CN107529165A - The recognition methods of wireless access points legitimacy under a kind of Campus Net - Google Patents

The recognition methods of wireless access points legitimacy under a kind of Campus Net Download PDF

Info

Publication number
CN107529165A
CN107529165A CN201710939686.4A CN201710939686A CN107529165A CN 107529165 A CN107529165 A CN 107529165A CN 201710939686 A CN201710939686 A CN 201710939686A CN 107529165 A CN107529165 A CN 107529165A
Authority
CN
China
Prior art keywords
wireless access
access points
client
checking
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710939686.4A
Other languages
Chinese (zh)
Other versions
CN107529165B (en
Inventor
杨加
李笑难
张扬
周昌令
马皓
张蓓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University
Original Assignee
Peking University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University filed Critical Peking University
Priority to CN201710939686.4A priority Critical patent/CN107529165B/en
Publication of CN107529165A publication Critical patent/CN107529165A/en
Application granted granted Critical
Publication of CN107529165B publication Critical patent/CN107529165B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of recognition methods of wireless access points legitimacy under Campus Net, after mobile intelligent terminal is connected to campus network, runtime verification client;Checking client sends the request of checking AP legitimacies by HTTPS to gateway server;After gateway server receives the request, the source IP addresses of the request are obtained, and are based on the IP address, and checking client coordinates, whether the AP of checking mobile intelligent terminal connection is legal.Utilize technical scheme provided by the invention, so that mobile intelligent terminal is when being connected to campus network, can be in the case of independent of AP physical parameters, easily by verifying that client identifies whether connected AP is legal exactly, so as to avoid causing because being connected to rogue AP user data leakage and information security from being compromised.

Description

The recognition methods of wireless access points legitimacy under a kind of Campus Net
Technical field
The present invention relates to the wireless access points under network security interconnection technique, more particularly to kind Campus Net (Wireless Access Point, abbreviation AP) whether legal recognition methods.
Background technology
Under Campus Net, mobile intelligent terminal (can be referred to as by the campus network AP that school web administrative department disposes Legal AP) campus network is connected to, and then access resources of campus network.After user enters the region of campus network covering, in intelligent movable WLAN is searched in terminal, after the SSID and the connection that select campus network, mobile intelligent terminal can access campus network.Moving During dynamic intelligent terminal is connected to campus network, a potential safety hazard be present:If the people of bad attempt will palm off campus During net SSID illegal wireless access points (AP) placement is arrived school, then user is possible in the case of unwitting will The mobile intelligent terminal of oneself is connected on personation AP, causes user data to reveal, and is even resulted in user benefit and is damaged.
In recent years, some identification personations AP method is suggested, such as, patent CN103648094A and CN 201710182847 technologies for describing BSSID based on AP or MAC Address to be identified.But rogue AP can lead to The BSSID and MAC for crossing counterfeit legal AP escape the inspection of this kind of method.Document (JANA S, KASERA S K.On fast and accurate detection of unauthorized wireless access points using clock skews [J].IEEETransactions on Mobile Computing,2010,9(3):449–462.;REISING D R, TEMPLE M,JACKSON J.Authorized and rogue device discrimination using dimensionally reduced RF-DNA fingerprints[J].IEEE Transactions on Information Forensics and Security,2015,10(6):1180-1192.) describe based on the physical features of packet to identify The method of rogue AP, still, this method implementation are complex, are not particularly suited for Campus Net.
The content of the invention
In order to overcome the above-mentioned deficiencies of the prior art, the invention provides wireless access points under a kind of Campus Net (AP) whether legal recognition methods so that under Campus Net, in the case of the physical parameter independent of AP, pass through checking Client (checking client can run in the intelligent mobile terminal equipments such as smart mobile phone, notebook computer, iPad) identification is non- The AP of method.
Technical scheme provided by the invention is:
The recognition methods of wireless access points legitimacy under a kind of Campus Net, when mobile intelligent terminal is connected to school After the net of garden, runtime verification client;Checking client sends the request of checking AP legitimacies by HTTPS to gateway server; After gateway server receives the request, the source IP addresses of the request are obtained, and are based on the IP address, and checking client is matched somebody with somebody Close, whether the AP of checking mobile intelligent terminal connection is legal.
For the recognition methods of illegal wireless access points under above-mentioned Campus Net, specifically:In gateway server On, the IP address set of campus network be present, be designated as A;After mobile intelligent terminal is connected to campus network AP, start checking client End, and perform following operation:
1) verify that client obtains the IP address (being designated as ip1) of mobile intelligent terminal;
2) checking client accesses gateway server in a manner of HTTPS, and passes through server certificate, it is ensured that gateway server Legitimacy;If certificate is legal, next step is performed;If certificate is illegal, show that the gateway server to be accessed has Problem, it is not believable server, next step, authentication failed, end operation can not be performed;
3) gateway server is from the HTTPS request of checking client, the source IP address (being designated as ip2) asked;Such as Fruit ip2 ∈ A, are sent to checking client, and perform next step by ip2;Otherwise show that connected AP is illegal and notify checking visitor Family end;
4) checking client compares ip1 and ip2, if both are different, that is, shows that connected AP is illegal;Otherwise it is assumed that connect It is legal AP to meet AP.
Compared with prior art, the beneficial effects of the invention are as follows:
The present invention proposes a kind of recognition methods of illegal wireless access points under Campus Net, works as mobile intelligent terminal After being connected to campus network, runtime verification client;Checking client sends checking AP legitimacies by HTTPS to gateway server Request;After gateway server receives the request, the source IP addresses of the request are obtained, and are based on the IP address, and checking visitor Family end coordinates, and whether the AP of checking mobile intelligent terminal connection is legal.Utilize technical scheme provided by the invention so that mobile intelligence Energy terminal, can be in the case of independent of AP physical parameters, easily by verifying client standard when being connected to campus network Really identify whether connected AP is legal, so as to avoid causing because being connected to rogue AP user data leakage and information peace It is compromised entirely.
Brief description of the drawings
Fig. 1 is the FB(flow block) of the inventive method.
Network environment schematic diagram when Fig. 2 is present invention specific implementation.
Embodiment
Below in conjunction with the accompanying drawings, the present invention, the model of but do not limit the invention in any way are further described by embodiment Enclose.
The present invention provides a kind of recognition methods of illegal wireless access points under Campus Net, and Fig. 1 is present invention side The FB(flow block) of method, after mobile intelligent terminal is connected to campus network, runtime verification client;Checking client passes through HTTPS The request of checking AP legitimacies is sent to gateway server;After gateway server receives the request, the source IP of the request is obtained Address, and the IP address is based on, and checking client coordinates, whether the AP of checking mobile intelligent terminal connection is legal.
Network environment schematic diagram when Fig. 2 is present invention specific implementation.In following examples, student Xiao Wang enters institution of higher education Garden, the SSID of this campus net is S.The IP address section of campus network is 10.1.0.0/16.Xiao Wang takes out smart mobile phone, beats WIFI is opened, and selects to connect S.After successful connection, in order to ensure the AP of mobile phone connection is legal AP, Xiao Wang opens and is arranged on mobile phone On checking client, to verify whether connected AP legal, (the IP address information in this example is only for example used, has no reality Border meaning).
Embodiment one:The connected AP of checking is the situation of legal AP.
First, verify that the IP address that client obtains mobile phone is 10.1.0.100.Next, client (i.e. smart mobile phone) Checking AP HTTPS request https is sent to campus network gateway server://gateway.xxx.xxx.edu.cn/ Validate (it is assumed that this is the URL that the AP services for checking credentials are provided on campus network gateway server).Campus network gateway server receives After the request, the source IP for finding the request is 10.1.0.100, belongs to campus network IP address range.Next, gateway service The IP address is returned to checking client by device:{ip:10.1.0.100}.After checking client receives returning result, with mobile phone IP address contrasted, it is found that both are identical, then judge connected AP as legal AP.
Embodiment two:The connected AP of checking is that (the request IP that gateway server measures is not school for illegal AP situation Garden net IP address).
First, verify that client obtains mobile phone IP address 172.16.1.100.Next, client takes to campus network gateway Business device sends checking AP HTTPS request.After campus network gateway server receives the request, it is found that request source IP is 172.16.1.100 it is not belonging to campus network IP address range.Next, gateway server notice checking client, connects AP For rogue AP:{ap:false}.
Embodiment three:The connected AP of checking is the illegal AP situation (IP address and gateway that checking client obtains The IP address that server measures is different).
First, verify that client obtains mobile phone IP address 192.168.1.100.Next, client is to campus network gateway Server sends checking AP HTTPS request.After campus network gateway server receives the request, it is found that request source IP is 10.1.0.100 belong to campus network IP address range.Next, the IP address is returned to checking client by gateway server: {ip:10.1.0.100}.After checking client receives returning result, contrasted with the IP address of mobile phone, it is found that both are different, Then judge connected AP as illegal AP.
Example IV:The situation of authentication failed (kidnapped checking client and asked to what gateway server was sent by rogue AP Ask).
First, verify that client obtains mobile phone IP address 192.168.1.100.Next, client is to campus network gateway Server sends HTTPS request.But client finds that certificate is invalid, shows to connect when verifying gateway server certificate Server be illegal server, checking can not continue, verification operation failure.
It should be noted that the purpose for publicizing and implementing example is that help further understands the present invention, but the skill of this area Art personnel are appreciated that:Do not departing from the present invention and spirit and scope of the appended claims, various substitutions and modifications are all It is possible.Therefore, the present invention should not be limited to embodiment disclosure of that, and the scope of protection of present invention is with claim The scope that book defines is defined.

Claims (3)

  1. A kind of 1. recognition methods of wireless access points legitimacy under Campus Net, when mobile intelligent terminal connection is arrived school After net, runtime verification client;Checking client is sent to gateway server by HTTPS and verifies that wireless access points are legal The request of property;After gateway server receives the request, the source IP addresses of the request are obtained;And utilize the IP address and checking visitor Family end coordinates, and whether the wireless access points for identifying mobile intelligent terminal connection are legal wireless access points.
  2. 2. the recognition methods of wireless access points legitimacy under Campus Net as claimed in claim 1, it is characterized in that, by net The IP address set for closing campus network existing for server is designated as A;The accessing wirelessly that campus network is connected to when mobile intelligent terminal connects After access point, start checking client, and perform following operation:
    1) verify that client obtains the IP address of mobile intelligent terminal, be designated as ip1;
    2) checking client accesses gateway server in a manner of HTTPS, and passes through server certificate, it is ensured that the conjunction of gateway server Method;If server certificate is legal, next step is performed;If server certificate is illegal, show the gateway to be accessed Server is not believable server, can not perform next step, authentication failed, end operation;
    3) gateway server is from the HTTPS request of checking client, and the source IP address asked is designated as ip2;If ip2 ∈ A, ip2 is sent to checking client, and performs next step;Otherwise show connected wireless access points be it is illegal, And notify to verify client;
    4) checking client compares ip1 and ip2;If both are different, that is, it is illegal to show connected wireless access points;
    Otherwise, it is legal wireless access points to connect wireless access points;
    By above-mentioned steps, the identification of wireless access points legitimacy under Campus Net is realized.
  3. 3. the recognition methods of wireless access points legitimacy under Campus Net as claimed in claim 1, it is characterized in that, checking Client can run in various intelligent mobile terminal equipments, intelligent mobile terminal equipment include smart mobile phone, notebook computer, iPad。
CN201710939686.4A 2017-10-11 2017-10-11 The recognition methods of wireless access points legitimacy under a kind of Campus Net Expired - Fee Related CN107529165B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710939686.4A CN107529165B (en) 2017-10-11 2017-10-11 The recognition methods of wireless access points legitimacy under a kind of Campus Net

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710939686.4A CN107529165B (en) 2017-10-11 2017-10-11 The recognition methods of wireless access points legitimacy under a kind of Campus Net

Publications (2)

Publication Number Publication Date
CN107529165A true CN107529165A (en) 2017-12-29
CN107529165B CN107529165B (en) 2019-09-13

Family

ID=60684979

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710939686.4A Expired - Fee Related CN107529165B (en) 2017-10-11 2017-10-11 The recognition methods of wireless access points legitimacy under a kind of Campus Net

Country Status (1)

Country Link
CN (1) CN107529165B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113973006A (en) * 2021-09-18 2022-01-25 重庆云华科技有限公司 Intranet data access management method and system
US11477093B2 (en) * 2004-12-14 2022-10-18 Kyndryl, Inc. Coupling of a business component model to an information technology model

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8074279B1 (en) * 2007-12-28 2011-12-06 Trend Micro, Inc. Detecting rogue access points in a computer network
CN103313429A (en) * 2013-07-10 2013-09-18 江苏君立华域信息安全技术有限公司 Processing method for recognizing fabricated WIFI (Wireless Fidelity) hotspot
CN103634270A (en) * 2012-08-21 2014-03-12 中国电信股份有限公司 A method for identifying validity of an access point, a system thereof and an access point discriminating server
CN103648094A (en) * 2013-11-19 2014-03-19 华为技术有限公司 Method, device and system for detecting illegal wireless access point
CN105792216A (en) * 2016-05-18 2016-07-20 上海交通大学 Wireless phishing access point detection method based on authentication
CN105792205A (en) * 2016-03-03 2016-07-20 广东顺德中卡云网络科技有限公司 Method for client to initiate verification of access point validity

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8074279B1 (en) * 2007-12-28 2011-12-06 Trend Micro, Inc. Detecting rogue access points in a computer network
CN103634270A (en) * 2012-08-21 2014-03-12 中国电信股份有限公司 A method for identifying validity of an access point, a system thereof and an access point discriminating server
CN103313429A (en) * 2013-07-10 2013-09-18 江苏君立华域信息安全技术有限公司 Processing method for recognizing fabricated WIFI (Wireless Fidelity) hotspot
CN103648094A (en) * 2013-11-19 2014-03-19 华为技术有限公司 Method, device and system for detecting illegal wireless access point
CN105792205A (en) * 2016-03-03 2016-07-20 广东顺德中卡云网络科技有限公司 Method for client to initiate verification of access point validity
CN105792216A (en) * 2016-05-18 2016-07-20 上海交通大学 Wireless phishing access point detection method based on authentication

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
钟九洲: "检测校园网WLAN中非法的AP", 《网络安全技术与应用》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11477093B2 (en) * 2004-12-14 2022-10-18 Kyndryl, Inc. Coupling of a business component model to an information technology model
CN113973006A (en) * 2021-09-18 2022-01-25 重庆云华科技有限公司 Intranet data access management method and system

Also Published As

Publication number Publication date
CN107529165B (en) 2019-09-13

Similar Documents

Publication Publication Date Title
TWI718354B (en) Safety verification method, platform, device and system
CN100369446C (en) Method for testing safety switch-in protocol conformity of turn-on point and system thereof
CN106233663B (en) System and method for carrying strong authentication event on the different channels
CN104254073B (en) The method and device being authenticated to access terminal
WO2017134632A1 (en) Method and apparatus for facilitating frictionless two-factor authentication
KR20150071422A (en) Apparatus and method for identifying rogue device
CN103905194B (en) Identity traceability authentication method and system
CN106961683B (en) Method and system for detecting illegal AP and discoverer AP
CN108989434B (en) Medical service method based on Internet of Things
CN109872424A (en) A kind of unlocking method, device, electronic equipment and storage medium
CN108011873A (en) A kind of illegal connection determination methods based on set covering
CN107529165B (en) The recognition methods of wireless access points legitimacy under a kind of Campus Net
AlQahtani et al. Ts2fa: Trilateration system two factor authentication
CN104837159B (en) Android platform OAuth agreements misapply safety detection method
Chen et al. Enhancing Wi-Fi Device Authentication Protocol Leveraging Channel State Information
CN106888091A (en) Trustable network cut-in method and system based on EAP
CN107707560B (en) Authentication method, system, network access equipment and Portal server
KR101583698B1 (en) Authentication system and method for device attempting connection
CN108282551A (en) Message identifying processing method, apparatus, audiomonitor and readable storage medium storing program for executing
CN107241461B (en) MAC Address acquisition methods, gateway, network authentication apparatus and network system
CN106412904B (en) Method and system for preventing counterfeit user authentication authority
US10305884B2 (en) Secure identification of internet hotspots for the passage of sensitive information
EP3048757A1 (en) Authentication server testing method and system
Prayogi et al. Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover
CN107360573B (en) Terminal access method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190913