WO2023017952A1 - 센싱 장치, 센싱 장치를 포함하는 무선 침입 방지 시스템 및 그것의 동작 방법 - Google Patents
센싱 장치, 센싱 장치를 포함하는 무선 침입 방지 시스템 및 그것의 동작 방법 Download PDFInfo
- Publication number
- WO2023017952A1 WO2023017952A1 PCT/KR2022/005381 KR2022005381W WO2023017952A1 WO 2023017952 A1 WO2023017952 A1 WO 2023017952A1 KR 2022005381 W KR2022005381 W KR 2022005381W WO 2023017952 A1 WO2023017952 A1 WO 2023017952A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- message
- access point
- block
- sensing device
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 230000002265 prevention Effects 0.000 title description 7
- 230000006854 communication Effects 0.000 claims abstract description 74
- 230000000903 blocking effect Effects 0.000 claims abstract description 69
- 238000004891 communication Methods 0.000 claims abstract description 63
- 238000012508 change request Methods 0.000 claims abstract description 35
- 238000012544 monitoring process Methods 0.000 claims abstract description 9
- 238000005516 engineering process Methods 0.000 abstract description 26
- 238000004458 analytical method Methods 0.000 abstract description 3
- 238000010586 diagram Methods 0.000 description 8
- 230000005540 biological transmission Effects 0.000 description 4
- 238000011017 operating method Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- JEIPFZHSYJVQDO-UHFFFAOYSA-N iron(III) oxide Inorganic materials O=[Fe]O[Fe]=O JEIPFZHSYJVQDO-UHFFFAOYSA-N 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000010076 replication Effects 0.000 description 1
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/80—Arrangements enabling lawful interception [LI]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present invention relates to an electronic device, and more particularly, to a sensing device, a wireless intrusion prevention system including the sensing device, and an operating method thereof.
- a wireless network system for wireless Internet communication includes a wireless LAN access point (AP) and a wireless LAN terminal.
- AP wireless LAN access point
- WIPS wireless intrusion prevention system
- An embodiment of the present invention provides a sensing device for blocking access of a terminal, a wireless intrusion prevention system including the sensing device, and an operating method thereof.
- a sensing device for monitoring a connection between an access point and a terminal includes a template storage unit for storing a block template used to generate a wireless communication message for blocking a connection between the terminal and the access point, and the terminal and acquiring a message transmitted and received by the access point, and as a result of analyzing the message based on the message, if the terminal is included in the list to be blocked provided from the server, the address of the access point and the address of the terminal are included in the block template. and a sensing control unit for transmitting to the terminal a block message in which a channel change request command for requesting a change in a communication channel between the terminal and the access point is inserted, wherein the block template is used for connection between the terminal and the access point.
- An authentication method and an encryption method used are included, and the block message includes information about the sensing device transmitting the block message and information about a reason for blocking.
- a method of operating a sensing device for monitoring a connection between an access point and a terminal includes storing a block template used to generate a wireless communication message for blocking a connection between the terminal and the access point; Obtaining a message transmitted from the terminal to the access point, and determining whether the terminal is a terminal included in a list to be blocked provided from the server based on the message, and the address of the access point in the block template; Transmitting a block message to the terminal in which a channel change request command requesting a change in a communication channel between the terminal and the access point is inserted, wherein the block template is used for connection between the terminal and the access point An authentication method and an encryption method are included, and the block message includes information about the sensing device transmitting the block message and information about a reason for blocking.
- a sensing device for monitoring a connection between an access point and a plurality of terminals stores a block template used to generate a wireless communication message for blocking the connection between the plurality of terminals and the access point.
- a storage unit obtains a message transmitted/received between the plurality of terminals and the access point, and as a result of analyzing the message, if the access point is an access point included in the block target list provided from the server, the block template
- the block template includes an authentication method and an encryption method used for connection between the terminal and the access point
- the block message includes information about the sensing device transmitting the block message and information about a blocking reason.
- a sensing device for blocking access of a terminal provided according to the present technology, a wireless intrusion prevention system including the sensing device, and an operating method thereof include, first, analyzing whether or not a network to which IEEE 802.11w is applied to generate a block message; , It is not necessary to separately manage the corresponding session list or apply a separate blocking method according to the session list, so it is possible to reduce unnecessary analysis time and block message generation time.
- the present invention reduces the time to duplicate unnecessary AP messages by applying a block template predefined with only minimum information for block message generation in the block message generation process, and the size of the generated block message is also duplicated. It is reduced compared to , and since the same information is used for the inserted channel change request regardless of the frequency band, the time for determining the frequency band can be shortened, and as a result, the blocking performance can be improved.
- the present invention transmits the block message only to the blocking target terminal, it is possible to block only the terminal to transmit the block message without affecting normal terminals accessing the AP.
- the terminals to be blocked are a plurality of terminals, block messages are individually transmitted to all terminals to be blocked, thereby obtaining an effect of blocking all terminals desiring to access the AP.
- the present invention when transmitting a block message, can include contents such as the subject of block message transmission and the reason for blocking, so that it can be used as evidence in the event of a dispute over wireless blocking.
- the present invention is a technology implementation based on a wireless standard, and in addition to previously used frequency bands (2.4Ghz, 5Ghz), the same blocking effect can be obtained through a block message even in a new 6Ghz band.
- FIG. 1 is a diagram for explaining a general operation in which a WIPS blocks a connection between an AP and a device.
- FIG. 2 is a flowchart illustrating a session determination and classification procedure of a conventional sensing device in a general wireless network and a wireless network to which a predetermined security technology is applied.
- FIG. 3 is a flowchart illustrating a blocking procedure of a conventional sensing device in a general wireless network and a wireless network to which a predetermined security technology is applied.
- FIG. 4 is a diagram for explaining WIPS according to an embodiment of the present invention.
- FIG. 5 is a diagram for explaining the operation of WIPS according to an embodiment of the present invention.
- FIG. 6 is a diagram for explaining an operation of blocking a connection between a terminal and an AP by a sensing device according to an embodiment of the present invention.
- FIG. 7 is a flowchart illustrating a blocking procedure of an improved sensing device according to an embodiment of the present invention.
- the Wireless Intrusion Prevention System described below detects rouge Access Points (APs)/terminals, unauthorized APs (Access Points)/terminals, or Denial of Service (DoS) through wireless section monitoring. It is a system that detects and blocks wireless intrusions such as attacks.
- a general wireless network described in this specification may refer to a wireless network to which IEEE 802.11 technology is applied, and a wireless network to which a predetermined security technology is applied may refer to a wireless network to which IEEE 802.11w technology is applied.
- IEEE 802.11w is a modified technology of IEEE 802.11 that improves the security of management frames.
- the embodiments of the present invention can be commonly applied to a general wireless network to which various security technologies are applied and a wireless network to which a predetermined security technology is applied.
- An access point is an entity that provides access to a distribution system via a wireless medium for terminals associated with it.
- AP is used as a concept including PCP (Personal BSS Coordination Point), and broadly refers to concepts such as centralized controller, base station (BS), node-B, BTS (Base Transceiver System), or site controller.
- PCP Personal BSS Coordination Point
- the AP may also be referred to as a base wireless communication terminal
- the base wireless communication terminal is a term that includes all of an AP, a base station, an eNodeB (eNB), and a transmission point (TP) in a broad sense.
- the base wireless communication terminal may include various types of wireless communication terminals that allocate communication medium resources and perform scheduling in communication with a plurality of wireless communication terminals.
- a station is any device that includes a medium access control (MAC) conforming to the provisions of the IEEE 802.11 standard and a physical layer interface for a wireless medium.
- MAC medium access control
- AP access points
- 'terminal' refers to a non-AP station, but may be used as a term indicating both a non-AP station and an AP according to embodiments.
- a station for wireless communication includes a processor and a transmit/receive unit, and may further include a user interface unit and a display unit according to embodiments.
- the processor may generate a message to be transmitted through the wireless network or process a message received through the wireless network, and may perform various other processes for controlling the station.
- the transmission/reception unit is functionally connected to the processor and transmits/receives a message for a station through a wireless network.
- the terminal may transmit and receive messages to and from the AP through the wireless network.
- a sensing device including the sensing device, and an operating method thereof determine which frequency band (2.4Ghz/5Ghz/6Ghz) is used in a connection process between an AP and a terminal, IEEE 802.11w It is possible to provide a technology for blocking the connection between an AP and a terminal regardless of whether it is a wireless network to which (PMF, Protected Management Frame) is applied, which authentication method and encryption method are applied, and whether it is before or after network access.
- PMF Protected Management Frame
- FIG. 1 is a diagram for explaining a general operation in which a WIPS blocks a connection between an AP and a device.
- the WIPS 10 may include a sensing device 100 and a server 200.
- the sensing device 100 may monitor a connection between the AP 20 and the terminal 30 .
- the sensing device 100 may receive a radio frame.
- the sensing device 100 may obtain a message transmitted and received between the terminal 30 and the AP 20 to connect. Based on the message obtained from the terminal 30 and the AP 20, the sensing device 100 determines whether the terminal or AP is the terminal 30 or AP 20 included in the list to be blocked provided from the server 200. can judge Then, the sensing device 100 may block the connection between the terminal 30 and the AP 20 by transmitting a blocking message to the wireless network.
- FIG. 2 is a flowchart illustrating a session determination and classification procedure of a conventional sensing device in a general wireless network and a wireless network to which a predetermined security technology is applied.
- a conventional sensing device may receive a radio frame.
- a conventional sensing device may obtain a message transmitted and received between a terminal and an AP.
- step S203 the conventional sensing device may obtain a message transmitted and received between the terminal and the AP to determine whether the terminal is a new terminal. As a result of analyzing messages transmitted and received between the terminal and the AP, the conventional sensing device may perform step S205 if the terminal is a new terminal. Unlike this, as a result of analyzing the message transmitted and received between the terminal and the AP, if the terminal is not a new terminal, step S201 may be performed again.
- step S205 the conventional sensing device analyzes messages transmitted and received between the new terminal and the AP to determine whether the connection is based on the 802.11w technology.
- step S207 when the message transmitted/received between the new terminal and the AP is a connection to which 802.11w technology is applied, the conventional sensing device classifies it as a wireless network to which a predetermined security technology is applied and adds it to the session list in step S209.
- the connection is not applied to the 802.11w technology, it may be classified as a general wireless network connection and separately added to the session list in step S209.
- the conventional sensing device may add session information obtained by analyzing messages transmitted and received between the terminal and the AP to the session list by classifying them according to whether the connection is 802.11w or not.
- the conventional sensing device has performed a procedure of separately classifying a session list according to whether a message transmitted/received between the terminal and the AP is an IEEE 802.11w connection.
- FIG. 3 is a flowchart illustrating a blocking procedure of a conventional sensing device in a general wireless network and a wireless network to which a predetermined security technology is applied.
- the conventional sensing device analyzes messages transmitted and received between the terminal and the AP to determine whether the terminal or the AP is to be blocked. As a result of analyzing messages transmitted and received between the terminal and the AP, the conventional sensing device may proceed to step S305 when the terminal or the AP is a blocking target. Alternatively, if the terminal or AP is not a blocking target, step S301 may be performed again.
- step S305 the conventional sensing device may determine whether the connection is 802.11w by analyzing messages transmitted and received between the terminal and the AP. If the message transmitted/received between the terminal and the AP is an 802.11w connection, step S307 may be performed by determining that the message is a wireless network to which a predetermined security technology is applied. Unlike this, if the message transmitted/received between the terminal and the AP is not an 802.11w connection, it may be determined as a general wireless network and step S315 may proceed.
- step S307 when the message transmitted and received between the terminal and the AP is an 802.11w connection, the conventional sensing device may copy a wireless communication message transmitted by the AP.
- the conventional sensing device may transmit a fake non-authentication message when the message transmitted and received between the terminal and the AP is not an 802.11w connection.
- step S309 the conventional sensing device may determine whether the frequency band of the message transmitted and received between the terminal and the AP is 2.4 Ghz. If the frequency band of the message transmitted and received between the terminal and the AP is 2.4 Ghz, step S311 may proceed. In contrast, when the frequency band of the message transmitted and received between the terminal and the AP is 5Ghz instead of 2.4Ghz, step S317 may proceed.
- step S311 when the frequency band of the wireless communication message of the cloned AP is 2.4 Ghz, the conventional sensing device may generate a fake message in which a channel change request command (CSA) is inserted into the wireless communication message of the cloned AP.
- CSA channel change request command
- the channel change request command may be a command requesting to change a channel through which the terminal and the AP connect or communicate.
- step S317 when the frequency band of the cloned AP wireless communication message is 5Ghz instead of 2.4Ghz, the conventional sensing device sends a channel change request command (CSA) to the cloned AP wireless communication message as well as an extended channel change request command (A fake message in which an extended CSA) is additionally inserted may be generated.
- CSA channel change request command
- step S313 the conventional sensing device may transmit the generated fake message.
- the conventional sensing device in order to block the connection between the terminal and the AP, sends a fake non-authentication message or a wireless communication message of the copied AP according to whether the message transmitted and received between the terminal and the AP is an 802.11w connection.
- a fake message in which a channel change request command (CSA) is inserted is generated and transmitted over the wireless network.
- the conventional sensing device inserts a different channel change request command for each band into the fake message according to whether the frequency band of the wireless communication message of the copied AP is 2.4 Ghz or 5 Ghz.
- the conventional sensing device has a procedure for determining whether a message transmitted by a terminal is an 802.11w connection, a procedure for determining whether the frequency band of a wireless communication message of a cloned AP is 2.4 GHz, and a procedure for changing different channels for each frequency band.
- a separate procedure for generating a request command was required.
- FIG. 4 is a diagram for explaining WIPS according to an embodiment of the present invention.
- the WIPS 10 may include a sensing device 100 and a server 200.
- the sensing device 100 monitors messages transmitted and received between the terminal and the AP, and based on the monitored message, the MAC address of the terminal or AP that transmitted the message, security setting contents, frame appearance frequency, transmission rate, data amount, Information such as SSID, IEEE 802.11 a/b/g/n/ac/ax, channel, and RSSI can be processed. And, the sensing device 100 may transmit the processed information to the server 200 .
- the server 200 may compare the processed information with database-based signature information to determine whether the corresponding terminal or AP is not authorized and operates abnormally.
- the signature information may include information such as message header information or message occurrence frequency.
- the server 200 may determine whether the detected AP is unauthorized.
- the server 200 may determine the AP as an unauthorized AP when the AP is not previously classified as an authorized AP based on other information stored in the DB, such as a BSSID and a MAC address. Unauthorized terminals can also be determined in a similar way.
- the server 200 may perform automatic blocking according to a blocking policy or generate an alarm so that an administrator manually blocks the AP. According to the blocking decision, the server 200 may transmit a blocking target list or blocking policy information to the sensor device 100 .
- the sensor device 100 selects APs and terminals to be blocked by judgment based on the blocking target list and the blocking policy, and may perform blocking.
- blocking the sensing device 100 based on the blocking target list and the blocking policy may include blocking a connection between a specific AP and a specific terminal.
- the sensing device 100 may block the connection when an authorized terminal is connected to an unauthorized AP or when an unauthorized terminal is connected to an authorized AP.
- the sensing device 100 may block the connection of the authorized terminal to the unauthorized AP.
- the sensing device 100 may block the connection of the unauthorized terminal to the authorized AP when the MAC of the unauthorized terminal is detected.
- the sensing device 100 may include a template storage unit 110 and a sensing control unit 120 .
- the template storage unit 110 may store a block template used to generate a wireless communication message for blocking a connection between a terminal and an access point.
- the block template generates a wireless communication message for blocking the connection between the terminal and the AP even if the authentication method, encryption method, frequency band, etc. included in the communication method between the terminal and the AP are different for each terminal or AP. It can be any template used. As another example, the block template may be a template used to generate a wireless communication message for blocking a connection between a terminal and an AP regardless of whether it is a general wireless network or a wireless network to which a predetermined security technology is applied.
- a block template may include support rate, DSP, TIM, and RSN.
- a conventional sensing device replicates a wireless communication message transmitted by an AP to be blocked in a wireless network to which a predetermined security technology is applied and inserts a channel change request command (CSA) or an extended channel change request command (Extended CSA) according to a frequency band. After creating the fake message, the fake message was sent over the wireless network.
- CSA channel change request command
- Extended CSA extended channel change request command
- the fake message was sent over the wireless network.
- only items necessary for generating a wireless communication message for blocking are stored in the template storage unit 110 in advance so that the terminal can determine it as a wireless communication message transmitted by an AP, thereby duplicating the wireless communication message. Compared to the method, the generation time of the wireless communication message can be shortened and the size of the wireless communication message can be reduced.
- the sensing control unit 120 may monitor the connection between the AP and the terminal, and generate a block message based on a message transmitted/received by the terminal to the AP and transmit it to the terminal.
- the sensing controller 120 may include a block message generator 121 and a communication module 122 .
- the block message generating unit 121 may analyze the message transmitted and received between the terminal and the AP acquired by the communication module 122 .
- the block message generator 121 may add/update information of a terminal to transmit a message.
- the block message generating unit 121 may determine whether a terminal to transmit a message corresponds to the blocking target list provided by the server 200 .
- the block message generating unit 121 may generate a block message when a terminal to which the message is to be transmitted corresponds to the block target list.
- the block message generating unit 121 may generate a block message by receiving a block template from the template storage unit 110 .
- the block message generator 121 may generate a block message using a block template when the AP to which the UE wants to connect is an unauthorized AP.
- the block message generator 121 A block message may be generated by inserting a channel change request command and other necessary information by setting the sending address to the block template as the BSSID of the unauthorized AP and the receiving address as the MAC of the terminal to connect to the unauthorized AP.
- the channel change request command may be a command requesting to change a channel through which the terminal and the AP connect or communicate.
- the channel change request command may include a channel value to be changed by the terminal.
- the block message generating unit 121 may generate a block message that further includes a block message indicating a subject that transmits the block message or a reason for blocking.
- the block message generator 121 sets the address sent to the block template to the BSSID of the unauthorized AP and the received address to the plurality of terminals to connect to the unauthorized AP.
- Block messages may be generated by inserting a channel change request command and other necessary information into the MAC of each terminal. Thereafter, the block message generator 121 may individually transmit the generated block messages to a plurality of terminals that wish to access the unauthorized AP through the communication module 122 .
- the block message generator 121 may block the connection between the authorized terminal and the unauthorized AP by transmitting the generated block message to the authorized terminal through the communication module 122 .
- the authorized terminal may attempt to connect to the unlicensed AP through the channel to be changed by the channel change request command inserted in the block message.
- the channel value to be changed included in the channel change request command is a channel value different from a channel value actually used by an unauthorized AP to which the terminal intends to access.
- the channel value to be changed may be a randomly generated channel value. That is, since the channel value to be changed inserted into the block message is not a channel value used by a message transmitted by an unlicensed AP to which an authorized terminal intends to access, the authorized terminal may be blocked from connecting to the unauthorized AP.
- the same channel change request command may be generated and inserted into a block message regardless of frequency bands transmitted and received by the UE and the AP.
- the same channel change request command can be generated in frequency bands of 2.4Ghz, 5Ghz and 6Ghz. Accordingly, no time is required to determine a frequency band of a wireless communication message transmitted by the AP, and time for generating a channel change request command is shortened, thereby reducing a time for blocking a connection between the terminal and the AP.
- the block message generating unit 121 generates a block message based on a block template in the same way as above even when the unauthorized terminal wants to connect to the authorized AP, and transmits the block message to the unauthorized terminal, thereby connecting the unlicensed terminal and the authorized AP. can block
- the block message generating unit 121 may transmit a block message to the terminal through the communication module 122 to block the connection between the terminal and the AP, and generate a blocking event.
- the block message generating unit 121 may transmit the generated blocking event to the server 200 .
- the communication module 122 may acquire messages transmitted and received between the AP and the terminal. In an embodiment, the communication module 122 may provide the message obtained during the communication process between the AP and the terminal to the block message generator 121 .
- the communication module 122 analyzes the message obtained during the communication process between the AP and the terminal, and receives the block message generated from the block message generator 121 when the message corresponds to the block target list provided from the server 200 and receives the terminal. can be sent to
- the receiving address of the block message to the MAC of the terminal, it is possible to individually block the terminal to be blocked. Specifically, when an authorized terminal attempts to connect to an unlicensed AP or when an unlicensed terminal attempts to connect to an authorized AP, it may be individually blocked by transmitting a block message only to the terminal to be blocked. Accordingly, the connection of a normal terminal trying to connect to an unlicensed AP or an authorized AP may not have any effect.
- a conventional sensing device distinguishes whether a wireless network environment in which an AP and a terminal are connected is a general wireless network or a wireless network to which a predetermined security technology is applied.
- a conventional sensing device blocks the connection between an AP and a terminal through a fake non-authentication message in a general wireless network environment, and creates a fake message by copying a wireless message of an AP to be blocked in a wireless network environment to which a predetermined security technology is applied. Connection between the AP and the terminal was blocked using the fake page.
- a wireless communication message (generally used as a beacon) of an AP is copied and only a channel change request is modified and used.
- the basic destination address in the wireless communication message of the cloned AP is a broadcast value, a fake message is sent to all terminals that want to connect to the AP that was the replication target, and all terminals are blocked from connecting. used as 'blocking').
- AP blocking which blocks all terminals accessing the AP, may also block connections of normal terminals connected to the unauthorized AP. That is, when the unauthorized AP is an AP used as a public service, if an authorized terminal is blocked from accessing the unauthorized AP, the connection of a terminal normally connected to the unlicensed AP may also be hindered. In addition, if AP blocking is performed when an unauthorized terminal attempts to connect to an authorized AP, a problem may occur in which all authorized terminals normally connected to the authorized AP are blocked.
- the present invention can improve problems caused by AP blocking by sending a block message only to a terminal to be blocked, and has the same effect as blocking an AP by individually sending block messages to a plurality of terminals trying to connect to an unauthorized AP. can be obtained.
- FIG. 5 is a diagram for explaining the operation of WIPS according to an embodiment of the present invention.
- the WIPS 10 may include a sensing device 100 and a server 200.
- the sensing device 100 may include a template storage unit 110 , a block message generator 121 and a communication module 122 .
- the communication module 122 may receive a radio frame.
- the communication module 122 may acquire messages transmitted and received between the terminal and the AP.
- step S503 the communication module 122 may call the message analysis obtained during the communication process between the AP and the terminal to the block message generation unit 121.
- the template storage unit 110 may provide the block template to the block message generator 121.
- the template storage unit 110 may provide the block message generator 121 with a block template used to generate a wireless communication message for blocking the connection between the terminal and the AP.
- the server 200 may provide the block target list to the block message generator 121.
- the blocking target list may include a list of unlicensed APs, unauthorized terminals, authorized APs, and authorized terminals.
- the block message generation unit 121 may add or update information about a terminal to transmit a message by analyzing the message acquired by the communication module 122 during the communication process between the AP and the terminal.
- step S511 the block message generation unit 121 analyzes the information included in the message obtained in the communication process between the AP and the terminal, and compares whether the AP or the terminal is a blocking target with the list of blocked targets provided from the server 200. can judge whether the AP or the terminal is a blocking target with the list of blocked targets provided from the server 200.
- step S513 if the message of the terminal is a terminal included in the block list, the block message generating unit 121 inserts the BSSID of the AP to which the terminal intends to access, the MAC of the terminal, and a channel change request command into the block template.
- the block message generating unit 121 may generate a block message that further includes a block message indicating a subject that transmits the block message or a reason for blocking.
- step S515 the block message generator 121 may provide the generated block message to the communication module 122.
- step S517 the communication module 122 may transmit a block message to the terminal.
- step S519 the block message generating unit 121 may block the connection between the terminal and the AP, and transmit blocking event information to the server 200.
- FIG. 6 is a diagram for explaining an operation of blocking a connection between a terminal and an AP by a sensing device according to an embodiment of the present invention.
- step S601 may be a connection process between the terminal 30 and the AP 20 .
- the AP 20 may be an unlicensed AP, and the terminal 30 may be an authorized terminal.
- the AP 20 may be an authorized AP, and the terminal 30 may be an unlicensed terminal.
- the sensing device 100 may receive a radio frame. For example, the sensing device 100 may obtain a message transmitted and received between the terminal 30 and the AP 20 during a connection process between the terminal 30 and the AP 20 . The sensing device 100 may analyze information included in a message obtained during communication between the terminal 30 and the AP 20 to determine whether or not the message corresponds to the block target list provided from the server 200 .
- step S605 the sensing device 100 analyzes the information included in the message obtained in the communication process between the terminal 30 and the AP 20, and as a result, the AP or the terminal corresponds to the block list provided from the server 200.
- a block message in which the BSSID of the AP 20, the MAC of the terminal 30, a channel change request command, and other necessary information are inserted into the block template may be generated and transmitted to the terminal 30.
- step S607 the terminal 30 receives the block message and tries to connect to the AP 20 through the changed channel value, and thus the connection to the AP 20 may be blocked.
- FIG. 7 is a flowchart illustrating a blocking procedure of an improved sensing device according to an embodiment of the present invention.
- the sensing device 100 may receive a radio frame.
- the sensing device 100 may obtain a message transmitted and received during a communication process between the terminal and the AP.
- the sensing device 100 may analyze a message obtained in the communication process between the terminal and the AP to determine whether the terminal is subject to blocking. In an embodiment, the sensing device 100 may determine whether a message acquired during communication between the terminal and the AP corresponds to the block target list provided from the server 200 . The sensing device 100 may proceed to step S705 when the AP or the terminal corresponds to the blocking target list as a result of analyzing the information included in the message acquired during the communication process between the terminal and the AP. In contrast, when the sensing device 100 analyzes the information included in the message acquired during the communication process between the terminal and the AP and the AP or the terminal does not correspond to the list to be blocked, the step may end.
- step S705 as a result of analyzing the information included in the message obtained in the communication process between the terminal and the AP, if the AP or terminal is on the list to be blocked, the sensing device 100 displays the BSSID of the AP to which the terminal intends to access the block template, the terminal It is possible to generate a block message in which MAC of the MAC, channel change request command (CSA) and other necessary information are inserted.
- CSA channel change request command
- step S707 the sensing device 100 may transmit the generated block message to the terminal.
- the sensing device 100 shown in FIG. 7 determines whether the connection between the terminal and the AP is 802.11w by generating the same block message regardless of whether or not the connection is 802.11w. It can reduce the time spent making judgments.
- the sensing device 100 stores a block template composed of only items used to block the connection between the terminal and the AP, thereby reducing the time required to copy the wireless communication messages of the AP. there is.
- the sensing device 100 since the sensing device 100 generates a random channel value excluding the channel value included in the wireless communication message transmitted by the AP to change the channel value included in the channel change request command, compared to the conventional sensing device, the AP transmits The time for determining the frequency band of the wireless communication message and the time for generating different channel change request commands for each frequency band can be reduced.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims (9)
- 액세스 포인트와 단말의 연결을 모니터링하는 센싱 장치에 있어서,상기 단말과 상기 액세스 포인트간의 연결을 차단하기 위한 무선 통신 메시지를 생성하는데 사용되는 블록 템플릿을 저장하는 템플릿 저장부; 및상기 단말과 상기 액세스 포인트가 송수신하는 메시지를 획득하고, 상기 메시지를 기초로 분석한 결과, 상기 단말이 서버로부터 제공 받은 차단 대상 목록에 포함된 단말이면, 상기 블록 템플릿에 상기 액세스 포인트의 주소, 상기 단말의 주소 및 상기 단말과 상기 액세스 포인트가 통신하는 채널을 변경할 것을 요구하는 채널 변경 요청 명령을 삽입한 블록 메시지를 상기 단말에 송신하는 센싱 제어부;를 포함하되,상기 블록 템플릿은 상기 단말과 상기 액세스 포인트간의 연결에 이용되는 인증 방식 및 암호 방식을 포함하고,상기 블록 메시지는 상기 블록 메시지를 송신하는 상기 센싱 장치에 관한 정보 및 차단 이유에 관한 정보를 포함하는 센싱 장치.
- 제 1항에 있어서, 상기 채널 변경 요청 명령은,변경할 채널 값을 포함하고, 상기 변경할 채널 값은, 상기 액세스 포인트가 사용하는 채널 값과 다른 채널 값인 센싱 장치.
- 제 2항에 있어서, 상기 변경할 채널 값은,무작위로 생성된 채널 값인 센싱 장치.
- 액세스 포인트와 단말의 연결을 모니터링하는 센싱 장치의 동작 방법에 있어서,상기 단말과 상기 액세스 포인트간의 연결을 차단하기 위한 무선 통신 메시지를 생성하는데 사용되는 블록 템플릿을 저장하는 단계;상기 단말이 상기 액세스 포인트에 송신하는 메시지를 획득하고, 상기 메시지를 기초로 상기 단말이 서버로부터 제공 받은 차단 대상 목록에 포함된 단말인지 여부를 판단하는 단계; 및상기 블록 템플릿에 상기 액세스 포인트의 주소, 상기 단말과 상기 액세스 포인트가 통신하는 채널을 변경할 것을 요구하는 채널 변경 요청 명령을 삽입한 블록 메시지를 상기 단말에 송신하는 단계;를 포함하되,상기 블록 템플릿은 상기 단말과 상기 액세스 포인트간의 연결에 이용되는 인증 방식 및 암호 방식을 포함하고,상기 블록 메시지는 상기 블록 메시지를 송신하는 상기 센싱 장치에 관한 정보 및 차단 이유에 관한 정보를 포함하는 센싱 장치의 동작 방법.
- 제 4항에 있어서, 상기 채널 변경 요청 명령은,변경할 채널 값을 포함하고, 상기 변경할 채널 값은, 상기 액세스 포인트가 사용하는 채널 값과 다른 채널 값인 센싱 장치의 동작 방법.
- 제 5항에 있어서, 상기 변경할 채널 값은,무작위로 생성된 채널 값인 센싱 장치의 동작 방법.
- 액세스 포인트와 복수의 단말들의 연결을 모니터링하는 센싱 장치에 있어서,상기 복수의 단말들과 상기 액세스 포인트간의 연결을 차단하기 위한 무선 통신 메시지를 생성하는데 사용되는 블록 템플릿을 저장하는 템플릿 저장부; 및상기 복수의 단말들과 상기 액세스 포인트가 송수신하는 메시지를 획득하고, 상기 메시지를 분석한 결과, 상기 액세스 포인트가 서버로부터 제공 받은 차단 대상 목록에 포함된 액세스 포인트이면, 상기 블록 템플릿에 상기 액세스 포인트의 주소, 상기 복수의 단말들 각각의 주소 및 상기 단말과 상기 액세스 포인트가 통신하는 채널을 변경할 것을 요구하는 채널 변경 요청 명령을 삽입한 블록 메시지들을 상기 복수의 단말들에 송신하는 센싱 제어부;를 포함하되,상기 블록 템플릿은 상기 단말과 상기 액세스 포인트간의 연결에 이용되는 인증 방식 및 암호 방식을 포함하고,상기 블록 메시지는 상기 블록 메시지를 송신하는 상기 센싱 장치에 관한 정보 및 차단 이유에 관한 정보를 포함하는 센싱 장치.
- 제 7항에 있어서, 상기 채널 변경 요청 명령은,변경할 채널 값을 포함하고, 상기 변경할 채널 값은, 상기 액세스 포인트가 사용하는 채널 값과 다른 채널 값인 센싱 장치.
- 제 8항에 있어서, 상기 변경할 채널 값은,무작위로 생성된 채널 값인 센싱 장치.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202280055725.3A CN117837185A (zh) | 2021-08-10 | 2022-04-13 | 感测装置、包括感测装置的无线入侵防御系统及其操作方法 |
JP2024508612A JP2024532793A (ja) | 2021-08-10 | 2022-04-13 | センシング装置、センシング装置を含む無線侵入防止システムおよびその動作方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020210105476A KR102359805B1 (ko) | 2021-08-10 | 2021-08-10 | 센싱 장치, 센싱 장치를 포함하는 무선 침입 방지 시스템 및 그것의 동작 방법 |
KR10-2021-0105476 | 2021-08-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2023017952A1 true WO2023017952A1 (ko) | 2023-02-16 |
Family
ID=80266041
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2022/005381 WO2023017952A1 (ko) | 2021-08-10 | 2022-04-13 | 센싱 장치, 센싱 장치를 포함하는 무선 침입 방지 시스템 및 그것의 동작 방법 |
Country Status (4)
Country | Link |
---|---|
JP (1) | JP2024532793A (ko) |
KR (1) | KR102359805B1 (ko) |
CN (1) | CN117837185A (ko) |
WO (1) | WO2023017952A1 (ko) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118590318A (zh) * | 2024-08-05 | 2024-09-03 | 苏州大学 | 一种动态重定向的网络攻击黑名单管理方法及系统 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102359805B1 (ko) * | 2021-08-10 | 2022-02-09 | 주식회사 시큐아이 | 센싱 장치, 센싱 장치를 포함하는 무선 침입 방지 시스템 및 그것의 동작 방법 |
KR102711013B1 (ko) | 2024-04-02 | 2024-09-27 | 주식회사 볼드피크 | 무선 보안 구독 서비스 시스템 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20080108806A (ko) * | 2007-06-11 | 2008-12-16 | 스콥정보통신 주식회사 | 무선랜 침입 방지 시스템 및 방법 |
JP2014155095A (ja) * | 2013-02-12 | 2014-08-25 | Oki Electric Ind Co Ltd | 通信制御装置、プログラム及び通信制御方法 |
KR101447469B1 (ko) * | 2013-12-31 | 2014-10-06 | 한국정보보호시스템(주) | 무선 침입 방지 시스템에서의 모바일 패킷을 이용한 공격의 방어 및 제어 방법 |
KR102102835B1 (ko) * | 2019-03-26 | 2020-04-22 | 시큐어레터 주식회사 | Wips 센서 |
KR102157661B1 (ko) * | 2020-03-11 | 2020-09-18 | 주식회사 시큐아이 | 무선 침입 방지 시스템, 이를 포함하는 무선 네트워크 시스템 및 무선 네트워크 시스템의 작동 방법 |
KR102359805B1 (ko) * | 2021-08-10 | 2022-02-09 | 주식회사 시큐아이 | 센싱 장치, 센싱 장치를 포함하는 무선 침입 방지 시스템 및 그것의 동작 방법 |
-
2021
- 2021-08-10 KR KR1020210105476A patent/KR102359805B1/ko active IP Right Grant
-
2022
- 2022-04-13 JP JP2024508612A patent/JP2024532793A/ja active Pending
- 2022-04-13 WO PCT/KR2022/005381 patent/WO2023017952A1/ko active Application Filing
- 2022-04-13 CN CN202280055725.3A patent/CN117837185A/zh active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20080108806A (ko) * | 2007-06-11 | 2008-12-16 | 스콥정보통신 주식회사 | 무선랜 침입 방지 시스템 및 방법 |
JP2014155095A (ja) * | 2013-02-12 | 2014-08-25 | Oki Electric Ind Co Ltd | 通信制御装置、プログラム及び通信制御方法 |
KR101447469B1 (ko) * | 2013-12-31 | 2014-10-06 | 한국정보보호시스템(주) | 무선 침입 방지 시스템에서의 모바일 패킷을 이용한 공격의 방어 및 제어 방법 |
KR102102835B1 (ko) * | 2019-03-26 | 2020-04-22 | 시큐어레터 주식회사 | Wips 센서 |
KR102157661B1 (ko) * | 2020-03-11 | 2020-09-18 | 주식회사 시큐아이 | 무선 침입 방지 시스템, 이를 포함하는 무선 네트워크 시스템 및 무선 네트워크 시스템의 작동 방법 |
KR102359805B1 (ko) * | 2021-08-10 | 2022-02-09 | 주식회사 시큐아이 | 센싱 장치, 센싱 장치를 포함하는 무선 침입 방지 시스템 및 그것의 동작 방법 |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118590318A (zh) * | 2024-08-05 | 2024-09-03 | 苏州大学 | 一种动态重定向的网络攻击黑名单管理方法及系统 |
Also Published As
Publication number | Publication date |
---|---|
JP2024532793A (ja) | 2024-09-10 |
CN117837185A (zh) | 2024-04-05 |
KR102359805B1 (ko) | 2022-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2023017952A1 (ko) | 센싱 장치, 센싱 장치를 포함하는 무선 침입 방지 시스템 및 그것의 동작 방법 | |
WO2021182667A1 (ko) | 무선 침입 방지 시스템, 이를 포함하는 무선 네트워크 시스템 및 무선 네트워크 시스템의 작동 방법 | |
WO2017091047A1 (ko) | 무선 침입 방지 시스템에서의 접속 차단 방법 및 장치 | |
WO2022255619A1 (ko) | 무선 침입 방지 시스템 및 그 동작 방법 | |
JP4287289B2 (ja) | 無線ローカルエリアネットワークにおける非認可ステーションの検出 | |
CA2495142C (en) | Wireless local or metropolitan area network with intrusion detection features and related methods | |
Agarwal et al. | An efficient scheme to detect evil twin rogue access point attack in 802.11 Wi-Fi networks | |
WO2014010786A1 (ko) | 무선 통신 시스템에서 동작 채널 정보를 송수신하는 방법 및 장치 | |
WO2017078459A1 (en) | Method, ue and network node for protecting user privacy in networks | |
WO2004023730A2 (en) | System and method for remotely monitoring wirless networks | |
JP2005522132A5 (ko) | ||
JP2005522120A (ja) | 無線ローカルエリアネットワーク中の偽造アクセスポイントの検出 | |
WO2018149368A1 (zh) | 一种移动终端VoWiFi通话的处理方法、系统及移动终端 | |
US8428516B2 (en) | Wireless ad hoc network security | |
KR102102835B1 (ko) | Wips 센서 | |
WO2005081460A1 (ja) | 不正無線局検出システム、それに用いる装置及びその方法 | |
JP2005536117A (ja) | 侵入検出機能を備えた無線ローカルまたはメトロポリタンエリアネットワーク及び関連する方法 | |
WO2019231215A1 (ko) | 단말 장치 및 이에 의한 악성 ap의 식별 방법 | |
WO2010019021A2 (ko) | 이동 통신 시스템의 비계층 프로토콜 처리 방법 및 이동통신 시스템 | |
WO2018000790A1 (zh) | 移动终端的小区重选方法、小区重选装置及移动终端 | |
WO2024029658A1 (ko) | 네트워크에서의 접근 통제 시스템 및 그 방법 | |
WO2019182219A1 (ko) | 블록체인기반의 신뢰 네트워크 시스템 | |
WO2013172587A1 (ko) | 클라우드 센서 네트워크를 이용한 지능형 무선침입방지 시스템 및 센서 | |
JP2006217198A (ja) | 複数のレイヤ2機能を備える無線基地局 | |
KR102596544B1 (ko) | 무선 침입 차단 방법 및 장치 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22855954 Country of ref document: EP Kind code of ref document: A1 |
|
DPE1 | Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101) | ||
WWE | Wipo information: entry into national phase |
Ref document number: 202280055725.3 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2024508612 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 22855954 Country of ref document: EP Kind code of ref document: A1 |