[go: up one dir, main page]

CN103067922A - Method and system for preventing illegal access point in wireless local area network - Google Patents

Method and system for preventing illegal access point in wireless local area network Download PDF

Info

Publication number
CN103067922A
CN103067922A CN201310027099XA CN201310027099A CN103067922A CN 103067922 A CN103067922 A CN 103067922A CN 201310027099X A CN201310027099X A CN 201310027099XA CN 201310027099 A CN201310027099 A CN 201310027099A CN 103067922 A CN103067922 A CN 103067922A
Authority
CN
China
Prior art keywords
access point
sta
rogue
monitoring
monitoring client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201310027099XA
Other languages
Chinese (zh)
Inventor
彭永超
熊杰
唐建国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201310027099XA priority Critical patent/CN103067922A/en
Publication of CN103067922A publication Critical patent/CN103067922A/en
Priority to PCT/CN2013/083675 priority patent/WO2014114099A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention discloses a method and system for preventing an illegal access point in a wireless local area network. The method comprises the following steps that: an access point controller is used for controlling one or more monitoring sides to send a detection message to all access points and informing that legal access points do not make responses after receiving the detection message in advance through a safety channel; and the access point controller is used for determining the illegal access points in all the access points through the responses received by the monitoring sides and controlling the monitoring sides to send an attack message to the illegal access points. The method disclosed by the invention is simple and easy to implement and effectively solves the problem that an MAC (Media Access Control) address of an illegal AP (Access Point) is illegally accessed after being corrected into an MAC address of a legal AP by the illegal AP.

Description

WLAN (wireless local area network) is taken precautions against the method and system of rogue access point
Technical field
The present invention relates to communication technical field, relate in particular to the method and system that a kind of WLAN (wireless local area network) is taken precautions against rogue access point.
Background technology
WLAN (wireless local area network) (WLAN, Wireless Local Area Network) technology is based on 802.11 normalizations that IEEE formulates.In this standard WLAN (wireless local area network) is called Basic Service Set (BSS, Basic Service Set), the equipment that forms BSS is called as website (STA, Station), and defined two kinds of networking models: infrastructure mode (Infrastructure BSS) BSS and stand-alone mode (Independent) BSS.In Infrastructure BSS, an existing interface that is connected to WLAN (wireless local area network) of STA is arranged, the interface that is connected to cable network is also arranged, it is called as access point (AP), other STA will be connected on the AP, communicating by letter between each STA and the cable network, and the communication between each STA all will be passed through the AP transfer.And IBSS is also referred to as ad hoc network, and the status of each STA is equality, does not have AP, and they interconnect, and direct communication.Mostly can adopt infrastructure mode during actual networking.
Because the signal of WLAN is aloft to transmit, so compare cable LAN, it faces more security threat.One of them larger threat is rogue AP.The lawless person just can erect an AP with very low cost (only needing a wireless network card), it is put into the hot spot region, coffee shop for example, and play one and know each other or identical title with legal wireless network name, for example ChinaNet-, CMCC-start, lure that the user connects it into, and false login page is provided, get access to user's account number and password etc.In order to have more duplicity, the lawless person may take the man-in-the-middle attack mode, at his computer two wireless network cards is installed, and one of them is configured to ap mode, and false access service is provided; Another one is configured to the STA pattern, is connected on the legal AP; Two network interface cards carry out bridge joint.So, after STA is connected to rogue AP, can also normally surf the Net, but the message of STA transmitting-receiving all intercepted and captured, the assailant therefrom can analyze a lot of information of user.
Take precautions against rogue AP, at first want to detect the existence of rogue AP.The detection method that generally adopts at present is based on the MAC Address of AP: controller is safeguarded the MAC Address tabulation of a legal AP by the method for static configuration or dynamic learning, and specifies several legal AP periodically to carry out scan operation; Each legal AP is the scanning result of oneself, comprises the information such as MAC Address, channel number of each neighbor AP, reports controller; Controller compares the tabulation of scanning result and legal AP again, if MAC Address that AP arranged just judges that it is rogue AP not in tabulation.
But because wireless network environment is open, so rogue AP fully can be by monitoring beacon frame, get access to the information such as MAC Address of certain legal AP, then the parameter modifications such as MAC Address with oneself become identical with it, and top detection method had just lost efficacy like this.Deal with this situation so need the new method of research.
Summary of the invention
In view of above-mentioned analysis, the present invention aims to provide the method and system that a kind of WLAN (wireless local area network) is taken precautions against rogue access point, can not take precautions against rogue AP in the prior art its MAC Address is revised as the problem that the MAC Address of legal AP illegally accesses in order to solve.
Purpose of the present invention mainly is achieved through the following technical solutions:
A kind of WLAN (wireless local area network) is taken precautions against the method for rogue access point, comprising:
AC controls one or more monitoring clients and sends detection messages to all AP, and described AC informs after legal AP is received this detection messages by escape way in advance and do not reply;
Described AC replys the rogue AP of determining among all AP by what described monitoring client was received, and controls described monitoring client and send attack message to described rogue AP.
Preferably, the described monitoring client of control specifically comprised to the step that described rogue AP sends attack message after described AC determined rogue AP:
After described AC determines rogue AP, the STA address of a plurality of vacations of random configuration, and the STA address of above-mentioned vacation passed to described monitoring client by described escape way, if described rogue AP has been pretended to be the STA address of legal AP, the STA address with above-mentioned vacation passes to the legal AP that described rogue AP is pretended to be by described escape way simultaneously;
Described AC controls the STA that STA address that described monitoring client uses above-mentioned vacation is forged into a plurality of vacations and sends attack message to described rogue AP;
After the legal AP that described rogue AP is pretended to be is received above-mentioned attack message, ignore this attack message.
Preferably, described monitoring client is monitoring STA or the monitoring AP of described AC appointment;
When described monitoring client is monitoring during AP, the described monitoring AP STA that disguises oneself as sends detection messages to all AP, and wherein, the disguise oneself as MAC Address of STA of described monitoring AP is described AC random configuration;
When described monitoring client is monitoring during STA, the MAC Address of described monitoring STA is described AC random configuration.
Preferably, the type of described detection messages comprises: probe requests thereby and/or related request.
Preferably, the type of described attack message comprises: authentication request and/or related request.
The present invention also provides a kind of WLAN (wireless local area network) to take precautions against the system of rogue access point, comprising:
AC, be used for controlling one or more monitoring clients and send detection messages to all AP, and inform after legal AP is received this detection messages by escape way in advance and do not reply, and reply the rogue AP of determining among all AP by what described monitoring client was received, and control described monitoring client and send attack message to described rogue AP;
Described monitoring client is used for sending detection messages according to the indication of described AC to all AP, and described the replying that will receive send to described AC, and also the indication according to described AC sends attack message to described rogue AP.
Preferably, described AC specifically is used for, control one or more monitoring clients and send detection messages to all AP, and inform after all legal AP are received this detection messages by escape way in advance and do not reply, the described rogue AP of replying to determine among all AP of receiving according to described monitoring client, and the STA address of a plurality of vacations of random configuration after determining rogue AP, the STA address of above-mentioned vacation is passed to described monitoring client by described escape way, if described rogue AP has been pretended to be the STA address of legal AP, STA address with above-mentioned vacation passes to the legal AP that described rogue AP is pretended to be by described escape way simultaneously, and controls the STA that STA address that described monitoring client uses above-mentioned vacation is forged into a plurality of vacations and send attack message to described rogue AP;
Described monitoring client specifically is used for, indication according to described AC sends detection messages to all AP, and described the replying that will receive send to described AC, also uses the STA address of a plurality of vacations of described AC random configuration to send attack message to described rogue AP according to the indication of described AC.
Preferably, described monitoring client is monitoring STA or the monitoring AP of described AC appointment;
When described monitoring client is monitoring during AP, the described monitoring AP STA that disguises oneself as sends detection messages to all AP, and wherein, the disguise oneself as MAC Address of STA of described monitoring AP is described AC random configuration;
When described monitoring client is monitoring during STA, the MAC Address of described monitoring STA is described AC random configuration.
Preferably, the type of described detection messages comprises: probe requests thereby and/or related request.
Preferably, the type of described attack message comprises: authentication request and/or related request.
Beneficial effect of the present invention is as follows:
The invention provides a kind of WLAN (wireless local area network) and take precautions against the method and system of rogue access point, send detection messages by access point controller control monitoring client to all AP, legal AP is not replied after receiving this detection messages, and rogue AP is replied after receiving described detection messages, access point controller describedly replys to determine rogue AP according to what the described rogue AP that described monitoring client is received was sent, and control described monitoring client to described rogue AP transmission attack message, make described rogue AP cisco unity malfunction.The method is simple, easily realizes, efficiently solves rogue AP by the method its MAC Address is revised as the problem that the MAC Address of legal AP illegally accesses.
Other features and advantages of the present invention will be set forth in the following description, and becoming apparent from specification of part perhaps understood by implementing the present invention.Purpose of the present invention and other advantages can realize and obtain by specifically noted structure in the specification of writing, claims and accompanying drawing.
Description of drawings
Fig. 1 is that the WLAN (wireless local area network) of the embodiment of the invention 1 is taken precautions against the flow chart of the method for rogue access point;
Fig. 2 is that the legal AP of the embodiment of the invention 1 detects and attack the flow chart of the method for rogue AP;
Fig. 3 is that the STA of the embodiment of the invention 1 detects and attack the flow chart of the method for rogue AP.
Embodiment
Specifically describe the preferred embodiments of the present invention below in conjunction with accompanying drawing, wherein, accompanying drawing consists of the application's part, and is used for explaining together with embodiments of the present invention principle of the present invention.For clear and simplification purpose, when it may make theme of the present invention smudgy, with specifying in detail of known function and structure in the omission device described herein.
Comprise website (STA, Station), access point (AP, Access Point) and access point controller (AC, Access Point Controller) in the method and system of a kind of WLAN (wireless local area network) strick precaution rogue access point provided by the invention.
Embodiment 1
The embodiment of the invention provides a kind of WLAN (wireless local area network) to take precautions against the method for rogue access point, and referring to Fig. 1, the method comprises:
S101, access point controller are controlled one or more monitoring clients and are sent detection messages to all AP, and described AC informs after all legal AP are received this detection messages by escape way in advance and do not need to reply;
Escape way in the embodiment of the invention is between described legal AP and the described AC, and a kind of escape way of setting up between STA and the described AC.Normally be connected by cable network between legal AP and AC, and adopt the CAPWAP agreement (seeing rfc5415) to carry out alternately, this protocol requirement is based on wildcard, or certificate, sets up the encrypted communication channel between AP and AC.And rogue AP generally is not connect upper AC by cable network, even connected, owing to not having wildcard or certificate on the rogue AP, also can't set up encrypted communication channel, so only have escape way is arranged just between legal AP and AC.If described monitoring client is STA, then the message by the wireless channel transmission also needs protection between this STA and legal AP, can allow legal AP and STA set up the wireless security passage by the WPA/WPA2 key agreement.
Described monitoring client in the embodiment of the invention is monitoring STA or the monitoring AP of described AC appointment.
When described monitoring client is monitoring during AP, the described monitoring AP STA that disguises oneself as sends detection messages to all AP, and wherein, the disguise oneself as MAC Address of STA of described monitoring AP is described AC random configuration;
When described monitoring client is monitoring during STA, the MAC Address of described monitoring STA is described AC random configuration.
Detection messages in the embodiment of the invention comprises: sense cycle, probe requests thereby and/or related request, and the channel that needs scanning.
S102, rogue AP are replied after receiving described detection messages;
Because rogue AP does not know that this is a detection messages, so can reply this detection messages.
S103, described AC describedly reply to determine which AP is rogue AP according to what the described rogue AP that described monitoring client is received was sent;
S104, described AC control described monitoring client and send attack message to described rogue AP after determining rogue AP, make described rogue AP cisco unity malfunction.
Wherein, described attack message comprises: the MAC Address of described rogue AP, probe requests thereby and/or related request, and the length of attack time.
This step specifically comprises:
After described AC determines rogue AP, the STA address of a plurality of vacations of random configuration, and the STA address of above-mentioned vacation passed to described monitoring client by described escape way, if described rogue access point has been pretended to be the STA address of legal access point, the STA address with above-mentioned vacation passes to the legal access point that described rogue access point is pretended to be by described escape way simultaneously;
Described AC controls the STA that STA address that described monitoring client uses above-mentioned vacation is forged into a plurality of vacations and sends attack message to described rogue AP, makes described rogue AP cisco unity malfunction;
And after the legal AP that described rogue AP is pretended to be receives above-mentioned attack message, ignore this attack message, so the impact that it can message under attack.
As shown in Figure 2, the embodiment of the invention also provides a kind of legal AP to carry out the method that detects and attack rogue AP, and the method specifically comprises:
When enabling the function of taking precautions against rogue AP, at first select several legal AP as monitoring AP on the AC, the coverage of these monitoring AP is added up and be wanted to contain whole wireless network.
Be simplified characterization, supposition has 3 legal AP in the following example, AP1 ~ AP3, and the selected AP1 of AC is as monitoring AP.Suppose that AP4 is rogue AP, and it has been arranged to the MAC Address of oneself identical with AP2.
S201, several false STA addresses of AC random configuration by escape way, pass to all legal AP.
S202, AC assign the order that begins to detect to AP1, require it to begin to detect the process of rogue AP.Described sense command comprises: the type of sense cycle, detection messages (probe requests thereby and/or related request etc.), and the channel that needs scanning;
S203, AP1 as requested, periodically constructing source address is the detection messages of certain false STA address, take to broadcast or the form of clean culture send (if probe requests thereby, can be with broadcasting; If related request can only be used clean culture).AP2 and AP3 have known that this is a false STA, can not reply.And AP4 does not know, has sent to reply, and oneself has been exposed.
If S204 AP1 has received reply, just report AC.
S205, in order to reduce erroneous judgement, AC is upper to do further affirmation.
For example, if the source address of response message is the address of certain legal AP, AC can pass through escape way, requires this legal AP to confirm, whether really sends response message.In addition, AC is upper can to configure certain rule, ignores some and replys.For example, if the wireless network name that comprises in the response message is not this operator, just neglect.
After AC confirms to have detected rogue AP, can carry out following step, launch a offensive to rogue AP, be connected on the rogue AP to stop STA.
S206, a lot of false STA addresses of AC random configuration pass to monitoring AP with these addresses by escape way, are AP1 here.If it is identical with certain legal AP that rogue AP has been arranged to the address of oneself, then AC also will pass to counterfeiting legal AP with the STA address of vacation, is AP2 here.
S207, AC assign the order of launching a offensive to AP1, require it to launch a offensive to rogue AP.Comprise the parameters such as the MAC Address of rogue AP, the type of attack message (authentication request and/or related request etc.), attack time length in the described strike order.
S208, AP1 begin to rogue AP, and namely AP4 launches a offensive, and are forged into a lot of STA, send attack message to rogue AP.The upper STA number that allows to connect of general AP is limited, and when the resource on the AP4 was all taken by false STA, normal STA be not even gone up it, and this is our result of wanting just.
S209, because AP4 is arranged to identical with AP2 with the address of oneself, so also can receive attack message on the AP2.Because AC has informed AP2 with the address of false STA, so the wireless driving on the AP2 can be directly with these packet loss, the impact that it is subject to is very little.
As shown in Figure 3, the embodiment of the invention also provides a kind of STA to carry out the method that detects and attack rogue AP, and the method specifically comprises:
The present invention disposes several monitoring STA in the coverage of WLAN (wireless local area network), carry out the work that detects and stop rogue AP by them.By adopting monitoring STA can reduce the impact that legal AP is worked.
S301, monitoring STA use certain legal AP in the association of real address, and by modes such as WPA/WPA2 key agreements, escape way between foundation and legal AP;
That S302, AC judgement is reached the standard grade is a monitoring STA, and STA issues an order to monitoring, wherein comprises the STA address of wanting vacation, and AC is handed down to each legal AP by escape way with the STA address of forging simultaneously;
S303, AC assign the order of detection messages to monitoring STA, require it to begin testing process, comprise in the described sense command: the type of sense cycle, detection messages (probe requests thereby and/or related request etc.), and the channel that needs scanning;
S304, monitoring STA are revised as the address of oneself address of certain forgery as requested, send detection messages.Because legal AP has known that this is the address of forging, and can not reply; And rogue AP is not known, can reply, and just oneself has been exposed;
After S305, testing process finished, monitoring STA changeed back real address with the address of oneself, and related upper legal AP reports AC with testing result again;
S306, in order to reduce erroneous judgement, AC is upper can to send message to the legal AP of rogue AP personation, does further to confirm;
After S307, the affirmation rogue AP, a lot of false STA addresses of AC random configuration pass to monitoring STA and counterfeiting legal AP with these addresses by escape way, are AP2 here;
S308, AC assign the beginning strike order to monitoring STA, require it to launch a offensive to rogue AP.Comprise in the described strike order: the MAC Address of described rogue AP, the type of attack message (authentication request and/or related request etc.), and the length of attack time;
S309, monitoring STA begin to rogue AP, and namely AP4 launches a offensive.It uses false address, sends attack message to AP4;
The upper STA number that allows to connect of general AP is limited, and when the resource on the AP4 was all taken by false STA, other normal STA be not even gone up it, thereby made the rogue AP cisco unity malfunction.
S310, because AP4 is arranged to identical with AP2 with the address of oneself, so also can receive attack message on the AP2.Because AC has informed AP2 with the address of false STA, so the wireless driving on the AP2 can be directly with these packet loss, the impact that it is subject to is very little.
Embodiment 2
The embodiment of the invention provides a kind of WLAN (wireless local area network) to take precautions against the system of rogue access point, and this system comprises:
Access point controller, be used for controlling one or more monitoring clients and send detection messages to all access points, and inform after all legal access points are received this detection messages by escape way in advance and do not reply, the described rogue access point of replying to determine in all access points of receiving according to described monitoring client, and the STA address of a plurality of vacations of random configuration after determining rogue access point, the STA address of above-mentioned vacation is passed to described monitoring client by described escape way, if described rogue access point has been pretended to be the STA address of legal access point, STA address with above-mentioned vacation passes to the legal access point that described rogue access point is pretended to be by described escape way simultaneously, and controls the STA that STA address that described monitoring client uses above-mentioned vacation is forged into a plurality of vacations and send attack message to described rogue access point;
Monitoring client, be used for sending detection messages according to the indication of described access point controller to all access points, and described the replying that will receive send to described access point controller, also uses the STA address of a plurality of vacations of described access point controller random configuration to send attack message to described rogue access point according to the indication of described access point controller.
Described monitoring client in the embodiment of the invention is monitoring STA or the monitoring AP of described AC appointment.
Wherein, when described monitoring client is monitoring during AP, the described monitoring AP STA that disguises oneself as sends detection messages to all AP, and wherein, the disguise oneself as MAC Address of STA of described monitoring AP is described AC random configuration;
When described monitoring client is monitoring during STA, the MAC Address of described monitoring STA is described AC random configuration.
Described detection messages in the embodiment of the invention comprises: sense cycle, probe requests thereby and/or related request, and the channel that needs scanning.
Described attack message in the embodiment of the invention comprises: the MAC Address of described rogue AP, authentication request and/or related request, and the length of attack time.
In sum, the embodiment of the invention provides a kind of WLAN (wireless local area network) to take precautions against the method and system of rogue access point, send detection messages by access point controller control monitoring client to all AP, legal AP is not replied after receiving this detection messages, and rogue AP is replied after receiving described detection messages, access point controller describedly replys to determine which AP is rogue AP according to what the described rogue AP that described monitoring client is received was sent, and after determining rogue AP, control described monitoring client and send attack message to described rogue AP, make described rogue AP cisco unity malfunction.The method is simple, easily realizes, efficiently solves rogue AP by the method its MAC Address is revised as the problem that the MAC Address of legal AP illegally accesses.
The above; only for the better embodiment of the present invention, but protection scope of the present invention is not limited to this, anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claims.

Claims (10)

1. the method for a WLAN (wireless local area network) strick precaution rogue access point is characterized in that, comprising:
Access point controller is controlled one or more monitoring clients and is sent detection messages to all access points, and described access point controller is informed after legal access point is received this detection messages by escape way in advance and do not replied;
Described access point controller is replied the rogue access point of determining in all access points by what described monitoring client was received, and controls described monitoring client and send attack message to described rogue access point.
2. method according to claim 1 is characterized in that, the described monitoring client of control specifically comprised to the step that described rogue access point sends attack message after described access point controller was determined rogue access point:
After described access point controller is determined rogue access point, the STA address of a plurality of vacations of random configuration, and the STA address of above-mentioned vacation passed to described monitoring client by described escape way, if described rogue access point has been pretended to be the STA address of legal access point, the STA address with above-mentioned vacation passes to the legal access point that described rogue access point is pretended to be by described escape way simultaneously;
Described access point controller is controlled the STA that STA address that described monitoring client uses above-mentioned vacation is forged into a plurality of vacations and is sent attack message to described rogue access point;
After the legal access point that described rogue access point is pretended to be is received above-mentioned attack message, ignore this attack message.
3. method according to claim 1 and 2 is characterized in that, described monitoring client is monitoring STA or the monitoring access point of described access point controller appointment;
When described monitoring client is monitoring during access point, the described monitoring access point STA that disguises oneself as sends detection messages to all access points, and wherein, the disguise oneself as MAC Address of STA of described monitoring access point is described access point controller random configuration;
When described monitoring client is monitoring during STA, the MAC Address of described monitoring STA is described access point controller random configuration.
4. method according to claim 1 and 2 is characterized in that, the type of described detection messages comprises: probe requests thereby and/or related request.
5. method according to claim 1 and 2 is characterized in that, the type of described attack message comprises: authentication request and/or related request.
6. the system of a WLAN (wireless local area network) strick precaution rogue access point is characterized in that, comprising:
Access point controller, be used for controlling one or more monitoring clients and send detection messages to all access points, and inform after legal access point is received this detection messages by escape way in advance and do not reply, and reply the rogue access point of determining in all access points by what described monitoring client was received, and control described monitoring client and send attack message to described rogue access point;
Described monitoring client, be used for sending detection messages according to the indication of described access point controller to all access points, and described the replying that will receive send to described access point controller, and also the indication according to described access point controller sends attack message to described rogue access point.
7. system according to claim 6 is characterized in that,
Described access point controller specifically is used for, control one or more monitoring clients and send detection messages to all access points, and inform after all legal access points are received this detection messages by escape way in advance and do not reply, the described rogue access point of replying to determine in all access points of receiving according to described monitoring client, and the STA address of a plurality of vacations of random configuration after determining rogue access point, the STA address of above-mentioned vacation is passed to described monitoring client by described escape way, if described rogue access point has been pretended to be the STA address of legal access point, STA address with above-mentioned vacation passes to the legal access point that described rogue access point is pretended to be by described escape way simultaneously, and controls the STA that STA address that described monitoring client uses above-mentioned vacation is forged into a plurality of vacations and send attack message to described rogue access point;
Described monitoring client specifically is used for, indication according to described access point controller sends detection messages to all access points, and described the replying that will receive send to described access point controller, also uses the STA address of a plurality of vacations of described access point controller random configuration to send attack message to described rogue access point according to the indication of described access point controller.
8. according to claim 6 or 7 described systems, it is characterized in that, described monitoring client is monitoring STA or the monitoring access point of described access point controller appointment;
When described monitoring client is monitoring during access point, the described monitoring access point STA that disguises oneself as sends detection messages to all access points, and wherein, the disguise oneself as MAC Address of STA of described monitoring access point is described access point controller random configuration;
When described monitoring client is monitoring during STA, the MAC Address of described monitoring STA is described access point controller random configuration.
9. according to claim 6 or 7 described systems, it is characterized in that, the type of described detection messages comprises probe requests thereby and/or related request.
10. according to claim 6 or 7 described systems, it is characterized in that, the type of described attack message comprises: authentication request and/or related request.
CN201310027099XA 2013-01-24 2013-01-24 Method and system for preventing illegal access point in wireless local area network Pending CN103067922A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310027099XA CN103067922A (en) 2013-01-24 2013-01-24 Method and system for preventing illegal access point in wireless local area network
PCT/CN2013/083675 WO2014114099A1 (en) 2013-01-24 2013-09-17 Method and system for preventing rogue access points in wireless local area network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310027099XA CN103067922A (en) 2013-01-24 2013-01-24 Method and system for preventing illegal access point in wireless local area network

Publications (1)

Publication Number Publication Date
CN103067922A true CN103067922A (en) 2013-04-24

Family

ID=48110348

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310027099XA Pending CN103067922A (en) 2013-01-24 2013-01-24 Method and system for preventing illegal access point in wireless local area network

Country Status (2)

Country Link
CN (1) CN103067922A (en)
WO (1) WO2014114099A1 (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103391546A (en) * 2013-07-12 2013-11-13 杭州华三通信技术有限公司 Wireless attack detection and defense device and method thereof
CN103561405A (en) * 2013-10-23 2014-02-05 杭州华三通信技术有限公司 Method and device for countering Rogue AP
WO2014114099A1 (en) * 2013-01-24 2014-07-31 中兴通讯股份有限公司 Method and system for preventing rogue access points in wireless local area network
CN104253817A (en) * 2014-09-25 2014-12-31 大连梯耐德网络技术有限公司 A FPGA-based network behavior attack method and device
CN104270366A (en) * 2014-09-30 2015-01-07 北京金山安全软件有限公司 Method and device for detecting karma attack
CN104703181A (en) * 2013-12-09 2015-06-10 重庆重邮信科通信技术有限公司 Access node authentication method and terminal
CN105162768A (en) * 2015-07-31 2015-12-16 腾讯科技(深圳)有限公司 Method and device for detecting phishing Wi-Fi hotspots
CN105208562A (en) * 2015-08-26 2015-12-30 盾宇(上海)信息科技有限公司 Active base station fraud prevention method based on client computer and system thereof
CN105262734A (en) * 2015-09-23 2016-01-20 周超 Secure router having hacker attack prevention function
CN105657706A (en) * 2015-10-30 2016-06-08 东莞酷派软件技术有限公司 An access method, related equipment and access device
CN106102068A (en) * 2016-08-23 2016-11-09 大连网月科技股份有限公司 A kind of illegal wireless access point detection and attack method and device
CN106131845A (en) * 2016-08-23 2016-11-16 大连网月科技股份有限公司 A kind of illegal wireless access-point attacks method and device
CN106165506A (en) * 2013-07-19 2016-11-23 英特尔公司 Identification of Rogue Access Points
CN106211161A (en) * 2016-06-23 2016-12-07 杭州华三通信技术有限公司 A kind of equipment counter method and device
CN106454843A (en) * 2016-11-14 2017-02-22 上海斐讯数据通信技术有限公司 Illegal AP (Access Point) suppression method and system in wireless local area network, and wireless AP
CN106899538A (en) * 2015-12-17 2017-06-27 中国电信股份有限公司 The access point method of inspection and system and credible access point, Cloud Server
CN108235322A (en) * 2017-12-28 2018-06-29 新华三技术有限公司 A kind of counter method and device of wireless device
CN116266911A (en) * 2021-12-16 2023-06-20 迈普通信技术股份有限公司 An illegal wireless access point countermeasure device, system and method

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018182915A1 (en) * 2017-03-29 2018-10-04 The Johns Hopkins University SYSTEM AND METHOD FOR SMALL UNMANNED AERIAL SYSTEMS (sUAS) DEFENSE
CN108768671A (en) * 2018-06-28 2018-11-06 新华三技术有限公司 access point control method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1679264A (en) * 2002-08-12 2005-10-05 哈里公司 Wireless local on metropolitan area network with intrusion detection features and related methods
WO2006073642A2 (en) * 2005-01-05 2006-07-13 Cisco Technology, Inc. Network infrastructure validation of network management frames
CN1996893A (en) * 2006-12-25 2007-07-11 杭州华为三康技术有限公司 Method, device and system for monitoring illegal access point in the wireless LAN
US7760710B2 (en) * 2001-07-27 2010-07-20 Cisco Technology, Inc. Rogue access point detection
CN102014378A (en) * 2010-11-29 2011-04-13 北京星网锐捷网络技术有限公司 Method and system for detecting rogue access point device and access point device
CN102227114A (en) * 2010-07-23 2011-10-26 卡巴斯基实验室封闭式股份公司 System and method for detecting junk mail robot by detection data transmission

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103067922A (en) * 2013-01-24 2013-04-24 中兴通讯股份有限公司 Method and system for preventing illegal access point in wireless local area network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7760710B2 (en) * 2001-07-27 2010-07-20 Cisco Technology, Inc. Rogue access point detection
CN1679264A (en) * 2002-08-12 2005-10-05 哈里公司 Wireless local on metropolitan area network with intrusion detection features and related methods
WO2006073642A2 (en) * 2005-01-05 2006-07-13 Cisco Technology, Inc. Network infrastructure validation of network management frames
CN1996893A (en) * 2006-12-25 2007-07-11 杭州华为三康技术有限公司 Method, device and system for monitoring illegal access point in the wireless LAN
CN102227114A (en) * 2010-07-23 2011-10-26 卡巴斯基实验室封闭式股份公司 System and method for detecting junk mail robot by detection data transmission
CN102014378A (en) * 2010-11-29 2011-04-13 北京星网锐捷网络技术有限公司 Method and system for detecting rogue access point device and access point device

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014114099A1 (en) * 2013-01-24 2014-07-31 中兴通讯股份有限公司 Method and system for preventing rogue access points in wireless local area network
CN103391546A (en) * 2013-07-12 2013-11-13 杭州华三通信技术有限公司 Wireless attack detection and defense device and method thereof
CN103391546B (en) * 2013-07-12 2017-03-15 杭州华三通信技术有限公司 A kind of wireless attack detection and defence installation and its method
CN106165506A (en) * 2013-07-19 2016-11-23 英特尔公司 Identification of Rogue Access Points
CN106165506B (en) * 2013-07-19 2020-11-10 英特尔公司 Computing device, method and storage medium for identifying rogue access points
CN103561405A (en) * 2013-10-23 2014-02-05 杭州华三通信技术有限公司 Method and device for countering Rogue AP
CN104703181A (en) * 2013-12-09 2015-06-10 重庆重邮信科通信技术有限公司 Access node authentication method and terminal
CN104253817A (en) * 2014-09-25 2014-12-31 大连梯耐德网络技术有限公司 A FPGA-based network behavior attack method and device
CN104270366A (en) * 2014-09-30 2015-01-07 北京金山安全软件有限公司 Method and device for detecting karma attack
CN104270366B (en) * 2014-09-30 2017-09-29 北京金山安全软件有限公司 method and device for detecting karma attack
CN105162768A (en) * 2015-07-31 2015-12-16 腾讯科技(深圳)有限公司 Method and device for detecting phishing Wi-Fi hotspots
CN105208562A (en) * 2015-08-26 2015-12-30 盾宇(上海)信息科技有限公司 Active base station fraud prevention method based on client computer and system thereof
CN105262734A (en) * 2015-09-23 2016-01-20 周超 Secure router having hacker attack prevention function
CN105657706A (en) * 2015-10-30 2016-06-08 东莞酷派软件技术有限公司 An access method, related equipment and access device
CN106899538A (en) * 2015-12-17 2017-06-27 中国电信股份有限公司 The access point method of inspection and system and credible access point, Cloud Server
CN106211161A (en) * 2016-06-23 2016-12-07 杭州华三通信技术有限公司 A kind of equipment counter method and device
CN106211161B (en) * 2016-06-23 2021-04-02 新华三技术有限公司 Equipment countercheck method and device
CN106102068A (en) * 2016-08-23 2016-11-09 大连网月科技股份有限公司 A kind of illegal wireless access point detection and attack method and device
CN106131845A (en) * 2016-08-23 2016-11-16 大连网月科技股份有限公司 A kind of illegal wireless access-point attacks method and device
CN106454843A (en) * 2016-11-14 2017-02-22 上海斐讯数据通信技术有限公司 Illegal AP (Access Point) suppression method and system in wireless local area network, and wireless AP
CN106454843B (en) * 2016-11-14 2020-12-22 金华市智甄通信设备有限公司 Method and system for inhibiting illegal AP in wireless local area network, and wireless AP
CN108235322A (en) * 2017-12-28 2018-06-29 新华三技术有限公司 A kind of counter method and device of wireless device
CN108235322B (en) * 2017-12-28 2021-06-29 新华三技术有限公司 Reverse control method and device for wireless equipment
CN116266911A (en) * 2021-12-16 2023-06-20 迈普通信技术股份有限公司 An illegal wireless access point countermeasure device, system and method

Also Published As

Publication number Publication date
WO2014114099A1 (en) 2014-07-31

Similar Documents

Publication Publication Date Title
CN103067922A (en) Method and system for preventing illegal access point in wireless local area network
CN100544279C (en) Method, device and system for monitoring illegal access points in wireless local area network
CN105788047B (en) A kind of control of bluetooth access equipment, control of bluetooth access management system and method
WO2011041171A4 (en) Methods and apparatus for solicited activation for protected wireless networking
US7412237B2 (en) Information processing apparatus and information processing method
CN102857916B (en) The method and system that a kind of mobile terminal detects and manages
CN104270758B (en) The method for connecting and authorizing is established by WIFI and server security
CN105681272B (en) The detection of mobile terminal fishing WiFi a kind of and resist method
US9154950B2 (en) Network access method, apparatus and system
CN104302015A (en) Adaptive WI-FI network connection method and system with hidden SSID
KR101169659B1 (en) Apparatus and method for servicing authentication by using portable device and authentication service system thereof, recordable medium which program for executing method is recorded
CN104349325B (en) Method and device for monitoring pseudo- wireless access point AP
CN102075934A (en) AP (Access Point) monitor and method and system for monitoring illegal APs
EP3547759B1 (en) Method, access point and wireless local area network system for establishing a wireless local area network connection between an access point and a station
CN104580152A (en) Protection method and system against wifi (wireless fidelity) phishing
RU2010109858A (en) ACCESS MANAGEMENT FOR A SELF-ORGANIZING BASIC STATION WITH A SMALL COVERAGE AREA
Vanhoef et al. Operating channel validation: Preventing multi-channel man-in-the-middle attacks against protected Wi-Fi networks
EP2826304B1 (en) Method and system for preventing the propagation of ad -hoc networks
CN102438238A (en) Method for detecting illegal AP in centralized WLAN environment
EP1589703B1 (en) System and method for accessing a wireless network
WO2017128546A1 (en) Method and apparatus for securely accessing wifi network
CN102883301B (en) Force method, device and the access controller of client roaming
CN102938886A (en) Method for preventing wireless network from being detected
CN100502300C (en) A method for detecting illegal wireless access points in a wireless local area network
CN101848463A (en) Method for protecting access of legal user based on wireless access point

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20130424

RJ01 Rejection of invention patent application after publication