of public WiFi can be UE (user equipment, User Equipment) or the server being connected with UE, the present invention is not particularly limited.
When the fishing risk needing WiFi public to detects, UE is detected to the AP of this public WiFi and is obtained The information of obtaining, the information obtaining in the embodiment of the present invention specifically includes SSID (service set identifier, the Service Set of this AP IDentifier), and this AP MAC (media access control, Media Access Control or Medium Access Control) information.In embodiments of the present invention, target SSID is the SSID of this AP, and Destination MAC information is the MAC of this AP Information.Wherein, MAC information is, for example, MAC Address and MAC manufacturer etc., and the present invention is not particularly limited.
Wherein, public WiFi is carried out with risk supervision of going fishing, when UE each access public WiFi can be specially, or When person is specially UE and accesses new public WiFi, that is, access WiFi public from history SSID different public WiFi when. Those skilled in the art can be selected according to actual, and the present invention is not particularly limited.
It is UE for executive agent, in S101, obtains target SSID and Destination MAC information, specially UE detects to AP And obtain SSID the and MAC information of the AP of public WiFi to be detected;And be server for executive agent, obtain target in S101 SSID and Destination MAC information, specially receive SSID the and MAC information that UE reports after AP is detected.
After obtaining target SSID and Destination MAC information, execute S102, based on the MAC information pattern library prestoring, judge Destination MAC information whether with the corresponding one or more safe MAC information of target SSID of record in MAC information pattern library One safe MAC information is consistent.
Specifically, the MAC information pattern library record in the embodiment of the present invention has the SSID of multiple public WiFi, and often The corresponding safe MAC information of individual SSID.As an example it is assumed that have recorded in MAC information pattern library CMCC-WEB, Tetra- SSID of ChinaNet, ChinaUnicom and 16wifi, and the corresponding safe MAC information of each SSID.
In embodiments of the present invention, MAC information pattern library can voluntarily be set up by UE and safeguard it is also possible to be built by server Stand and safeguard.Preferably, in order to obtain more comprehensive and more accurate MAC information pattern library, big data is based on by server Set up and safeguard that MAC information pattern library is preferable selection.Certainly, if the executive agent in the embodiment of the present invention is UE, UE Also need to send the acquisition request representing acquisition request MAC information pattern library to server, and then the reception server is based on and obtains The MAC information pattern library asked and issue, then MAC information pattern library is stored in the memory space of UE again.
In order to public WiFi is carried out with risk supervision of going fishing, based on target SSID, from MAC information pattern library, search out mesh The mark corresponding one or more safe MAC information of SSID.Then, comparison object MAC information corresponding with target SSID one or Multiple safe MAC information.If Destination MAC information is consistent with one of safe MAC information then it represents that Destination MAC information is pacified Entirely, so represent this public WiFi there is a possibility that go fishing risk less, so determine public WiFi there is not fishing risk. Whereas if Destination MAC information any one safe MAC information corresponding with target SSID all inconsistent then it represents that public WiFi is potentially unsafe, and then in S103, determines that public WiFi has fishing risk.
By said process, it is achieved that the detection of risk that public WiFi is gone fishing.By foregoing description as can be seen that this Bright embodiment detects that the method for public WiFi fishing risk does not need additional hardware to dispose, by contrasting the target of public WiFi Whether MAC information is consistent with the corresponding safe MAC information of target SSID of record in MAC information pattern library, and then to public The fishing risk of WiFi is detected.Thus solving prior art can only be by the skill of additional hardware deployment detection fishing risk Art problem is it is achieved that be independent of the technique effect that additional hardware is disposed and public WiFi is detected, and then reduces to public affairs The cost of common WiFi security maintenance.
During implementing, because storage MAC information pattern library can take larger storage resource, simultaneously by target MAC information and safe MAC information in a large number carry out contrasting and also can consume a large amount of memory sources and electricity, accordingly, it is considered to UE storage Resource, memory source and electricity are limited, therefore, are executed the detection of public WiFi fishing risk in the embodiment of the present invention by server Select for preferable.
Further, because Destination MAC information can have multiple possibility, thus the specific implementation of S102 also have multiple. Just describe in detail to wherein several below.
The first:
In the first implementation, Destination MAC information specifically includes destination-mac address, and MAC information also specifically includes peace MAC Address, and then S102 entirely is realized by following process:
Judge described target SSID corresponding whether with described MAC information pattern library record for the described destination-mac address Individual described secure mac address is consistent;
Wherein, when described destination-mac address and any one described secure mac address are all inconsistent, represent described mesh Mark MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all differs Cause.
Specifically, based on target SSID, search out target SSID from MAC information pattern library corresponding one or more Secure mac address, then comparison object MAC Address and the corresponding secure mac address of target SSID.Under normal circumstances, on each The MAC Address of net equipment is unique, if therefore destination-mac address consistent with one of secure mac address then it represents that this AP sets Configure for by public WiFi operator, so this public WiFi there is a possibility that fishing risk is less.Therefore, work as Destination MAC When address one of secure mac address corresponding with target SSID is consistent, represent that Destination MAC information is remembered with MAC information benchmark The corresponding one of safe MAC information of target SSID of record is consistent, and then determines that public WiFi does not have fishing risk.Instead It, if destination-mac address all secure mac address corresponding with target SSID are all inconsistent then it represents that this AP equipment may Do not configured by public WiFi operator, so this public WiFi has fishing risk.Therefore, when destination-mac address and target When any one secure mac address corresponding of SSID is all inconsistent, represent Destination MAC information and MAC information reference recording The corresponding all safe MAC information of target SSID are all inconsistent, determine that this public WiFi has fishing risk.
For example, target SSID is specially * * * *-WEB, the safety of the * * * *-WEB of record in MAC information pattern library MAC Address is as shown in table 1.
Table 1
Assume that destination-mac address is 58:66:ba:6e:57:20.Due to destination-mac address and secure address 58:66:ba: 6e:57:20 is consistent, so determining that this public WiFi does not have fishing risk.Hypothesis destination-mac address is 5c:ad:cf:46: b8:Ae, because destination-mac address is all inconsistent with the secure mac address in table 1, so determine that this public WiFi has fishing Risk.
Further, during implementing, may there is the situation of MAC Address repetition, identical in order to distinguish address Different MAC Address, MAC information pattern library, in record security MAC Address, can record each secure mac address simultaneously Coordinate, thus to distinguish the MAC of repetition.For example, 58:66:ba:6e:57:20 (coordinates:Beijing) and 58:66:ba:6e:57:20 (coordinate:Shanghai).And then, also need in S101 obtain the coordinate of AP further, corresponding with target SSID in destination-mac address When one of MAC Address is consistent, determine whether whether consistent with this secure mac address of coordinate of destination-mac address Coordinate is consistent.If the coordinate of the coordinate of destination-mac address and this identical secure mac address inconsistent then it represents that Destination MAC The corresponding AP in address is not the safe AP indicated by this identical secure mac address in fact, so still determining public There is fishing risk in WiFi.
Second:
In second implementation, Destination MAC information specifically includes Destination MAC manufacturer, and safe MAC information is also concrete Including safe MAC manufacturer, and then S102 is realized by following process:
Judge whether described Destination MAC manufacturer is corresponding with described target SSID of described MAC information pattern library record One described safe MAC manufacturer is consistent;
Wherein, when described Destination MAC manufacturer and any one described safe MAC manufacturer are all inconsistent, represent institute State Destination MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all not Unanimously.
Specifically, the MAC manufacturer in the embodiment of the present invention, refer to produce AP equipment or AC (access controller, Access Control) company of equipment or producer.Based on target SSID, from MAC information pattern library, search out target SSID Corresponding one or more safe MAC manufacturer, then comparison object MAC manufacturer and the corresponding safe MAC life of target SSID Business men.Because under normal circumstances, the operator of public WiFi can in high volume purchase the AP equipment that one or more manufacturers produce Or AC equipment, the probability of indivedual buyings is less, and these manufacturers produce fishing AP equipment or AC equipment for lawless person Probability also less, if therefore Destination MAC manufacturer consistent with one of safe MAC manufacturer then it represents that this AP equipment Configured by public WiFi operator, so this public WiFi there is a possibility that fishing risk is less.Therefore, when Destination MAC is given birth to When business men is consistent with the one of safe MAC manufacturer of target SSID, represent Destination MAC information and MAC information reference recording The corresponding one of safe MAC information of target SSID consistent, and then determine that public WiFi does not have fishing risk.Conversely, such as Fruit Destination MAC manufacturer any safe MAC manufacturer corresponding with target SSID all inconsistent then it represents that this AP equipment may be simultaneously Do not configured by public WiFi operator, so this public WiFi has fishing risk.Therefore, when Destination MAC manufacturer and target When the corresponding any safe MAC manufacturer of SSID is all inconsistent, represent the mesh of Destination MAC information and MAC information reference recording The mark corresponding all safe MAC information of SSID are all inconsistent, determine that this public WiFi has fishing risk.
For continuing to use the example that target SSID is specially * * * *-WEB, the * * * *-WEB of record in MAC information pattern library Safe MAC manufacturer is as shown in table 2.
Table 2
Hypothesis Destination MAC manufacturer is Hangzhou H3C Technologies Co..Due to Destination MAC manufacturer with Safe MAC manufacturer Hangzhou H3C Technologies Co. is consistent, so determining that this public WiFi does not have fishing wind Danger.Hypothesis destination-mac address manufacturer is ABC, because Destination MAC manufacturer is all differed with the safe MAC manufacturer in table 2 Cause, so determining that this public WiFi has fishing risk.
The third:
In conjunction with the first implementation, in the third implementation, Destination MAC information further comprises Destination MAC Manufacturer, safe MAC information also further comprises safe MAC manufacturer, when destination-mac address and one or more safety When MAC Address is all inconsistent, and then the process of realizing of S102 further comprises:
Judge whether described Destination MAC manufacturer is corresponding with described target SSID of described MAC information pattern library record One described safe MAC manufacturer is consistent;
Wherein, when described destination-mac address is all inconsistent with secure mac address any one described, and described target When MAC manufacturer and any one described safe MAC manufacturer are also all inconsistent, represent described Destination MAC information and described MAC Described target SSID any one safe MAC information corresponding of information reference recording is all inconsistent.
Specifically, in the third implementation, Destination MAC information specifically includes destination-mac address and Destination MAC life Business men, safe MAC information also specifically includes secure mac address and safe MAC manufacturer.In the third implementation, first Judge that whether corresponding with target SSID destination-mac address one of secure mac address be consistent.If destination-mac address with The corresponding one of secure mac address of target SSID is consistent, then judge that public WiFi does not have fishing risk.Wherein, judge Whether consistent with the corresponding secure mac address of the target SSID detailed process of destination-mac address in the first implementation By the agency of, therefore for the something in common of the first implementation and the third implementation, just it is no longer repeated.
The third implementation is with the difference of the first implementation, when destination-mac address and target SSID When corresponding all secure mac address are all inconsistent, will not confirm that public WiFi has fishing risk, but determine whether mesh Whether corresponding with SSID mark MAC manufacturer one of safe MAC manufacturer be consistent.When Destination MAC manufacturer and all peaces When full MAC manufacturer is also all inconsistent, just can determine whether that public WiFi has fishing risk.
Specifically, because pattern library may not record the corresponding safe MAC Address of target complete SSID, or simultaneously Do not record the new secure mac address of target SSID in time, so, in all safe MAC of destination-mac address and target SSID When address is all inconsistent, whether checking Destination MAC manufacturer is safe MAC manufacturer further.
Due to safe MAC manufacturer, the most of AP equipment producing or AC equipment are safe, so working as destination-mac address All secure mac address corresponding with target SSID are all inconsistent, but Destination MAC manufacturer is corresponding with target SSID wherein When one safe MAC manufacturer is consistent, still believe that public WiFi is safe.And work as destination-mac address and target SSID pair The all secure mac address answered are all inconsistent, Destination MAC manufacturer also all safe MAC manufacturer corresponding with target SSID When all inconsistent, just can determine whether that public WiFi has fishing risk.Thus, the detection that improve public WiFi fishing risk is accurate Rate.
Further, for the third implementation, can also include:
When described destination-mac address is all inconsistent with secure mac address any one described, and described Destination MAC produces When business safe MAC manufacturer described with is consistent, described destination-mac address is recorded as described target SSID corresponding described Secure mac address.
Specifically, when destination-mac address is all inconsistent with one or more secure mac address, and Destination MAC manufacturer When consistent with one of safe MAC manufacturer, show to miss destination-mac address in MAC information pattern library, therefore, now Destination-mac address is added to the corresponding secure mac address of target SSID.
4th kind:
In conjunction with the first implementation and second implementation, in the 4th kind of implementation, Destination MAC information is specifically wrapped Include destination-mac address and Destination MAC manufacturer, safe MAC information specifically includes secure mac address and safe MAC manufacturer, S102 to realize process as follows:
Judge described target SSID corresponding whether with described MAC information pattern library record for the described destination-mac address Individual described secure mac address is consistent, and whether corresponding with the described SSID described safety of described Destination MAC manufacturer MAC manufacturer is consistent;
Wherein, when described destination-mac address is all inconsistent with any described secure mac address, and the life of described Destination MAC When business men and any described safe MAC manufacturer are also all inconsistent, represent described Destination MAC information and described MAC information benchmark The corresponding any safe MAC information of described target SSID of record is all inconsistent.
In the 4th kind of implementation, will destination-mac address and Destination MAC manufacturer be verified simultaneously.Concrete During realization, can first judge that whether corresponding with target SSID destination-mac address one of secure mac address be consistent, then Judge that whether corresponding with target SSID Destination MAC manufacturer one of safe MAC manufacturer be consistent, or first judge target Whether corresponding with target SSID MAC manufacturer one of safe MAC manufacturer be consistent, more whether judges destination-mac address One of secure mac address corresponding with target SSID is consistent, or carries out the judgement of above-mentioned two independence simultaneously, and the present invention is not Do concrete restriction.
Just no longer heavy with the something in common of the first implementation and second implementation for the 4th kind of implementation Repeat again.
4th kind of implementation is with the difference of the first implementation and second implementation, works as target MAC Address is consistent with one of secure mac address of target SSID, or Destination MAC manufacturer is with target SSID wherein When one safe MAC manufacturer is consistent, determine public WiFi safety.And it is corresponding with target SSID all to work as destination-mac address Secure mac address is all inconsistent, and Destination MAC manufacturer also all safe MAC manufacturer corresponding with target SSID is also equal When inconsistent, just can determine whether that public WiFi has fishing risk.Thus, the detection that improve public WiFi fishing risk is accurate Rate.
During implementing, those skilled in the art can be above-mentioned five kinds according to actual selection Any one in implementation, the present invention is not particularly limited.
Below how server is set up with MAC information pattern library be introduced.
First, server sends to multiple UE of access server and reports instruction, and this reports instruction to be used for notifying each UE The AP accessing is detected, obtains and access AP information, and AP information reporting will be detected to server.Wherein, AP information At least include security attribute, SSID and MAC information, coordinate of AP etc. can also be included further, the present invention is not particularly limited. And then, server passes through reporting of multiple UE, obtains a large amount of AP information.Further, the management personnel of server can also be never With acquisition AP information at the operator of public WiFi.
Then, server, based on the security attribute in each AP information, filters out the AP that security attribute is OPEN, that is, from big Public WiFi is filtered out in amount WiFi.In addition in addition it is also necessary to internally hold identical AP information to carry out duplicate removal process so that remaining AP There is no content identical AP information in information.And, by detecting and verifying, filter out from the AP information of public WiFi in a large number The safe AP information of safe AP.
Next, clustering to all safe AP information according to SSID, thus obtaining the corresponding safe MAC of each SSID The safe MAC information such as address, safe MAC manufacturer and coordinate.Then, record the corresponding safe MAC information of each SSID, build Vertical MAC information pattern library.
Further, in order to store the storage resource reducing shared by MAC information pattern library, obtain each SSID's further Quantity, and carry out by high sequence on earth according to the quantity of each SSID.Then, in MAC information pattern library, only record is arranged SSID before predetermined order for the sequence and corresponding safe MAC information.In other words, due to accessing less during implementing The probability of common public WiFi is less, so can only record relatively conventional in MAC information pattern library, coverage rate is higher, and The SSID of a fairly large number of public WiFi and corresponding MAC safety information.
Further, the proportion of each safe MAC manufacturer of each SSID can also be counted, so proportion is higher Safe MAC manufacturer record in MAC security criteria storehouse, proportion relatively low safe MAC manufacturer then do not record.
Further, server, when safeguarding MAC information pattern library, can also receive user's update information that UE reports, And then add, safe MAC information is deleted or modified based on user's update information.
Based on the inventive concept same with the detection method of WiFi fishing risk public in previous embodiment, the present invention second Aspect also provides the detection means that a kind of public WiFi goes fishing risk, as shown in Fig. 2 including:
Obtain module 101, for obtaining user equipment (UE), the wireless access point AP of public wireless fidelity WiFi is examined The information surveyed and obtain, the information of described acquisition includes destination service set identifier SSID of described AP and the target matchmaker of described AP Body access control MAC information;
Judge module 102, for based on the MAC information pattern library prestoring, judge described Destination MAC information whether with The corresponding safe MAC information of described target SSID of described MAC information pattern library record is consistent, and described target SSID corresponds to Described safe MAC information be one or more;
Determining module 103, for when the described target of described Destination MAC information and described MAC information pattern library record When SSID any one safe MAC information corresponding is all inconsistent, determine that described public WiFi has fishing risk.
Specifically, Destination MAC information includes destination-mac address, and described safe MAC information includes secure mac address, sentences Disconnected module 102 is used for judging whether described destination-mac address is corresponding with described target SSID of described MAC information pattern library record A described secure mac address consistent;
Wherein, when described destination-mac address and any one described secure mac address are all inconsistent, represent described mesh Mark MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all differs Cause.
Or, described Destination MAC information includes Destination MAC manufacturer, and described safe MAC information includes safe MAC and produces Business, judge module 102 is used for judging the described target whether with described MAC information pattern library record for the described Destination MAC manufacturer The corresponding described safe MAC manufacturer of SSID is consistent;
Wherein, when described Destination MAC manufacturer and any one described safe MAC manufacturer are all inconsistent, represent institute State Destination MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all not Unanimously.
Further, described Destination MAC information also includes Destination MAC manufacturer, and described safe MAC information also includes safety MAC manufacturer, when described destination-mac address and any one described secure mac address are all inconsistent, judge module 102 is also For judging corresponding one of described target SSID whether with described MAC information pattern library record for the described Destination MAC manufacturer Described safe MAC manufacturer is consistent;
Wherein, when described destination-mac address is all inconsistent with secure mac address any one described, and described target When MAC manufacturer and any one described safe MAC manufacturer are also all inconsistent, represent described Destination MAC information and described MAC Described target SSID any one safe MAC information corresponding of information reference recording is all inconsistent.
Further, the device in the embodiment of the present invention also includes:
Logging modle, for when described destination-mac address all inconsistent with secure mac address any one described, and institute State Destination MAC manufacturer safe MAC manufacturer described with consistent when, described destination-mac address is recorded as described target The corresponding described secure mac address of SSID.
The various change mode of detection method of public WiFi fishing risk in aforementioned Fig. 1 embodiment and instantiation are same Sample is applied to the detection means of the public WiFi fishing risk of the present embodiment, by the detection of aforementioned risk that public WiFi is gone fishing The detailed description of method, those skilled in the art are clear that the detection dress of public WiFi fishing risk in the present embodiment The implementation put, thus succinct for description, will not be described in detail herein.
Said one in the embodiment of the present application or multiple technical scheme, at least have following one or more technology effect Really:
In the technical scheme of the embodiment of the present invention, obtain user equipment (UE) first and the wireless access point AP of WiFi is carried out The information detecting and obtaining, the information of described acquisition includes destination service set identifier SSID of described AP and the target of described AP Media access control MAC information, is then based on the MAC information pattern library prestoring, judge described Destination MAC information whether with Consistent in the corresponding safe MAC information of described target SSID of described MAC information pattern library record, described target SSID pair The described safe MAC information answered includes one or more, when described Destination MAC information and described MAC information pattern library record When the corresponding any safe MAC information of described target SSID is all inconsistent, determine that described public WiFi has fishing risk.Institute With, in the case of not needing additional hardware deployment, by contrast the described Destination MAC information of described public WiFi whether with institute The corresponding safe MAC information of described target SSID stating record in MAC information pattern library is consistent, and then the fishing to public WiFi Risk is detected.Thus solving prior art can only be real by the technical problem of additional hardware deployment detection fishing risk Show the technique effect being independent of additional hardware deployment and public WiFi being detected, and then reduced to public WiFi safety The cost safeguarded.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with based on teaching in this.As described above, construct required by this kind of system Structure be obvious.Additionally, the present invention is also not for any certain programmed language.It is understood that, it is possible to use various Programming language realizes the content of invention described herein, and the description above language-specific done is to disclose this Bright preferred forms.
In description mentioned herein, illustrate a large amount of details.It is to be appreciated, however, that the enforcement of the present invention Example can be put into practice in the case of not having these details.In some instances, known method, structure are not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly it will be appreciated that in order to simplify the disclosure and help understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the present invention is grouped together into single enforcement sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield more features than the feature being expressly recited in each claim.More precisely, it is such as following Claims reflected as, inventive aspect is all features less than single embodiment disclosed above.Therefore, The claims following specific embodiment are thus expressly incorporated in this specific embodiment, wherein each claim itself All as the separate embodiments of the present invention.
Those skilled in the art are appreciated that and the module in the equipment in embodiment can be carried out adaptively Change and they are arranged in one or more equipment different from this embodiment.Can be the module in embodiment or list Unit or assembly be combined into a module or unit or assembly, and can be divided in addition multiple submodule or subelement or Sub-component.In addition to such feature and/or at least some of process or unit exclude each other, can adopt any Combination is to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so disclosed Where method or all processes of equipment or unit are combined.Unless expressly stated otherwise, this specification (includes adjoint power Profit requires, summary and accompanying drawing) disclosed in each feature can carry out generation by the alternative features providing identical, equivalent or similar purpose Replace.
Although additionally, it will be appreciated by those of skill in the art that some embodiments in this include institute in other embodiments Including some features rather than further feature, but the combination of the feature of different embodiment means to be in the scope of the present invention Within and form different embodiments.For example, in the following claims, embodiment required for protection any it One can in any combination mode using.
The all parts embodiment of the present invention can be realized with hardware, or to run on one or more processor Software module realize, or with combinations thereof realize.It will be understood by those of skill in the art that can use in practice Microprocessor or digital signal processor (DSP) come to realize gateway according to embodiments of the present invention, proxy server, in system Some or all parts some or all functions.The present invention is also implemented as executing side as described herein Some or all equipment of method or program of device (for example, computer program and computer program).Such The program realizing the present invention can store on a computer-readable medium, or can have the shape of one or more signal Formula.Such signal can be downloaded from internet website and obtain, or provides on carrier signal, or with any other shape Formula provides.
It should be noted that above-described embodiment the present invention will be described rather than limits the invention, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference markss between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element listed in the claims or step.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can come real by means of the hardware including some different elements and by means of properly programmed computer Existing.If in the unit claim listing equipment for drying, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.
The invention discloses, A1, a kind of detection method of public WiFi fishing risk are it is characterised in that include:
Obtain the information that user equipment (UE) is detected and obtained to the wireless access point AP of public wireless fidelity WiFi, institute The information stating acquisition includes destination service set identifier SSID of described AP and the target medium access control MAC letter of described AP Breath;
Based on the MAC information pattern library prestoring, judge described Destination MAC information whether with described MAC information benchmark The corresponding safe MAC information of described target SSID of storehouse record is consistent, the corresponding described safe MAC letter of described target SSID Cease for one or more;
When described Destination MAC information corresponding with described target SSID of described MAC information pattern library record any one When safe MAC information is all inconsistent, determine that described public WiFi has fishing risk.
A2, the method according to A1 it is characterised in that described Destination MAC information includes destination-mac address, described peace Full MAC information includes secure mac address, judge described Destination MAC information whether with described in described MAC information pattern library record The corresponding safe MAC information of target SSID is consistent, including:
Judge described target SSID corresponding whether with described MAC information pattern library record for the described destination-mac address Individual described secure mac address is consistent;
Wherein, when described destination-mac address and any one described secure mac address are all inconsistent, represent described mesh Mark MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all differs Cause.
A3, the method according to A1 are it is characterised in that described Destination MAC information includes Destination MAC manufacturer, described Safe MAC information includes safe MAC manufacturer, judge described Destination MAC information whether with described MAC information pattern library record The corresponding safe MAC information of described target SSID is consistent, including:
Judge whether described Destination MAC manufacturer is corresponding with described target SSID of described MAC information pattern library record One described safe MAC manufacturer is consistent;
Wherein, when described Destination MAC manufacturer and any one described safe MAC manufacturer are all inconsistent, represent institute State Destination MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all not Unanimously.
A4, the method according to A2 are it is characterised in that described Destination MAC information also includes Destination MAC manufacturer, institute State safe MAC information and also include safe MAC manufacturer, when described destination-mac address is equal with secure mac address any one described When inconsistent, judge described target SSID corresponding whether with described MAC information pattern library record for the described Destination MAC information Individual safe MAC information is consistent, also includes:
Judge whether described Destination MAC manufacturer is corresponding with described target SSID of described MAC information pattern library record One described safe MAC manufacturer is consistent;
Wherein, when described destination-mac address is all inconsistent with secure mac address any one described, and described target When MAC manufacturer and any one described safe MAC manufacturer are also all inconsistent, represent described Destination MAC information and described MAC Described target SSID any one safe MAC information corresponding of information reference recording is all inconsistent.
A5, the method according to A4 are it is characterised in that methods described also includes:
When described destination-mac address is all inconsistent with secure mac address any one described, and described Destination MAC produces When business safe MAC manufacturer described with is consistent, described destination-mac address is recorded as described target SSID corresponding described Secure mac address.
B6, a kind of detection means of public WiFi fishing risk are it is characterised in that include:
Obtain module, for obtain user equipment (UE) the wireless access point AP of public wireless fidelity WiFi is detected and The information obtaining, the information of described acquisition includes destination service set identifier SSID of described AP and the target medium visit of described AP Ask control MAC information;
Judge module, for based on the MAC information pattern library prestoring, judge described Destination MAC information whether with institute The corresponding safe MAC information of described target SSID stating MAC information pattern library record is consistent, and described target SSID is corresponding Described safe MAC information is one or more;
Determining module, for when described target SSID pair of described Destination MAC information and described MAC information pattern library record When any one the safe MAC information answered is all inconsistent, determine that described public WiFi has fishing risk.
B7, the device according to B6 it is characterised in that described Destination MAC information includes destination-mac address, described peace Full MAC information includes secure mac address, described judge module be used for judging described destination-mac address whether with described MAC information The corresponding described secure mac address of described target SSID of pattern library record is consistent;
Wherein, when described destination-mac address and any one described secure mac address are all inconsistent, represent described mesh Mark MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all differs Cause.
B8, the device according to B6 are it is characterised in that described Destination MAC information includes Destination MAC manufacturer, described Safe MAC information includes safe MAC manufacturer, described judge module be used for judging described Destination MAC manufacturer whether with described The corresponding described safe MAC manufacturer of described target SSID of MAC information pattern library record is consistent;
Wherein, when described Destination MAC manufacturer and any one described safe MAC manufacturer are all inconsistent, represent institute State Destination MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all not Unanimously.
B9, the device according to B7 are it is characterised in that described Destination MAC information also includes Destination MAC manufacturer, institute State safe MAC information and also include safe MAC manufacturer, when described destination-mac address is equal with secure mac address any one described When inconsistent, described judge module be additionally operable to judge described Destination MAC manufacturer whether with described MAC information pattern library record A corresponding described safe MAC manufacturer is consistent for described target SSID;
Wherein, when described destination-mac address is all inconsistent with secure mac address any one described, and described target When MAC manufacturer and any one described safe MAC manufacturer are also all inconsistent, represent described Destination MAC information and described MAC Described target SSID any one safe MAC information corresponding of information reference recording is all inconsistent.
B10, the device according to B9 are it is characterised in that described device also includes:
Logging modle, for when described destination-mac address all inconsistent with secure mac address any one described, and institute State Destination MAC manufacturer safe MAC manufacturer described with consistent when, described destination-mac address is recorded as described target The corresponding described secure mac address of SSID.

Claims (10)

1. a kind of detection method of public WiFi fishing risk is it is characterised in that include:
Obtain user equipment (UE) information that the wireless access point AP of public wireless fidelity WiFi is detected and obtained, described obtain The information obtaining includes destination service set identifier SSID of described AP and the target medium access control MAC information of described AP;
Based on the MAC information pattern library prestoring, judge whether described Destination MAC information is remembered with described MAC information pattern library The corresponding safe MAC information of described target SSID of record is consistent, and the corresponding described safe MAC information of described target SSID is One or more;
When described Destination MAC information and described target SSID any one safety corresponding of described MAC information pattern library record When MAC information is all inconsistent, determine that described public WiFi has fishing risk.
2. the method for claim 1 is it is characterised in that described Destination MAC information includes destination-mac address, described peace Full MAC information includes secure mac address, judge described Destination MAC information whether with described in described MAC information pattern library record The corresponding safe MAC information of target SSID is consistent, including:
Judge the corresponding institute of described target SSID whether with described MAC information pattern library record for the described destination-mac address State secure mac address consistent;
Wherein, when described destination-mac address and any one described secure mac address are all inconsistent, represent described Destination MAC Information any one safe MAC information corresponding with described target SSID of described MAC information reference recording is all inconsistent.
3. the method for claim 1 is it is characterised in that described Destination MAC information includes Destination MAC manufacturer, described Safe MAC information includes safe MAC manufacturer, judge described Destination MAC information whether with described MAC information pattern library record The corresponding safe MAC information of described target SSID is consistent, including:
Judge corresponding one of described target SSID whether with described MAC information pattern library record for the described Destination MAC manufacturer Described safe MAC manufacturer is consistent;
Wherein, when described Destination MAC manufacturer and any one described safe MAC manufacturer are all inconsistent, represent described mesh Mark MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all differs Cause.
4. method as claimed in claim 2 is it is characterised in that described Destination MAC information also includes Destination MAC manufacturer, institute State safe MAC information and also include safe MAC manufacturer, when described destination-mac address is equal with secure mac address any one described When inconsistent, judge described target SSID corresponding whether with described MAC information pattern library record for the described Destination MAC information Individual safe MAC information is consistent, also includes:
Judge corresponding one of described target SSID whether with described MAC information pattern library record for the described Destination MAC manufacturer Described safe MAC manufacturer is consistent;
Wherein, when described destination-mac address is all inconsistent with secure mac address any one described, and the life of described Destination MAC When business men and any one described safe MAC manufacturer are also all inconsistent, represent described Destination MAC information and described MAC information Described target SSID any one safe MAC information corresponding of reference recording is all inconsistent.
5. method as claimed in claim 4 is it is characterised in that methods described also includes:
When described destination-mac address is all inconsistent with secure mac address any one described, and described Destination MAC manufacturer with When one described safe MAC manufacturer is consistent, described destination-mac address is recorded as the corresponding described safety of described target SSID MAC Address.
6. a kind of detection means of public WiFi fishing risk is it is characterised in that include:
Obtain module, the wireless access point AP of public wireless fidelity WiFi is detected and obtain for obtaining user equipment (UE) Information, the target medium of destination service set identifier SSID and described AP that the information of described acquisition includes described AP accesses control MAC information processed;
Judge module, for based on the MAC information pattern library prestoring, judge described Destination MAC information whether with described MAC The corresponding safe MAC information of described target SSID of information pattern library record is consistent, and described target SSID is corresponding described Safe MAC information is one or more;
Determining module, for when described Destination MAC information corresponding with described target SSID of described MAC information pattern library record When any one safe MAC information is all inconsistent, determine that described public WiFi has fishing risk.
7. device as claimed in claim 6 is it is characterised in that described Destination MAC information includes destination-mac address, described peace Full MAC information includes secure mac address, described judge module be used for judging described destination-mac address whether with described MAC information The corresponding described secure mac address of described target SSID of pattern library record is consistent;
Wherein, when described destination-mac address and any one described secure mac address are all inconsistent, represent described Destination MAC Information any one safe MAC information corresponding with described target SSID of described MAC information reference recording is all inconsistent.
8. device as claimed in claim 6 is it is characterised in that described Destination MAC information includes Destination MAC manufacturer, described Safe MAC information includes safe MAC manufacturer, described judge module be used for judging described Destination MAC manufacturer whether with described The corresponding described safe MAC manufacturer of described target SSID of MAC information pattern library record is consistent;
Wherein, when described Destination MAC manufacturer and any one described safe MAC manufacturer are all inconsistent, represent described mesh Mark MAC information any one safe MAC information corresponding with described target SSID of described MAC information reference recording all differs Cause.
9. device as claimed in claim 7 is it is characterised in that described Destination MAC information also includes Destination MAC manufacturer, institute State safe MAC information and also include safe MAC manufacturer, when described destination-mac address is equal with secure mac address any one described When inconsistent, described judge module be additionally operable to judge described Destination MAC manufacturer whether with described MAC information pattern library record A corresponding described safe MAC manufacturer is consistent for described target SSID;
Wherein, when described destination-mac address is all inconsistent with secure mac address any one described, and the life of described Destination MAC When business men and any one described safe MAC manufacturer are also all inconsistent, represent described Destination MAC information and described MAC information Described target SSID any one safe MAC information corresponding of reference recording is all inconsistent.
10. device as claimed in claim 9 is it is characterised in that described device also includes:
Logging modle, for when described destination-mac address all inconsistent with secure mac address any one described, and described mesh When mark MAC manufacturer safe MAC manufacturer described with is consistent, described destination-mac address is recorded as described target SSID Corresponding described secure mac address.
CN201611191620.3A 2016-12-21 2016-12-21 Method and device for detecting phishing risk of public WiFi Pending CN106454847A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201611191620.3A CN106454847A (en) 2016-12-21 2016-12-21 Method and device for detecting phishing risk of public WiFi
PCT/CN2017/117690 WO2018113728A1 (en) 2016-12-21 2017-12-21 Method and device for determining risk of phishing attack in public wifi network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611191620.3A CN106454847A (en) 2016-12-21 2016-12-21 Method and device for detecting phishing risk of public WiFi

Publications (1)

Publication Number Publication Date
CN106454847A true CN106454847A (en) 2017-02-22

Family

ID=58215334

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611191620.3A Pending CN106454847A (en) 2016-12-21 2016-12-21 Method and device for detecting phishing risk of public WiFi

Country Status (2)

Country Link
CN (1) CN106454847A (en)
WO (1) WO2018113728A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113728A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Method and device for determining risk of phishing attack in public wifi network
CN109391944A (en) * 2018-10-31 2019-02-26 北京小米移动软件有限公司 Wireless network remarks method and device
CN109729525A (en) * 2017-10-31 2019-05-07 中国电信股份有限公司 Fishing WIFI recognition methods, device, terminal device and computer readable storage medium
CN111314911A (en) * 2020-02-26 2020-06-19 广东星辰信通科技有限公司 WiFi terminal sniffing prevention method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112512050A (en) * 2020-11-06 2021-03-16 北京小米移动软件有限公司 Method and device for preventing terminal from attacking and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277229A (en) * 2008-05-26 2008-10-01 杭州华三通信技术有限公司 Method for detecting illegality equipment and wireless client terminal
CN102843682A (en) * 2012-08-20 2012-12-26 中国联合网络通信集团有限公司 Access point authorizing method, device and system
CN103780430A (en) * 2014-01-20 2014-05-07 华为技术有限公司 Method and device for monitoring network equipment
CN104580152A (en) * 2014-12-03 2015-04-29 中国科学院信息工程研究所 Protection method and system against wifi (wireless fidelity) phishing

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102000159B1 (en) * 2013-12-18 2019-07-16 한국전자통신연구원 Apparatus and method for identifying rogue device
CN106792704B (en) * 2015-11-24 2020-10-09 中国移动通信集团公司 Method and device for detecting phishing access point
CN106454847A (en) * 2016-12-21 2017-02-22 北京奇虎科技有限公司 Method and device for detecting phishing risk of public WiFi

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101277229A (en) * 2008-05-26 2008-10-01 杭州华三通信技术有限公司 Method for detecting illegality equipment and wireless client terminal
CN102843682A (en) * 2012-08-20 2012-12-26 中国联合网络通信集团有限公司 Access point authorizing method, device and system
CN103780430A (en) * 2014-01-20 2014-05-07 华为技术有限公司 Method and device for monitoring network equipment
CN104580152A (en) * 2014-12-03 2015-04-29 中国科学院信息工程研究所 Protection method and system against wifi (wireless fidelity) phishing

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113728A1 (en) * 2016-12-21 2018-06-28 北京奇虎科技有限公司 Method and device for determining risk of phishing attack in public wifi network
CN109729525A (en) * 2017-10-31 2019-05-07 中国电信股份有限公司 Fishing WIFI recognition methods, device, terminal device and computer readable storage medium
CN109391944A (en) * 2018-10-31 2019-02-26 北京小米移动软件有限公司 Wireless network remarks method and device
CN109391944B (en) * 2018-10-31 2022-05-20 北京小米移动软件有限公司 Wireless network remarking method and device
CN111314911A (en) * 2020-02-26 2020-06-19 广东星辰信通科技有限公司 WiFi terminal sniffing prevention method

Also Published As

Publication number Publication date
WO2018113728A1 (en) 2018-06-28

Similar Documents

Publication Publication Date Title
CN106454847A (en) Method and device for detecting phishing risk of public WiFi
CN105554007B (en) A kind of web method for detecting abnormality and device
CN104125197B (en) A kind of security baseline system and its method for realizing safety inspection
CN106101130B (en) A kind of network malicious data detection method, apparatus and system
CN104253791B (en) A kind of safety access method of Web page application program, server and client side
CN106033514B (en) A kind of detection method and device of suspicious process
CN107251513A (en) System and method for the accurate guarantee of Malicious Code Detection
CN105243252B (en) A kind of method and device of account risk assessment
CN104023336B (en) The radio switch-in method and mobile terminal of mobile terminal
CN106998265A (en) A kind of monitoring method and its device
US20120185624A1 (en) Automated Cabling Process for a Complex Environment
Sellwood et al. Sleeping android: The danger of dormant permissions
US20110307735A1 (en) Method, computer, and computer program product for hardware mapping
CN102984128B (en) A kind of network computer information security detection method
CN104935601B (en) Web log file safety analytical method based on cloud, apparatus and system
CN106815137A (en) Ui testing method and apparatus
CN106034054A (en) Redundant access control list ACL rule file detection method and apparatus thereof
CN107395608A (en) A kind of network access method for detecting abnormality and device
CN106980647A (en) A kind of Distributed File System Data location mode and device
CN108073499A (en) The test method and device of application program
CN108898012A (en) The method and apparatus for detecting illegal program
CN102469098B (en) Information safety protection host machine
CN106790077B (en) Method and device for detecting DNS full-flow hijacking risk
CN104216930B (en) A kind of detection method and device of jump class fishing webpage
CN103336740B (en) The operating system integrated test facility of electric power secondary system and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222