CN116828474A - WiFi implementation method, system and medium based on environmental security - Google Patents

WiFi implementation method, system and medium based on environmental security Download PDF

Info

Publication number
CN116828474A
CN116828474A CN202311100446.7A CN202311100446A CN116828474A CN 116828474 A CN116828474 A CN 116828474A CN 202311100446 A CN202311100446 A CN 202311100446A CN 116828474 A CN116828474 A CN 116828474A
Authority
CN
China
Prior art keywords
information
network
security
data
environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202311100446.7A
Other languages
Chinese (zh)
Other versions
CN116828474B (en
Inventor
陈先成
王志旺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Green Apple Technology Co ltd
Original Assignee
Beijing Green Apple Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Green Apple Technology Co ltd filed Critical Beijing Green Apple Technology Co ltd
Priority to CN202311100446.7A priority Critical patent/CN116828474B/en
Publication of CN116828474A publication Critical patent/CN116828474A/en
Application granted granted Critical
Publication of CN116828474B publication Critical patent/CN116828474B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application provides a WiFi implementation method, system and medium based on environmental security, and belongs to the technical field of network communication implementation. The method comprises the following steps: determining influence factors of environmental safety assessment by acquiring network technical equipment information and network environmental safety assessment tool information, processing the network technical equipment information and the network environmental safety assessment tool information through a preset environmental safety assessment model to obtain an environmental safety index, comparing the environmental safety index with an environmental safety threshold to obtain an environmental safety relative value, and comparing the environmental safety relative value with an environmental safety level threshold to obtain environmental safety level information, so as to further determine a corresponding WiFi implementation method. According to the application, the environmental security level is determined by analyzing the network technical equipment information and the network environmental security assessment tool information, so that the WiFi implementation method based on environmental security is realized.

Description

WiFi implementation method, system and medium based on environmental security
Technical Field
The application relates to the technical field of network communication implementation, in particular to an environment security-based WiFi implementation method, system and medium.
Background
Wireless network communication technology (WiFi) is a wireless local area network technology created in the IEEE 802.11 standard. The wireless network communication technology can be understood as wireless internet surfing, and almost all smart phones, tablet personal computers and notebook personal computers support WiFi internet surfing at present, and is the most widely used wireless network transmission technology at present. With the continuous development of wireless network technology, wireless network security problems are increasing, and the wireless network security problems are gradually brought into the spotlight and the attention is paid. The network environment safety relates to the information safety and property safety of users, which is an important issue about social stability, however, the current wireless network communication technology still has great potential safety hazards, and the network use safety of wireless network users is not effectively ensured.
In view of the above problems, an effective technical solution is currently needed.
Disclosure of Invention
In view of the above problems, the present application aims to provide an environment security-based WiFi implementation method, system and medium, which can determine the influencing factor of the environment security evaluation by acquiring network technology equipment information and network environment security evaluation tool information, then process the network technology equipment information and the network environment security evaluation tool information through a preset environment security evaluation model, obtain an environment security index, then compare the environment security index with an environment security threshold value to obtain an environment security relative value, and then compare the environment security relative value with an environment security level threshold value to obtain environment security level information, thereby determining a corresponding WiFi implementation method. According to the application, the environmental security level is determined by analyzing the network technical equipment information and the network environmental security assessment tool information, so that the WiFi implementation method based on environmental security is realized.
The application also provides a WiFi implementation method based on environmental security, which comprises the following steps:
acquiring network technical equipment information and network environment security information;
the network technology equipment information comprises server information, router information and switch information;
the network environment security information comprises network scanner information, vulnerability scanner information, web application scanner information, intrusion detection system information, security information and event management system information;
processing according to the network technical equipment information and the network environment safety information through a preset environment safety evaluation model to obtain an environment safety index;
comparing the environmental safety index with a preset environmental safety threshold value, and obtaining an environmental safety relative value according to a threshold value comparison result;
comparing the environmental safety relative value with a preset environmental safety level threshold value, and obtaining environmental safety level information according to a threshold value comparison result;
and obtaining corresponding WiFi implementation method information according to the environmental security level information.
Optionally, in the WiFi implementation method based on environmental security according to the present application, the processing according to the network technology device information and the network environmental security information through a preset environmental security assessment model to obtain an environmental security index specifically includes:
Obtaining network technical equipment security data according to the server information, the router information and the switch information;
obtaining network environment security data according to the network scanner information, the vulnerability scanner information, the Web application scanner information, the intrusion detection system information, the security information and the event management system information;
processing according to the network technical equipment safety data and the network environment safety data through a preset environment safety evaluation model to obtain an environment safety index;
the calculation formula of the environmental safety index is as follows:
wherein ,for environmental safety index, ++>Security data for network technology devices, < >>Security data for network environment->、/>Is a preset characteristic coefficient.
In this scheme, still include:
acquiring WiFi network use mode information;
the WiFi network use mode information comprises private network information and public network information;
determining service set identification mode information according to the private network information and public network information;
the service set identification mode information comprises service set identification broadcast mode information and forbidden service set identification broadcast mode information;
acquiring network connection mode confirmation information according to the forbidden service set identification broadcast mode information;
The network connection mode confirmation information comprises fingerprint confirmation information or face recognition confirmation information of a network administrator.
In this scheme, still include:
acquiring network performance requirement information, wherein the network performance requirement information comprises: network speed requirement information, network stability information and network security requirement information;
respectively extracting corresponding network speed requirement data, network stability data and network security requirement data according to the network speed requirement information, the network stability information and the network security requirement information;
processing according to the network speed requirement data, the network stability data and the network security requirement data to obtain a network hierarchical login index;
comparing the network hierarchical login index with a preset network hierarchical login threshold value according to the network hierarchical login index, and obtaining network hierarchical login mode information according to a threshold value comparison result;
the network hierarchical login mode information comprises password login mode information, registration login mode information or password-free login mode information;
the calculation formula of the network hierarchical login index is as follows:
wherein ,hierarchical login index for network,/->Request data for network speed, < >>For network stability data, ++ >Data for network security requirements->、/>、/>Is a preset characteristic coefficient.
In this scheme, still include:
acquiring network environment security change data, including security patch release data, abnormal operation and maintenance log data and access key upgrading data;
inputting the security patch release data, the abnormal operation and maintenance log data and the access key upgrading data into a preset environment security level detection model for processing to obtain a network environment security change level;
obtaining corresponding WiFi accessible range change information according to the network environment security change level;
the WiFi accessible range change information comprises accessible website change information and accessible application change information;
the WiFi accessible range change information is sent to a user mobile equipment end for display;
the calculation formula of the network environment security change level number is as follows:
wherein ,for the security change level of network environment, +.>、/>、/>Security patch release data, abnormal operation log data, access key upgrade data,/->、/>、/>Respectively preset characteristic coefficients.
In this scheme, still include:
acquiring WiFi resource data;
the WiFi resource data comprise WiFi total resource data, merchant resource guarantee data and customer resource guarantee data;
Acquiring networking user attribute information, including customer information and tourist information;
extracting the number of the networked people of the client application according to the client information, and extracting the number of the networked people of the client application according to the client information;
processing according to the WiFi total resource data, the merchant resource guarantee data and the customer resource guarantee data in combination with the customer networking application number and the tourist networking application number respectively to obtain corresponding customer network resource allocation data and tourist network resource allocation data;
synthesizing network resource dynamic allocation data according to the customer network resource allocation data and the guest network resource allocation data;
the network resource dynamic allocation data is sent to a management end for display;
the dynamic adjustment formula of the dynamic allocation data of the network resources is as follows:
wherein ,distributing data for the network resources of the customer; />Distributing data for the network resources of the tourist; />For WiFi total resource data, < > for>Guaranteeing data for merchant resources->And g is the number of the networked application of the customers, and y is the number of the networked application of the tourists.
In a second aspect, the present application provides an environmentally safe WiFi implementation system, the system comprising: the system comprises a memory and a processor, wherein the memory comprises a program of an environment-based safe WiFi implementation method, and the program of the environment-based safe WiFi implementation method realizes the following steps when being executed by the processor:
Acquiring network technical equipment information and network environment security information;
the network technology equipment information comprises server information, router information and switch information;
the network environment security information comprises network scanner information, vulnerability scanner information, web application scanner information, intrusion detection system information, security information and event management system information;
processing according to the network technical equipment information and the network environment safety information through a preset environment safety evaluation model to obtain an environment safety index;
comparing the environmental safety index with a preset environmental safety threshold value, and obtaining an environmental safety relative value according to a threshold value comparison result;
comparing the environmental safety relative value with a preset environmental safety level threshold value, and obtaining environmental safety level information according to a threshold value comparison result;
and obtaining corresponding WiFi implementation method information according to the environmental security level information.
Optionally, in the WiFi implementation system based on environmental security according to the present application, the processing according to the network technology device information and the network environmental security information through a preset environmental security assessment model to obtain an environmental security index specifically includes:
Obtaining network technical equipment security data according to the server information, the router information and the switch information;
obtaining network environment security data according to the network scanner information, the vulnerability scanner information, the Web application scanner information, the intrusion detection system information, the security information and the event management system information;
processing according to the network technical equipment safety data and the network environment safety data through a preset environment safety evaluation model to obtain an environment safety index;
the calculation formula of the environmental safety index is as follows:
wherein ,for environmental safety index, ++>Security data for network technology devices, < >>For the security data of the network environment,、/>is a preset characteristic coefficient.
Optionally, in the WiFi implementation system based on environmental security according to the present application, the method further includes:
acquiring WiFi network use mode information;
the WiFi network use mode information comprises private network information and public network information;
determining service set identification mode information according to the private network information and public network information;
the service set identification mode information comprises service set identification broadcast mode information and forbidden service set identification broadcast mode information;
Acquiring network connection mode confirmation information according to the forbidden service set identification broadcast mode information;
the network connection mode confirmation information comprises fingerprint confirmation information or face recognition confirmation information of a network administrator.
In a third aspect, the present application further provides a computer readable storage medium, where the computer readable storage medium includes an environment-based WiFi implementation method program, where the environment-based WiFi implementation method program, when executed by a processor, implements the steps of the foregoing environment-based WiFi implementation method.
As can be seen from the above, the WiFi implementation method, system and medium based on environmental security provided by the present application determine the influencing factor of environmental security assessment by obtaining the network technology equipment information and the network environmental security assessment tool information, then process the network technology equipment information and the network environmental security assessment tool information through a preset environmental security assessment model, obtain an environmental security index, then compare the environmental security index with an environmental security threshold value to obtain an environmental security relative value, and then compare the environmental security relative value with an environmental security level threshold value to obtain environmental security level information, thereby determining the corresponding WiFi implementation method. According to the application, the environmental security level is determined by analyzing the network technical equipment information and the network environmental security assessment tool information, so that the WiFi implementation method based on environmental security is realized.
Drawings
Fig. 1 is a flowchart of a WiFi implementation method based on environmental security according to an embodiment of the present application;
FIG. 2 is a flowchart of obtaining an environmental security index according to a WiFi implementation method based on environmental security according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a WiFi implementation system based on environmental security according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
Fig. 1 is a preferred flow diagram of an environmentally safe WiFi implementation of the application. The WiFi implementation method based on the environmental security comprises the following steps:
s101, acquiring network technical equipment information and network environment security information;
s102, the network technical equipment information comprises server information, router information and switch information;
s103, the network environment security information comprises network scanner information, vulnerability scanner information, web application scanner information, intrusion detection system information, security information and event management system information;
s104, processing according to the network technical equipment information and the network environment safety information through a preset environment safety evaluation model to obtain an environment safety index;
S105, comparing the environmental safety index with a preset environmental safety threshold value, and obtaining an environmental safety relative value according to a threshold value comparison result;
s106, comparing the environmental safety relative value with a preset environmental safety level threshold value, and obtaining environmental safety level information according to a threshold value comparison result;
and S107, obtaining corresponding WiFi implementation method information according to the environment security level information.
It should be noted that, the provision and application of the network include two parts, namely, a hardware part and a software part, and the security of the two parts needs to be comprehensively considered to judge the environmental security. Firstly, acquiring network technical equipment information comprising server information, router information and switch information, and acquiring network environment security information comprising network scanner information, vulnerability scanner information, web application scanner information, intrusion detection system information, security information and event management system information; and then respectively inputting the network technical equipment information and the network environment safety information into a preset environment safety evaluation model, comprehensively considering the factors of the two aspects through the processing of the model to obtain an environment safety index, and comparing the obtained environment safety index with a preset environment safety threshold. In this embodiment, the environmental safety index is calculated as 95, the preset environmental safety index is 100, the ratio is 95/100=0.95, and the threshold value comparison result is 0.95, which is the environmental safety relative value; and comparing the obtained environment safety relative value with a preset environment safety level threshold value to obtain the environment safety level. In this embodiment, the environmental security level threshold is set to [0,0.5 ] environmental security level is dangerous, [0.5,0.8 ] environmental security level is good, [0.8,1] environmental security level is good. When the relative value of the environmental safety is 0.95, comparing the environmental safety with the threshold value of the environmental safety level to obtain that the environmental safety level is better; according to the environmental security level, there are different corresponding WiFi implementation methods, including but not limited to different modes of login mode.
Fig. 2 is a flow chart of obtaining an environmental security index for an environmental security based WiFi implementation of the application. Obtaining an environmental security index through processing of a preset environmental security assessment model according to network technical equipment information and network environmental security information, wherein the method specifically comprises the following steps:
s201, obtaining network technology equipment security data according to the server information, the router information and the switch information;
s202, network environment security data is obtained according to the network scanner information, the vulnerability scanner information, the Web application scanner information, the intrusion detection system information, the security information and the event management system information;
s203, processing according to the network technical equipment safety data and the network environment safety data through a preset environment safety evaluation model to obtain an environment safety index;
the calculation formula of the environmental safety index is as follows:
wherein ,for environmental safety index, ++>Security data for network technology devices, < >>Security data for network environment->、/>Is a preset characteristic coefficient.
It should be noted that, since the environmental security includes two parts, namely, a network technical device security part and a network environmental security part. When the environment security is evaluated, the environment security index is required to be evaluated by combining the server information, the router information and the switch information, when the network technology equipment security data is calculated, the server, the router and the switch corresponding security data are required to be extracted correspondingly respectively, and then the server security data, the router security data and the switch security data are processed to obtain the equipment corresponding security data. The calculation formula of the network technical equipment safety data is as follows:
wherein ,security data for network technology devices, < >>For the network technical equipment safety weight factor, F is server safety data, L is router safety data, J is switch safety data,/I>、/>、/>The characteristic coefficient is preset (the preset characteristic coefficient is obtained by inquiring a preset third-party environment safety monitoring platform);
when computing network environment security data, corresponding security data of a network scanner, a vulnerability scanner, web application scanner information, intrusion detection system information and event management system information are required to be respectively extracted correspondingly according to the network scanner information, the vulnerability scanner information, the Web application scanner information, the intrusion detection system information and the event management system information, and the security data of the network scanner, the vulnerability scanner security data, the Web application scanner security data, the intrusion detection system security data, the security information data and the event management system security data are comprehensively processed according to the security information data extracted by the security information, so that security data corresponding to a network environment is obtained, and a calculation formula of the network environment security data is as follows:
wherein ,security data for network environment->For the network environment security weight factor, W is the network scanner security data, D is the vulnerability scanner security data, B is the Web application scanner security data, R is the intrusion detection system security data, A is the security information data, S is the event management system security data >、/>、/>、/>、/>、/>The characteristic coefficient is preset (the preset characteristic coefficient is obtained by inquiring a preset third-party environment safety monitoring platform);
and inputting the obtained network technical equipment safety data and network environment safety data into a preset environment safety evaluation model for calculation processing, and finally obtaining an environment safety index, wherein the environment safety index reflects the safety degree of the environment where the WiFi is positioned to a certain extent, and the WiFi implementation method can be adjusted according to the data.
According to an embodiment of the present invention, further comprising: acquiring WiFi network use mode information; the WiFi network use mode information comprises private network information and public network information; determining service set identification mode information according to the private network information and the public network information; the service set identification mode information includes service set identification broadcast mode information and forbidden service set identification broadcast mode information; according to the forbidden service set identification broadcasting mode information, obtaining network connection mode confirmation information; the network connection mode confirmation information includes fingerprint confirmation information or face recognition confirmation information of the network administrator.
When implementing the WiFi network, the information of the WiFi network usage mode needs to be known first. The current widely applied modes are private network information and public network information, and different network modes have different requirements on network security, so that different service set identification modes can be adopted for different WiFi network use modes, a wireless local area network can be divided into a plurality of sub-networks needing different identity verification by service set identification SSID (Service Set Identifier), each sub-network needs independent identity verification, and only users passing the identity verification can enter the corresponding sub-networks to prevent unauthorized users from entering the network. Simply stated, SSID is the name of a local area network; the service set identification broadcasting mode information means that the SSID is usually broadcast by the equipment transmitting the signal and can appear in the available network list searched by other people, and the forbidden service set identification broadcasting mode means that the wireless network can still be used and can not appear in the available network list searched by other people; the private mode is more focused on network security, other unknown users are not expected to be connected, so that the requirements on security and privacy are higher, and a forbidden service set identification broadcasting mode can be adopted when aiming at the private network mode, the network name of the private network in the mode is in a hidden state, other network users cannot search the network name, and the security is relatively higher; in this mode, the traditional connection application still needs to input a network name and a network password, the password has the possibility of leakage, a certain risk still exists, when other users need to apply for networking, the network name and the application reason are input and a networking request is sent to an administrator, and the administrator adopts fingerprint confirmation information or face recognition confirmation information, so that the security of the administrator can be improved.
According to an embodiment of the present invention, further comprising: acquiring network performance requirement information, wherein the network performance requirement information comprises: network speed requirement information, network stability information and network security requirement information; respectively extracting corresponding network speed requirement data, network stability data and network security requirement data according to the network speed requirement information, the network stability information and the network security requirement information; processing according to the network speed requirement data, the network stability data and the network security requirement data to obtain a network hierarchical login index; comparing the network hierarchical login index with a preset network hierarchical login threshold value according to the network hierarchical login index, and obtaining network hierarchical login mode information according to a threshold value comparison result; the network hierarchical login mode information comprises password login mode information, registration login mode information or password-free login mode information; the calculation formula of the network hierarchical login index is as follows:
wherein ,hierarchical login index for network,/->Request data for network speed, < >>In order to provide network stability data,data for network security requirements->、/>、/>The characteristic coefficient is preset (the preset characteristic coefficient is obtained by inquiring a preset third-party environment safety monitoring platform).
In work and life, different scenes and users often have different requirements on the network, so that the network is classified and used, certain necessity exists, when the network is classified and logged in, network performance requirement information is firstly obtained, the network performance requirement information comprises network speed requirement information, network stability information and network safety requirement information, the network speed requirement information refers to the requirement of the user on the internet surfing speed, the network stability information refers to the requirement of the user on the stability in the use process of the network, the network safety requirement information refers to the requirement of the user on the network safety performance, and in order to better allocate network resource modes, different requirements of different users on the network are met, and a network manager sets the network in a classified login mode in the system. Firstly, acquiring network speed requirement information, network stability information and network security requirement information, extracting corresponding data, processing the extracted data to obtain a network hierarchical login index, comparing the network hierarchical login index with a network hierarchical login threshold preset in a system, and obtaining network hierarchical login mode information according to comparison results, wherein the network hierarchical login mode information comprises password login mode information, registration login mode information or password-free login mode information, the password login mode of a primary network has high security performance, network speed, network stability and other network performances are good, and requirements of users with high requirements on environmental security and network, such as network managers and office workers in places can be met; the password login mode of the secondary network has environment safety and slightly poorer network performance than those of the primary network, can meet the relatively lower environment safety and network performance requirements of partial users, and needs network users to register and log in, such as registered customers, merchant staff and the like of a mall; the password is not needed when the password is used for logging in the password-free login mode information of the three-level network, the environmental safety and the network performance are relatively poor, the most basic network access requirements can be met, and the password-free login mode information is suitable for takeaway personnel, tourists and the like.
According to an embodiment of the present invention, further comprising: acquiring network environment security change data, including security patch release data, abnormal operation and maintenance log data and access key upgrading data; inputting the security patch release data, the abnormal operation and maintenance log data and the access key upgrading data into a preset environment security level detection model for processing to obtain a network environment security change level; obtaining corresponding WiFi accessible range change information according to the network environment security change level; the WiFi accessible range change information comprises accessible website change information and accessible application change information; the WiFi accessible range change information is sent to a user mobile equipment end for display; the calculation formula of the network environment security change level number is as follows:
wherein ,for the security change level of network environment, +.>、/>、/>Security patch release data, abnormal operation log data, access key upgrade data,/->、/>、/>Respectively preset characteristic coefficients (preset characteristic coefficients are obtained by preset third partyAnd (5) inquiring and obtaining by the environment safety monitoring platform).
Because the network environment security is uncertain, the network environment security level may be in an unstable and changing state, if the network environment security changes during the use of the network by a user, the network environment security patch is released and upgraded, abnormal operation maintenance log information is generated, and the access key is required to be upgraded, meanwhile, the personal information or the asset of the user may have leakage and theft risks, therefore, when the network environment security level is found to change, two modes of reminding and non-reminding exist at present, no further measures are taken, in the embodiment, when the network environment security level changes, the network environment security level is processed according to the security patch release data, the abnormal operation log data and the access key grading data acquired by the network environment security level, the evaluation of the network environment security change condition is obtained, namely the network environment security level change grade, the related data is processed and calculated through a preset environment security level detection model, the network environment security change grade is obtained, the access level of the WiFi accessible range change information and the applicable change information which are correspondingly determined according to the grade, the access level can be related to the WiFi access range change information, the privacy information can be displayed when the network environment security level is lowered, the personal information is applied to the user, the access range of the WiFi access range is forbidden when the personal information is displayed, and the access level of the user is prevented from being applied, and the access level change information is displayed when the personal information is about the change is about the access range of the access range.
According to an embodiment of the present invention, further comprising: acquiring WiFi resource data; the WiFi resource data comprise WiFi total resource data, merchant resource guarantee data and customer resource guarantee data; acquiring networking user attribute information, including customer information and tourist information; extracting the number of the networked people of the client application according to the client information, and extracting the number of the networked people of the client application according to the client information; processing according to the WiFi total resource data, the merchant resource guarantee data and the customer resource guarantee data in combination with the customer networking application number and the tourist networking application number respectively to obtain corresponding customer network resource allocation data and tourist network resource allocation data; synthesizing network resource dynamic allocation data according to the customer network resource allocation data and the guest network resource allocation data; the network resource dynamic allocation data is sent to a management end for display; the dynamic adjustment formula of the dynamic allocation data of the network resources is as follows:
wherein ,distributing data for the network resources of the customer; />Distributing data for the network resources of the tourist; />For WiFi total resource data, < > for>Guaranteeing data for merchant resources->And g is the number of the network-connected application of the customers, and y is the number of the network-connected application of the tourists (the preset characteristic coefficient is obtained by inquiring through a preset third-party environment safety monitoring platform).
In this embodiment, taking a large mall as an example, due to the limited WiFi resources, the WiFi resources in the large mall cannot meet the use requirements of all users at the same time, so as to ensure the normal operation of the mall and the use rights and interests of the effective customer groups, the WiFi resources can be dynamically allocated according to the networking user attributes. Firstly, acquiring WiFi resource information, including WiFi total resource information, merchant resource guarantee information and customer resource guarantee information; the WiFi total resource information refers to the total resource condition of a WiFi network, the merchant resource guarantee information refers to the minimum guarantee data of network resources required by a merchant group for guaranteeing normal operation of merchants, the customer resource guarantee information refers to the minimum guarantee data of the network according to the usual customer access amount and the demand information of a WiFi network theater, and then the network user information including the customer information and the tourist information is acquired; customer information refers to a group which is registered in a mall or registered and consumed in a merchant, guest information refers to a group which is not registered and consumed in the mall, then the number of customers applying for networking and the number of guests applying for networking are respectively extracted according to WiFi resource information and networking user attribute information, and are processed, a processing formula is used for obtaining network resource dynamic allocation data, and finally the network resource dynamic allocation data is sent to a management end for display so that management personnel can check the current situation of the network and the resource allocation state in time.
It should be noted that the present application further includes: acquiring environment security level change information; acquiring corresponding environmental safety protection measure information according to the environmental safety level change information; the environment safety protection measure information comprises network connection information of a cut-off attack source, registration number information of a locking attack source and data information of automatic backup management equipment; and sending the environmental security level change information to a user mobile equipment end for display.
It should be noted that, environmental security is not invariable, and with the frequent occurrence of network security incidents, environmental security level change information is obtained, where environmental security level change information refers to a phenomenon that environmental security level is reduced and risk is increased, in order to determine an attack source, supply equipment and a user, according to the obtained environmental security level change information, environmental security protection measure information is activated, where the environmental security protection measure information includes cutting off attack source network connection information, locking attack source registration number information and automatic backup management equipment data information, cutting off attack source network connection information refers to cutting off a determined attack source network, reducing a risk of continuing attacks, locking attack source registration number information, where the attack source automatically generates network registration data information in a system when connecting to the network, where the information includes a network equipment number and an equipment mac address (Media Access Control Address), and in order to ensure data security of network management equipment, finally, sending the environmental security level change information to a network user mobile equipment end, reminding a possible network risk, and providing corresponding processing measures.
As shown in fig. 3, the invention also discloses an environment-based WiFi implementation system 3, which comprises a memory 31 and a processor 32, wherein the memory includes an environment-based WiFi implementation method program, and the environment-based WiFi implementation method program when executed by the processor implements the following steps: acquiring network technical equipment information and network environment security information; the network technology equipment information comprises server information, router information and switch information; the network environment security information comprises network scanner information, vulnerability scanner information, web application scanner information, intrusion detection system information, security information and event management system information; processing according to network technical equipment information and network environment safety information through a preset environment safety evaluation model to obtain an environment safety index; comparing the environmental safety index with a preset environmental safety threshold value, and obtaining an environmental safety relative value according to a threshold value comparison result; comparing the environmental safety relative value with a preset environmental safety level threshold value, and obtaining environmental safety level information according to a threshold value comparison result; and obtaining corresponding WiFi implementation method information according to the environmental security level information.
According to an embodiment of the present invention, the processing according to the network technology device information and the network environment security information through a preset environment security assessment model to obtain an environment security index specifically includes: obtaining network technical equipment security data according to the server information, the router information and the switch information; obtaining network environment security data according to the network scanner information, the vulnerability scanner information, the Web application scanner information, the intrusion detection system information, the security information and the event management system information; processing according to the network technical equipment safety data and the network environment safety data through a preset environment safety evaluation model to obtain an environment safety index; the calculation formula of the environmental safety index is as follows:
wherein ,for environmental safety index, ++>Security data for network technology devices, < >>Security data for network environment->、/>Is a preset characteristic coefficient.
It should be noted that, since the environmental security includes two parts: firstly, the network technical equipment safety part and secondly, the network environment safety part, so that when the environment safety is evaluated, the environment safety index is jointly evaluated by combining the server information, the router information and the switch information, when the network technical equipment safety data are calculated, the corresponding safety data of the server, the router and the switch are correspondingly extracted respectively, the server safety data, the router safety data and the switch safety data are processed, the corresponding safety data of the equipment are obtained, and the calculation formula of the network technical equipment safety data is as follows:
wherein ,security data for network technology devices, < >>For the network technical equipment safety weight factor, F is server safety data, L is router safety data, J is switch safety data,/I>、/>、/>The characteristic coefficient is preset (the preset characteristic coefficient is obtained by inquiring a preset third-party environment safety monitoring platform);
when computing network environment security data, corresponding security data of a network scanner, a vulnerability scanner, web application scanner information, intrusion detection system information and event management system information are required to be respectively extracted correspondingly according to the network scanner information, the vulnerability scanner information, the Web application scanner information, the intrusion detection system information and the event management system information, and the security data of the network scanner, the vulnerability scanner security data, the Web application scanner security data, the intrusion detection system security data, the security information data and the event management system security data are comprehensively processed according to the security information data extracted by the security information, so that security data corresponding to a network environment is obtained, and a calculation formula of the network environment security data is as follows:
wherein ,security data for network environment->Weighting factors for network environmental security W is security data of a network scanner, D is security data of a vulnerability scanner, B is security data of a Web application scanner, R is security data of an intrusion detection system, A is security information data, S is security data of an event management system, and A is security data of an event management system>、/>、/>、/>、/>、/>The characteristic coefficient is preset (the preset characteristic coefficient is obtained by inquiring a preset third-party environment safety monitoring platform).
And inputting the obtained network technical equipment safety data and network environment safety data into a preset environment safety evaluation model for calculation processing, and finally obtaining an environment safety index, wherein the environment safety index reflects the safety degree of the environment where the WiFi is positioned to a certain extent, and the WiFi implementation method can be adjusted according to the data.
According to an embodiment of the present invention, further comprising: acquiring WiFi network use mode information; the WiFi network use mode information comprises private network information and public network information; determining service set identification mode information according to the private network information and public network information; the service set identification mode information comprises service set identification broadcast mode information and forbidden service set identification broadcast mode information; acquiring network connection mode confirmation information according to the forbidden service set identification broadcast mode information; the network connection mode confirmation information comprises fingerprint confirmation information or face recognition confirmation information of a network administrator.
According to an embodiment of the present invention, further comprising: acquiring network environment security change data, including security patch release data, abnormal operation and maintenance log data and access key upgrading data; inputting the security patch release data, the abnormal operation and maintenance log data and the access key upgrading data into a preset environment security level detection model for processing to obtain a network environment security change level; obtaining corresponding WiFi accessible range change information according to the network environment security change level; the WiFi accessible range change information comprises accessible website change information and accessible application change information; the WiFi accessible range change information is sent to a user mobile equipment end for display; the calculation formula of the network environment security change level number is as follows:
wherein ,for the security change level of network environment, +.>、/>、/>Security patch release data, abnormal operation log data, access key upgrade data,/->、/>、/>The characteristic coefficients are respectively preset (the preset characteristic coefficients are obtained by inquiring a preset third-party environment safety monitoring platform).
According to an embodiment of the present invention, further comprising: acquiring WiFi resource data; the WiFi resource data comprise WiFi total resource data, merchant resource guarantee data and customer resource guarantee data; acquiring networking user attribute information, including customer information and tourist information; extracting the number of the networked people of the client application according to the client information, and extracting the number of the networked people of the client application according to the client information; processing according to the WiFi total resource data, the merchant resource guarantee data and the customer resource guarantee data in combination with the customer networking application number and the tourist networking application number respectively to obtain corresponding customer network resource allocation data and tourist network resource allocation data; synthesizing network resource dynamic allocation data according to the customer network resource allocation data and the guest network resource allocation data; the network resource dynamic allocation data is sent to a management end for display; the dynamic adjustment formula of the dynamic allocation data of the network resources is as follows:
wherein ,distributing data for the network resources of the customer; />Distributing data for the network resources of the tourist; />For WiFi total resource data, < > for>Guaranteeing data for merchant resources->For customer resource guarantee data, g is the number of customers applying for networking, y is the number of tourists applying for networking (preset characteristic coefficient is monitored through preset third party environmental securityThe platform performs query acquisition).
In this embodiment, taking a large mall as an example, wiFi resources in the large mall cannot meet the use requirements of all users at the same time due to limited WiFi resources, so as to ensure normal operation of the mall and the use rights and interests of an effective customer group, and dynamically allocate the WiFi resources according to the attributes of networked users.
Firstly, wiFi resource information is acquired, wherein the WiFi resource information comprises WiFi total resource information, merchant resource guarantee information and customer resource guarantee information. The WiFi total resource information refers to the total resource condition of the WiFi network, the merchant resource guarantee information refers to the minimum guarantee data of network resources required by a merchant group for guaranteeing normal operation of merchants, and the customer resource guarantee information refers to the minimum guarantee data for determining the network according to the usual customer access amount and the demand information of a WiFi network theater. Then, acquiring networking user information, including customer information and tourist information; customer information refers to a group which is registered in a mall or registered and consumed in a merchant, guest information refers to a group which is not registered and consumed in the mall, then the number of customers applying for networking and the number of guests applying for networking are respectively extracted according to WiFi resource information and networking user attribute information, and are processed, a processing formula is used for obtaining network resource dynamic allocation data, and finally the network resource dynamic allocation data is sent to a management end for display so that management personnel can check the current situation of the network and the resource allocation state in time.
In addition, the application also comprises: acquiring environment security level change information; acquiring corresponding environmental safety protection measure information according to the environmental safety level change information; the environment safety protection measure information comprises network connection information of a cut-off attack source, registration number information of a locking attack source and data information of automatic backup management equipment; and sending the environmental security level change information to a user mobile equipment end for display.
The third aspect of the present application further provides a readable storage medium, where the readable storage medium includes an environment-based WiFi implementation method program, where the environment-based WiFi implementation method program, when executed by a processor, implements the steps of the foregoing environment-based WiFi implementation method.
According to the WiFi implementation method, system and medium based on environmental safety, the network technology equipment information and the network environmental safety assessment tool information are acquired, so that the influence factors of environmental safety assessment are determined, then the network technology equipment information and the network environmental safety assessment tool information are processed through a preset environmental safety assessment model, the environmental safety index is obtained and then is compared with an environmental safety threshold value to obtain an environmental safety relative value, the environmental safety relative value is compared with an environmental safety grade threshold value to obtain environmental safety grade information, and then the corresponding WiFi implementation method is determined. According to the application, the environmental security level is determined by analyzing the network technical equipment information and the network environmental security assessment tool information, so that the WiFi implementation method based on environmental security is realized.

Claims (10)

1. An environment security-based WiFi implementation method, comprising:
acquiring network technical equipment information and network environment security information;
the network technology equipment information comprises server information, router information and switch information;
the network environment security information comprises network scanner information, vulnerability scanner information, web application scanner information, intrusion detection system information, security information and event management system information;
processing according to the network technical equipment information and the network environment safety information through a preset environment safety evaluation model to obtain an environment safety index;
comparing the environmental safety index with a preset environmental safety threshold value, and obtaining an environmental safety relative value according to a threshold value comparison result;
comparing the environmental safety relative value with a preset environmental safety level threshold value, and obtaining environmental safety level information according to a threshold value comparison result;
and obtaining corresponding WiFi implementation method information according to the environmental security level information.
2. The WiFi implementation method based on environmental security according to claim 1, wherein the processing according to the network technology device information and network environmental security information through a preset environmental security assessment model to obtain an environmental security index specifically includes:
Obtaining network technical equipment security data according to the server information, the router information and the switch information;
obtaining network environment security data according to the network scanner information, the vulnerability scanner information, the Web application scanner information, the intrusion detection system information, the security information and the event management system information;
processing according to the network technical equipment safety data and the network environment safety data through a preset environment safety evaluation model to obtain an environment safety index;
the calculation formula of the environmental safety index is as follows:
wherein ,for environmental safety index, ++>Security data for network technology devices, < >>Security data for network environment->Is a preset characteristic coefficient.
3. The environmentally safe WiFi implementation method according to claim 1, further comprising:
acquiring WiFi network use mode information;
the WiFi network use mode information comprises private network information and public network information;
determining service set identification mode information according to the private network information and public network information;
the service set identification mode information comprises service set identification broadcast mode information and forbidden service set identification broadcast mode information;
Acquiring network connection mode confirmation information according to the forbidden service set identification broadcast mode information;
the network connection mode confirmation information comprises fingerprint confirmation information or face recognition confirmation information of a network administrator.
4. The environmentally safe WiFi implementation method according to claim 1, further comprising:
acquiring network performance requirement information, wherein the network performance requirement information comprises: network speed requirement information, network stability information and network security requirement information;
respectively extracting corresponding network speed requirement data, network stability data and network security requirement data according to the network speed requirement information, the network stability information and the network security requirement information;
processing according to the network speed requirement data, the network stability data and the network security requirement data to obtain a network hierarchical login index;
comparing the network hierarchical login index with a preset network hierarchical login threshold value according to the network hierarchical login index, and obtaining network hierarchical login mode information according to a threshold value comparison result;
the network hierarchical login mode information comprises password login mode information, registration login mode information or password-free login mode information;
The calculation formula of the network hierarchical login index is as follows:
wherein ,hierarchical login index for network,/->Request data for network speed, < >>For network stability data, ++>Data for network security requirements->、/>、/>Is a preset characteristic coefficient.
5. The environmentally safe WiFi implementation method according to claim 1, further comprising:
acquiring network environment security change data, including security patch release data, abnormal operation and maintenance log data and access key upgrading data;
inputting the security patch release data, the abnormal operation and maintenance log data and the access key upgrading data into a preset environment security level detection model for processing to obtain a network environment security change level;
obtaining corresponding WiFi accessible range change information according to the network environment security change level;
the WiFi accessible range change information comprises accessible website change information and accessible application change information;
the WiFi accessible range change information is sent to a user mobile equipment end for display;
the calculation formula of the network environment security change level number is as follows:
wherein ,for the security change level of network environment, +. >、/>、/>Security patch release data, abnormal operation log data, access key upgrade data,/->、/>、/>Respectively preset characteristic coefficients.
6. The environmentally safe WiFi implementation method according to claim 1, further comprising:
acquiring WiFi resource data;
the WiFi resource data comprise WiFi total resource data, merchant resource guarantee data and customer resource guarantee data;
acquiring networking user attribute information, including customer information and tourist information;
extracting the number of the networked people of the client application according to the client information, and extracting the number of the networked people of the client application according to the client information;
processing according to the WiFi total resource data, the merchant resource guarantee data and the customer resource guarantee data in combination with the customer networking application number and the tourist networking application number respectively to obtain corresponding customer network resource allocation data and tourist network resource allocation data;
synthesizing network resource dynamic allocation data according to the customer network resource allocation data and the guest network resource allocation data;
the network resource dynamic allocation data is sent to a management end for display;
the dynamic adjustment formula of the dynamic allocation data of the network resources is as follows:
wherein ,distributing data for the network resources of the customer; />Distributing data for the network resources of the tourist; />For WiFi total resource data, < > for>Guaranteeing data for merchant resources->For customer resource guarantee data g isAnd the number of the customers applying for networking is y, which is the number of the tourists applying for networking.
7. An environment-based security WiFi implementation system, comprising a memory and a processor, wherein the memory includes an environment-based security WiFi implementation method program, and the environment-based security WiFi implementation method program, when executed by the processor, performs the following steps:
acquiring network technical equipment information and network environment security information;
the network technology equipment information comprises server information, router information and switch information;
the network environment security information comprises network scanner information, vulnerability scanner information, web application scanner information, intrusion detection system information, security information and event management system information;
processing according to the network technical equipment information and the network environment safety information through a preset environment safety evaluation model to obtain an environment safety index;
comparing the environmental safety index with a preset environmental safety threshold value, and obtaining an environmental safety relative value according to a threshold value comparison result;
Comparing the environmental safety relative value with a preset environmental safety level threshold value, and obtaining environmental safety level information according to a threshold value comparison result;
and obtaining corresponding WiFi implementation method information according to the environmental security level information.
8. The WiFi implementation system based on environmental security according to claim 7, wherein the processing according to the network technology device information and network environmental security information through a preset environmental security assessment model obtains an environmental security index, specifically including:
obtaining network technical equipment security data according to the server information, the router information and the switch information;
obtaining network environment security data according to the network scanner information, the vulnerability scanner information, the Web application scanner information, the intrusion detection system information, the security information and the event management system information;
processing according to the network technical equipment safety data and the network environment safety data through a preset environment safety evaluation model to obtain an environment safety index;
the calculation formula of the environmental safety index is as follows:
wherein ,for environmental safety index, ++>Security data for network technology devices, < > >Security data for network environment->Is a preset characteristic coefficient.
9. The environmentally safe WiFi implementation system of claim 7, further comprising:
acquiring WiFi network use mode information;
the WiFi network use mode information comprises private network information and public network information;
determining service set identification mode information according to the private network information and public network information;
the service set identification mode information comprises service set identification broadcast mode information and forbidden service set identification broadcast mode information;
acquiring network connection mode confirmation information according to the forbidden service set identification broadcast mode information;
the network connection mode confirmation information comprises fingerprint confirmation information or face recognition confirmation information of a network administrator.
10. A computer readable storage medium, characterized in that it comprises an environment-based WiFi implementation method program, which, when executed by a processor, implements the steps of an environment-based WiFi implementation method according to any of claims 1 to 6.
CN202311100446.7A 2023-08-30 2023-08-30 WiFi implementation method, system and medium based on environmental security Active CN116828474B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311100446.7A CN116828474B (en) 2023-08-30 2023-08-30 WiFi implementation method, system and medium based on environmental security

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311100446.7A CN116828474B (en) 2023-08-30 2023-08-30 WiFi implementation method, system and medium based on environmental security

Publications (2)

Publication Number Publication Date
CN116828474A true CN116828474A (en) 2023-09-29
CN116828474B CN116828474B (en) 2023-11-14

Family

ID=88120698

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311100446.7A Active CN116828474B (en) 2023-08-30 2023-08-30 WiFi implementation method, system and medium based on environmental security

Country Status (1)

Country Link
CN (1) CN116828474B (en)

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425920A (en) * 2007-10-31 2009-05-06 华为技术有限公司 Network security status acquiring method, apparatus and system
CN103369527A (en) * 2012-04-01 2013-10-23 腾讯科技(深圳)有限公司 Method, device and system for WiFi (wireless fidelity) network sharing
CN104519490A (en) * 2013-09-27 2015-04-15 中兴通讯股份有限公司 WIFI (wireless fidelity) connection method, WIFI connection device, mobile terminal and system
US20150304920A1 (en) * 2013-01-18 2015-10-22 Forager Networks, Inc. Cyber foraging network system for automatic wireless network access point detection and connection
CN105828331A (en) * 2016-03-28 2016-08-03 乐视控股(北京)有限公司 Wireless network safety management method and device
US20160248809A1 (en) * 2015-02-20 2016-08-25 Intel Corporation Methods and apparatus to process data based on automatically detecting a security environment
CN105916152A (en) * 2016-06-13 2016-08-31 腾讯科技(深圳)有限公司 Checking method and device of network status of WiFi network
CN106411862A (en) * 2016-09-13 2017-02-15 深圳市金立通信设备有限公司 Network security management method and terminal
CN107480530A (en) * 2017-08-23 2017-12-15 北京奇虎科技有限公司 Method, apparatus, system and the server of safety detection
CN108566656A (en) * 2018-04-13 2018-09-21 上海连尚网络科技有限公司 A kind of method and apparatus for detecting wireless network secure
CN111698682A (en) * 2020-06-12 2020-09-22 深圳天度物联信息技术有限公司 Data transmission method based on public WiFi network environment, server and storage medium
US20220132409A1 (en) * 2020-10-23 2022-04-28 Avaya Management L.P. Methods and systems for monitoring communication device mobility associated with venue wireless access networks
US20230125134A1 (en) * 2009-01-28 2023-04-27 Headwater Research Llc Communications Device with Secure Data Path Processing Agents
US11706241B1 (en) * 2020-04-08 2023-07-18 Wells Fargo Bank, N.A. Security model utilizing multi-channel data

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101425920A (en) * 2007-10-31 2009-05-06 华为技术有限公司 Network security status acquiring method, apparatus and system
US20230125134A1 (en) * 2009-01-28 2023-04-27 Headwater Research Llc Communications Device with Secure Data Path Processing Agents
CN103369527A (en) * 2012-04-01 2013-10-23 腾讯科技(深圳)有限公司 Method, device and system for WiFi (wireless fidelity) network sharing
US20150304920A1 (en) * 2013-01-18 2015-10-22 Forager Networks, Inc. Cyber foraging network system for automatic wireless network access point detection and connection
CN104519490A (en) * 2013-09-27 2015-04-15 中兴通讯股份有限公司 WIFI (wireless fidelity) connection method, WIFI connection device, mobile terminal and system
US20160248809A1 (en) * 2015-02-20 2016-08-25 Intel Corporation Methods and apparatus to process data based on automatically detecting a security environment
CN105828331A (en) * 2016-03-28 2016-08-03 乐视控股(北京)有限公司 Wireless network safety management method and device
CN105916152A (en) * 2016-06-13 2016-08-31 腾讯科技(深圳)有限公司 Checking method and device of network status of WiFi network
CN106411862A (en) * 2016-09-13 2017-02-15 深圳市金立通信设备有限公司 Network security management method and terminal
CN107480530A (en) * 2017-08-23 2017-12-15 北京奇虎科技有限公司 Method, apparatus, system and the server of safety detection
CN108566656A (en) * 2018-04-13 2018-09-21 上海连尚网络科技有限公司 A kind of method and apparatus for detecting wireless network secure
US11706241B1 (en) * 2020-04-08 2023-07-18 Wells Fargo Bank, N.A. Security model utilizing multi-channel data
CN111698682A (en) * 2020-06-12 2020-09-22 深圳天度物联信息技术有限公司 Data transmission method based on public WiFi network environment, server and storage medium
US20220132409A1 (en) * 2020-10-23 2022-04-28 Avaya Management L.P. Methods and systems for monitoring communication device mobility associated with venue wireless access networks

Also Published As

Publication number Publication date
CN116828474B (en) 2023-11-14

Similar Documents

Publication Publication Date Title
EP2933973A1 (en) Data protection method, apparatus and system
EP2071883B1 (en) Apparatus, method, program and recording medium for protecting data in a wireless communication terminal
KR101501669B1 (en) Behavior detection system for detecting abnormal behavior
US9282114B1 (en) Generation of alerts in an event management system based upon risk
US7592906B1 (en) Network policy evaluation
US20160261606A1 (en) Location-based network security
CA2955066C (en) Method and system for providing a virtual asset perimeter
US20150281239A1 (en) Provision of access privileges to a user
CN109756337B (en) Secure access method and device for service interface
CN104778415B (en) A kind of leakage-preventing system and method for data based on computer behavior
CN104683336A (en) Security-region-based method and system for protecting Android private data
CN111600856A (en) Safety system of operation and maintenance of data center
US8996681B2 (en) Passively attributing anonymous network events to their associated users
US9223949B1 (en) Secure transformable password generation
CN116828474B (en) WiFi implementation method, system and medium based on environmental security
CN106982434B (en) Wireless local area network security access method and device
CN104753851A (en) Network access method and network access device
KR20090059029A (en) System for identity management with privacy policy using number and method thereof
US11126713B2 (en) Detecting directory reconnaissance in a directory service
KR101619419B1 (en) System for detecting abnomal behaviors using personalized continuative behavior pattern analsis
CN116015695A (en) Resource access method, system, device, terminal and storage medium
CN112039839A (en) Operation and maintenance method and device based on customer premise examination and approval authorization
US10523715B1 (en) Analyzing requests from authenticated computing devices to detect and estimate the size of network address translation systems
CN104363276A (en) Subdomain-based third-party cloud monitoring method
KR101500448B1 (en) Nonnormal access detection method using normal behavior profile

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant