CN108174385B - Method and device for detecting communication link - Google Patents

Method and device for detecting communication link Download PDF

Info

Publication number
CN108174385B
CN108174385B CN201810146771.XA CN201810146771A CN108174385B CN 108174385 B CN108174385 B CN 108174385B CN 201810146771 A CN201810146771 A CN 201810146771A CN 108174385 B CN108174385 B CN 108174385B
Authority
CN
China
Prior art keywords
target data
wireless access
user terminal
communication link
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810146771.XA
Other languages
Chinese (zh)
Other versions
CN108174385A (en
Inventor
苗光胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hisense Co Ltd
Original Assignee
Hisense Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hisense Co Ltd filed Critical Hisense Co Ltd
Priority to CN201810146771.XA priority Critical patent/CN108174385B/en
Publication of CN108174385A publication Critical patent/CN108174385A/en
Application granted granted Critical
Publication of CN108174385B publication Critical patent/CN108174385B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Abstract

The embodiment of the invention provides a method and a device for detecting a communication link, wherein the method comprises the following steps: generating target data; sending the target data to a server through the wireless access device; monitoring the target data returned by the server through the wireless access equipment to obtain a monitoring result; and detecting a communication link between the user terminal and the wireless access equipment according to the monitoring result. By constructing the communication environment between the wireless access equipment and the user terminal and tracking target data, whether a communication link between the user terminal and the wireless access equipment has transfer equipment is detected based on communication behaviors, common man-in-the-middle attack problems in a wireless network environment can be effectively resisted, the detection accuracy is improved, and the safety of the user terminal in the wireless network environment is improved.

Description

Method and device for detecting communication link
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for detecting a communication link.
Background
With the increasing development of wireless network technology, in daily life, people mainly use a wireless access mode as a main mode and access user terminals such as mobile terminals and intelligent furniture into a network, so that the wireless network occupies a very important position in the ordinary life and work of people, and the life of people is more and more dependent on the wireless network.
Meanwhile, as the flow of the wireless network increases, the wireless network bears more and more private information and becomes an object of hackers and lawbreakers, and the potential safety hazard of the wireless network becomes increasingly obvious.
In the existing attack means aiming at the wireless network, man-in-the-middle attack is a common attack means due to simplicity and convenience.
The man-in-the-middle attack means that an attacker inserts illegal programs into a communication link between a user terminal and wireless access equipment to eavesdrop network transmission of the user terminal, so that sensitive information of the user is leaked, and even further economic and reputation losses are caused.
In particular, most wireless access devices have obvious weak points in the aspect of network disconnection attack, so that an attacker can easily disconnect the connection with the user terminal and insert illegal programs, and the risk of man-in-the-middle attack is more prominent.
At present, the man-in-the-middle is detected through the identity, such as SSID (Service Set Identifier), MAC (Media Access Control) address, etc., but an attacker can easily modify these identity, which results in that the man-in-the-middle cannot be detected, resulting in a low accuracy of detection.
Disclosure of Invention
The embodiment of the invention provides a method and a device for detecting a communication link, which aim to solve the problem of low accuracy of detecting a man-in-the-middle through an identity.
According to an aspect of the present invention, there is provided a method for detecting a communication link, where the method is applied in a user terminal, and the user terminal accesses a wireless access device, and the method includes:
generating target data;
sending the target data to a server through the wireless access device;
monitoring the target data returned by the server through the wireless access equipment to obtain a monitoring result;
and detecting a communication link between the user terminal and the wireless access equipment according to the monitoring result.
Optionally, before the sending, by the wireless access device, the target data to a server, the method further includes:
and carrying out time synchronization with the server.
Optionally, the sending, by the wireless access device, the target data to a server includes:
detecting a channel of the wireless access device;
and respectively transmitting the target data to a server in each channel.
Optionally, the monitoring the target data returned by the server through the wireless access device to obtain a monitoring result includes:
detecting a channel of the wireless access device;
respectively monitoring the target data returned by the server in the set feedback time in each channel;
wherein the feedback time is set by the user terminal or is a default time.
Optionally, the detecting a communication link between the user equipment and the wireless access device according to the monitoring result includes:
judging whether a forwarding behavior aiming at the target data exists or not from the monitoring result;
if yes, determining that a communication link between the user terminal and the wireless access equipment has transfer equipment;
if not, determining that the communication link between the user terminal and the wireless access equipment does not have transit equipment.
Optionally, the determining whether a forwarding behavior for the target data exists from the monitoring result includes:
determining a sending object of the target data from the monitoring result;
if the sending object is the user terminal, determining that no forwarding behavior aiming at the target data exists;
and if the sending object is not the user terminal, determining that the forwarding behavior aiming at the target data exists.
Optionally, the determining whether a forwarding behavior for the target data exists from the monitoring result includes:
determining a channel for receiving the target data from the monitoring result;
and if the channel for receiving the target data is different from the channel for sending the target data, determining that the forwarding behavior aiming at the target data exists.
Optionally, the method further comprises:
and if a communication link between the user terminal and the wireless access equipment has transfer equipment, generating risk prompt information aiming at the transfer equipment.
According to another aspect of the present invention, there is provided an apparatus for detecting a communication link, where the apparatus is applied in a user terminal, and the user terminal accesses a wireless access device, the apparatus includes:
the target data generation module is used for generating target data;
the target data sending module is used for sending the target data to a server through the wireless access equipment;
the target data monitoring module is used for monitoring the target data returned by the server through the wireless access equipment to obtain a monitoring result;
and the communication link detection module is used for detecting the communication link between the user terminal and the wireless access equipment according to the monitoring result.
Optionally, the method further comprises:
and the time synchronization module is used for carrying out time synchronization with the server.
Optionally, the target data sending module includes:
the first channel detection submodule is used for detecting a channel of the wireless access equipment;
and the channel sending submodule is used for respectively sending the target data to the server in each channel.
Optionally, the target data listening module includes:
the second channel detection submodule is used for detecting a channel of the wireless access equipment;
the channel monitoring submodule is used for respectively monitoring the target data returned by the server in the set feedback time in each channel;
wherein the feedback time is set by the user terminal or is a default time.
Optionally, the communication link detection module includes:
a forwarding behavior judgment submodule, configured to judge whether a forwarding behavior for the target data exists from the monitoring result; if yes, calling a first determining submodule, and if not, calling a second determining submodule;
a first link determining submodule, configured to determine that a communication link between the user terminal and the wireless access device has a relay device;
and the second link determining submodule is used for determining that the communication link between the user terminal and the wireless access equipment does not have transit equipment.
Optionally, the forwarding behavior determining sub-module includes:
a transmission object determining unit, configured to determine a transmission object of the target data from the monitoring result;
a first forwarding determination unit, configured to determine that there is no forwarding behavior for the target data if the sending object is the user terminal;
a second forwarding determination unit, configured to determine that a forwarding behavior for the target data exists if the sending object is not the user terminal.
Optionally, the forwarding behavior determining sub-module includes:
a receiving channel determining unit, configured to determine a channel for receiving the target data from the listening result;
a third forwarding determination unit, configured to determine that a forwarding behavior exists for the target data if a channel receiving the target data is different from a channel transmitting the target data.
Optionally, the method further comprises:
and the risk prompt information generation module is used for generating risk prompt information aiming at the transit equipment if the transit equipment exists in a communication link between the user terminal and the wireless access equipment.
The embodiment of the invention has the following advantages:
in the embodiment of the invention, the user terminal generates the target data, sends the target data to the server through the wireless access equipment, then monitors the target data returned by the server through the wireless access equipment to obtain the monitoring result, detects the communication link between the user terminal and the wireless access equipment according to the monitoring result, and tracks the target data by constructing the communication environment between the wireless access equipment and the user terminal, thereby detecting whether the communication link between the user terminal and the wireless access equipment has the transfer equipment or not based on the communication behavior, effectively resisting the common man-in-the-middle attack problem in the wireless network environment, improving the detection accuracy and further improving the safety of the user terminal in the wireless network environment.
Drawings
FIG. 1 is a flow chart of the steps of a method of detecting a communication link in accordance with one embodiment of the present invention;
FIG. 2 is a flow chart illustrating steps of another method for detecting a communication link in accordance with one embodiment of the present invention;
fig. 3 is a block diagram illustrating a structure of a detection apparatus for a communication link according to an embodiment of the present invention.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Referring to fig. 1, a flowchart illustrating steps of a method for detecting a communication link according to an embodiment of the present invention is shown, which may specifically include the following steps:
step 101, generating target data.
In a specific implementation, the embodiments of the present invention may be applied to a user terminal, for example, a mobile terminal (e.g., a mobile phone, a tablet computer, a wearable device, etc.), an intelligent appliance (e.g., an air conditioner, a refrigerator, a television, etc.), a personal computer, and so on.
The user terminal accesses a Wireless access device, which may refer to a device that accesses a network in a Wireless manner such as Wi-Fi (Wireless fidelity) or bluetooth, for example, a router, a personal computer configured with a Wireless access point AP (Wireless access point), and the like.
In a communication link between the user terminal and the wireless access device, under normal conditions, only one hop exists between the user terminal and the wireless access device.
When the relay device exists, at least one hop is added between the user terminal and the wireless access device, and a forwarding behavior of a middle data packet (that is, the data packet originally sent to the user terminal is actually sent to other relay devices and then sent to the user terminal by the relay device) occurs, which may cause a forwarding phenomenon of the same wireless frame in a wireless channel.
This phenomenon exists due to the forwarding behavior of the relay device, and generally cannot be completely hidden, and can be detected in a certain manner, so that this difference can be used as a feature point for distinguishing multi-hop communication links, and as a basis for identifying the relay device.
In the embodiment of the invention, whether retransmission behaviors exist or not can be detected in a mode of issuing the watermark frame.
In a specific implementation, the target data may be generated in a preset generation manner, and used as a unique watermark frame to construct a communication environment between the user terminal and the wireless access device.
The watermark frame (target data) contains a bit string greater than or equal to a preset threshold, such as a bit string of no less than 128 bits, so as to reduce the probability of unintentional collision and avoid accidental coincidence of the watermark frame (target data) with other data frames.
And 102, sending the target data to a server through the wireless access equipment.
If the watermark frame (target data) is generated, the user terminal may send the watermark frame (target data) to the wireless access device in a wireless manner, and the wireless access device sends the watermark frame (target data) to the server, and requests the server to send the watermark frame (target data) back to the user terminal.
In one embodiment of the present invention, step 102 may include the following sub-steps:
and a substep S11 of detecting a channel of the wireless access device.
And a substep S12 of transmitting the target data to a server at each channel, respectively.
In the embodiment of the invention, the user terminal can detect the channel provided by the wireless access device and send the watermark frame (target data) to the server at least once in each channel.
Further, the number of times the watermark frame (target data) is sent to the server is equal to the number of channels of the wireless access device, i.e., the watermark frame (target data) is sent to the server once in each channel.
For example, if Wi-Fi is applied, i.e. the number of channels is 13, the user terminal may send a watermark frame (target data) to the server once per channel for 13 times.
And 103, monitoring the target data returned by the server through the wireless access equipment to obtain a monitoring result.
If the server returns the watermark frame (target data), the watermark frame (target data) is generally sent to the wireless access device, and the wireless access device sends the watermark frame (target data) to the user terminal.
Therefore, the user terminal may switch from the normal operation mode to the monitoring mode when transmitting the watermark frame (target data), monitor the wireless access device, and detect the condition that the server returns the watermark frame (target data), as a monitoring result, for example, whether the watermark frame (target data) is monitored, the transmission object, and the like.
In one embodiment of the present invention, step 103 may comprise the following sub-steps:
and a substep S21 of detecting a channel of the wireless access device.
And a substep S22, monitoring the target data returned by the server at the set feedback time on each channel respectively.
In the embodiment of the present invention, after receiving the watermark frame (target data) of the user terminal, the server may set a feedback time at which the user terminal is required to request and return the watermark frame (target data).
Wherein, the feedback time is set by the user terminal or is a default time.
For the situation set by the user terminal, the user terminal may set an appointed time, for example, 100ms, and when a watermark frame (target data) is transmitted, the appointed time is transmitted to the server together, and at this time, the server adds the appointed time to the time when receiving the watermark frame (target data), so as to obtain the feedback time.
For the case of a default time, the server may set a default time, such as 100ms, and the feedback time may be obtained by adding the default time to the time when the watermark frame (target data) is received.
In the listening mode, the user terminal can detect the channels provided by the wireless access device, and listen to the watermark frames (target data) possibly returned by the server in each channel in turn.
It should be noted that, the monitored channel is generally a public channel, and for the encrypted channel, monitoring may also be performed under the condition of knowing an encryption protocol, which is not limited in the embodiment of the present invention.
And 104, detecting a communication link between the user terminal and the wireless access equipment according to the monitoring result.
After monitoring the watermark frame (target data) transmitted back by the server, the user terminal can analyze the monitoring result and analyze the return characteristic of the watermark frame (target data), thereby detecting whether a communication link between the user terminal and the wireless access device has a transfer device.
If the watermark frame (target data) returned by the server is not monitored, the relay device may not exist, and the situations that the transmission of the watermark frame (target data) fails, the monitoring is omitted, the relay device is not forwarded in time and the like may also exist, and at this time, the monitoring can be continued.
In one embodiment of the present invention, step 104 may include the following sub-steps:
a substep S31, determining whether there is a forwarding behavior for the target data from the monitoring result; if yes, go to substep S32, otherwise go to substep S33.
And a substep S32 of determining that a relay device exists in the communication link between the user terminal and the wireless access device.
And a substep S33 of determining that no relay device exists in the communication link between the user terminal and the wireless access device.
In a specific implementation, the user terminal may analyze, from the monitoring result, whether a forwarding behavior exists in a communication link between the user terminal and the wireless access device in the watermark frame (target data).
If the forwarding behavior exists, a high probability exists in the forwarding device, and the watermark frame (target data) is forwarded and is not directly sent to the user terminal from the wireless access device.
If the forwarding behavior does not exist, the relay device does not exist at a higher probability, and the watermark frame (target data) is directly sent to the user terminal from the wireless access device.
In an example of detecting the forwarding behavior, a transmission target of the target data may be determined from the monitoring result, where the transmission target is a device that the wireless access device transmits the watermark frame (target data), and may be identified by information such as a MAC address and an IP (internet protocol) address.
If the transmission object is a user terminal, that is, the wireless access device directly transmits the watermark frame (target data) to the user terminal, it may be determined that there is no forwarding behavior for the target data.
If the transmission object is not the user terminal, that is, the wireless access device transmits the watermark frame (target data) to other devices, it may be determined that a forwarding behavior for the target data exists.
In another example of detection of forwarding behavior, the channel on which the target data is received is determined from the listening results.
Generally, to reduce signal interference, different devices access different channels of the wireless access device and do not access the same channel of the wireless access device.
Therefore, if the channel for receiving the target data is different from the channel for transmitting the target data, that is, the wireless access device transmits the watermark frame (target data) to another device with a high probability, it can be determined that there is a forwarding behavior for the target data.
If the channel for receiving the target data is the same as the channel for transmitting the target data, it may be determined that the transmission object of the target data is determined from the monitoring result, and the transmission object may be detected.
Of course, the foregoing detection manner of the forwarding behavior is only an example, and when implementing the embodiment of the present invention, other detection manners of the forwarding behavior may be set according to an actual situation, which is not limited in this embodiment of the present invention. In addition, besides the foregoing detection manner of the forwarding behavior, a person skilled in the art may also adopt other detection manners of the forwarding behavior according to actual needs, and the embodiment of the present invention is not limited to this.
In the embodiment of the invention, the user terminal generates the target data, sends the target data to the server through the wireless access equipment, then monitors the target data returned by the server through the wireless access equipment to obtain the monitoring result, detects the communication link between the user terminal and the wireless access equipment according to the monitoring result, and tracks the target data by constructing the communication environment between the wireless access equipment and the user terminal, thereby detecting whether the communication link between the user terminal and the wireless access equipment has the transfer equipment or not based on the communication behavior, effectively resisting the common man-in-the-middle attack problem in the wireless network environment, improving the detection accuracy and further improving the safety of the user terminal in the wireless network environment.
Referring to fig. 2, a flowchart illustrating steps of another method for detecting a communication link according to an embodiment of the present invention is shown, which may specifically include the following steps:
step 201, synchronizing time with the server.
To avoid detection omission of the user terminal, the time of the user terminal and the time of the server may be synchronized at millisecond level before the watermark frame (target data) is sent, so as to ensure the coordination of the behaviors of the user terminal and the server.
In a specific implementation, the user terminal may designate a synchronized clock server, notify the server of the clock server, and perform time synchronization with the clock server separately for the user terminal and the server, so that the two implement time synchronization.
Of course, besides synchronizing the clock servers at the same time, the user terminal and the server may also synchronize based on the time of any one of the two devices, which is not limited in this embodiment of the present invention.
At step 202, target data is generated.
Step 203, sending the target data to a server through the wireless access device.
And 204, monitoring the target data returned by the server through the wireless access equipment to obtain a monitoring result.
Step 205, detecting a communication link between the user equipment and the wireless access device according to the monitoring result.
Step 206, if a communication link between the user terminal and the wireless access device has a transit device, generating risk prompt information for the transit device.
In general, the presence of the relay device has a high security risk, and therefore, risk prompt information can be generated for the relay device to prompt the user to confirm security.
It should be noted that in some special deployment environments, such as houses, factories, etc. with large areas, in order to improve signal quality and coverage, several signal repeaters (i.e. relay devices) are deployed, and these repeaters are legal for packet forwarding.
Therefore, the existing transfer equipment is not necessarily unsafe, and the user terminal can judge whether the transfer equipment is legal or not by combining the actual deployment situation of the current equipment and take corresponding counter measures to avoid the occurrence of safety events.
It should be noted that, for simplicity of description, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the illustrated order of acts, as some steps may occur in other orders or concurrently in accordance with the embodiments of the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no particular act is required to implement the invention.
Referring to fig. 3, a block diagram of a structure of a detection apparatus for a communication link according to an embodiment of the present invention is shown, and the detection apparatus is applied in a user terminal, where the user terminal accesses a wireless access device, and the apparatus may specifically include the following modules:
a target data generation module 301 for generating target data;
a target data sending module 302, configured to send the target data to a server through the wireless access device;
a target data monitoring module 303, configured to monitor the target data returned by the server through the wireless access device, so as to obtain a monitoring result;
a communication link detection module 304, configured to detect a communication link between the ue and the wireless access device according to the monitoring result.
In one embodiment of the present invention, further comprising:
and the time synchronization module is used for carrying out time synchronization with the server.
In an embodiment of the present invention, the target data sending module 302 includes:
the first channel detection submodule is used for detecting a channel of the wireless access equipment;
and the channel sending submodule is used for respectively sending the target data to the server in each channel.
In an embodiment of the present invention, the target data listening module 303 includes:
the second channel detection submodule is used for detecting a channel of the wireless access equipment;
the channel monitoring submodule is used for respectively monitoring the target data returned by the server in the set feedback time in each channel;
wherein the feedback time is set by the user terminal or is a default time.
In one embodiment of the present invention, the communication link detection module 304 includes:
a forwarding behavior judgment submodule, configured to judge whether a forwarding behavior for the target data exists from the monitoring result; if yes, calling a first determining submodule, and if not, calling a second determining submodule;
a first link determining submodule, configured to determine that a communication link between the user terminal and the wireless access device has a relay device;
and the second link determining submodule is used for determining that the communication link between the user terminal and the wireless access equipment does not have transit equipment.
In an example of the embodiment of the present invention, the forwarding behavior determination sub-module includes:
a transmission object determining unit, configured to determine a transmission object of the target data from the monitoring result;
a first forwarding determination unit, configured to determine that there is no forwarding behavior for the target data if the sending object is the user terminal;
a second forwarding determination unit, configured to determine that a forwarding behavior for the target data exists if the sending object is not the user terminal.
In another example of the embodiment of the present invention, the forwarding behavior determination sub-module includes:
a receiving channel determining unit, configured to determine a channel for receiving the target data from the listening result;
a third forwarding determination unit, configured to determine that a forwarding behavior exists for the target data if a channel receiving the target data is different from a channel transmitting the target data.
In one embodiment of the present invention, further comprising:
and the risk prompt information generation module is used for generating risk prompt information aiming at the transit equipment if the transit equipment exists in a communication link between the user terminal and the wireless access equipment.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, embodiments of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications of these embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the embodiments of the invention.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The above detailed description is provided for a method and a device for detecting a communication link, and a specific example is applied in this document to explain the principle and the implementation of the present invention, and the description of the above embodiment is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (7)

1. A method for detecting a communication link, wherein the method is applied in a user terminal, and the user terminal accesses a wireless access device, and the method comprises:
generating target data;
sending the target data to a server through the wireless access device;
monitoring the target data returned by the server through the wireless access equipment to obtain a monitoring result;
detecting a communication link between the user terminal and the wireless access equipment according to the monitoring result;
the detecting the communication link between the user equipment and the wireless access device according to the monitoring result includes:
judging whether a forwarding behavior aiming at the target data exists or not from the monitoring result;
if yes, determining that a communication link between the user terminal and the wireless access equipment has transfer equipment;
if not, determining that a communication link between the user terminal and the wireless access equipment does not have transit equipment;
the determining whether a forwarding behavior for the target data exists from the monitoring result includes:
determining a channel for receiving the target data from the monitoring result;
and if the channel for receiving the target data is different from the channel for sending the target data, determining that the forwarding behavior aiming at the target data exists.
2. The method of claim 1, wherein prior to the sending the target data to the server by the wireless access device, further comprising:
and carrying out time synchronization with the server.
3. The method of claim 1, wherein the sending, by the wireless access device, the target data to a server comprises:
detecting a channel of the wireless access device;
and respectively transmitting the target data to a server in each channel.
4. The method of claim 1, wherein the listening, by the wireless access device, of the target data returned by the server to obtain a listening result comprises:
detecting a channel of the wireless access device;
respectively monitoring the target data returned by the server in the set feedback time in each channel;
wherein the feedback time is set by the user terminal or is a default time.
5. The method of claim 1, wherein the determining whether forwarding behavior exists for the target data from the snoop result comprises:
determining a sending object of the target data from the monitoring result;
if the sending object is the user terminal, determining that no forwarding behavior aiming at the target data exists;
and if the sending object is not the user terminal, determining that the forwarding behavior aiming at the target data exists.
6. The method according to any one of claims 1-4, further comprising:
and if a communication link between the user terminal and the wireless access equipment has transfer equipment, generating risk prompt information aiming at the transfer equipment.
7. An apparatus for detecting a communication link, wherein the apparatus is applied in a user terminal, and the user terminal accesses a wireless access device, the apparatus comprising:
the target data generation module is used for generating target data;
the target data sending module is used for sending the target data to a server through the wireless access equipment;
the target data monitoring module is used for monitoring the target data returned by the server through the wireless access equipment to obtain a monitoring result;
a communication link detection module, configured to detect a communication link between the user terminal and the wireless access device according to the monitoring result;
the communication link detection module includes:
a forwarding behavior judgment submodule, configured to judge whether a forwarding behavior for the target data exists from the monitoring result; if yes, calling a first determining submodule, and if not, calling a second determining submodule;
a first link determining submodule, configured to determine that a communication link between the user terminal and the wireless access device has a relay device;
a second link determining submodule, configured to determine that a relay device does not exist in a communication link between the user terminal and the wireless access device;
the forwarding behavior judgment submodule includes:
a receiving channel determining unit, configured to determine a channel for receiving the target data from the listening result;
a third forwarding determination unit, configured to determine that a forwarding behavior exists for the target data if a channel receiving the target data is different from a channel transmitting the target data.
CN201810146771.XA 2018-02-12 2018-02-12 Method and device for detecting communication link Active CN108174385B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810146771.XA CN108174385B (en) 2018-02-12 2018-02-12 Method and device for detecting communication link

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810146771.XA CN108174385B (en) 2018-02-12 2018-02-12 Method and device for detecting communication link

Publications (2)

Publication Number Publication Date
CN108174385A CN108174385A (en) 2018-06-15
CN108174385B true CN108174385B (en) 2020-07-10

Family

ID=62513877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810146771.XA Active CN108174385B (en) 2018-02-12 2018-02-12 Method and device for detecting communication link

Country Status (1)

Country Link
CN (1) CN108174385B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111711544B (en) * 2020-05-15 2021-11-09 北京奇艺世纪科技有限公司 Link dial testing method and device, electronic equipment and storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102036242B (en) * 2009-09-29 2014-11-05 中兴通讯股份有限公司 Access authentication method and system in mobile communication network
CN101820396B (en) * 2010-05-24 2012-04-18 杭州华三通信技术有限公司 Method and device for verifying message safety
CN101951688A (en) * 2010-08-20 2011-01-19 华为技术有限公司 Service access method, equipment and system for wireless local area network
CN103152335A (en) * 2013-02-20 2013-06-12 神州数码网络(北京)有限公司 Method and device for preventing ARP (address resolution protocol) deceit on network equipment
CN105119901B (en) * 2015-07-17 2018-07-17 中国科学院信息工程研究所 A kind of detection method and system of fishing hot spot
CN105142158A (en) * 2015-08-07 2015-12-09 上海斐讯数据通信技术有限公司 Testing system and method of wireless channel automatic selection function
CN106790212A (en) * 2017-01-07 2017-05-31 北京坤腾畅联科技有限公司 The method and terminal device of the analysis detection man-in-the-middle attack based on temporal characteristics

Also Published As

Publication number Publication date
CN108174385A (en) 2018-06-15

Similar Documents

Publication Publication Date Title
Bhargava et al. Security enhancements in AODV protocol for wireless ad hoc networks
KR101501669B1 (en) Behavior detection system for detecting abnormal behavior
KR101949116B1 (en) Proximity Discovery, Authentication and Link Establishment Between Mobile Devices in 3GPP LTE
US11824892B2 (en) Terminal matching method and apparatus
US9450973B2 (en) Method and apparatus for machine to machine network security monitoring in a communications network
Wazid et al. RAD‐EI: A routing attack detection scheme for edge‐based Internet of Things environment
KR102102835B1 (en) Wips sensor
CN113169962A (en) Detection of security threats in a mesh network
CN105933895A (en) Transmission method of WIFI network configuration data, intelligent device, and intelligent terminal
JP2023517107A (en) Wireless intrusion prevention system, wireless network system including same, and method of operating wireless network system
KR102323712B1 (en) Wips sensor and method for preventing an intrusion of an illegal wireless terminal using wips sensor
EP2874367A1 (en) Call authentication method, device, and system
CN108174385B (en) Method and device for detecting communication link
CN102026186B (en) Service network detection system and method
US11689928B2 (en) Detecting unauthorized access to a wireless network
JP2018511282A (en) WIPS sensor and terminal blocking method using the same
CN106912049B (en) Method for improving user authentication experience
Tuen Security in Internet of Things Systems
CN116235462A (en) Method for protecting encrypted user identity from replay attacks
Kitisriworapan et al. Evil-twin detection on client-side
Abodunrin et al. Some dangers from 2g networks legacy support and a possible mitigation
KR102285257B1 (en) Apparatus and method for detection of wireless intrusion detection system using WiFi access point
KR101192446B1 (en) Smart wireless intrusion prevention system and sensor using cloud sensor network
WO2017157255A1 (en) Local breakout-based data interception method and device
CN111343611B (en) Information synchronization method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant