[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN106878241A - Malice hot spot detecting method and system - Google Patents

Malice hot spot detecting method and system Download PDF

Info

Publication number
CN106878241A
CN106878241A CN201510959228.8A CN201510959228A CN106878241A CN 106878241 A CN106878241 A CN 106878241A CN 201510959228 A CN201510959228 A CN 201510959228A CN 106878241 A CN106878241 A CN 106878241A
Authority
CN
China
Prior art keywords
focus
client
enterprises
control server
blacklist
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510959228.8A
Other languages
Chinese (zh)
Inventor
杨卿
柴坤哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510959228.8A priority Critical patent/CN106878241A/en
Publication of CN106878241A publication Critical patent/CN106878241A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of malice hot spot detecting method and system, methods described includes:The hardware sensor of enterprises is deployed in, all data traffics in current radio environment are persistently captured, the data traffic is real-time transmitted to control server;Control server parses the characteristic information of needs from the data traffic;The characteristic information is carried out into matching detection in feature database;The connection of focus and client to belonging to this enterprises further checked, generates black and white lists;Focus/client in blacklist is positioned, and location information is sent to management terminal and shown.The present invention improves the security of wireless network, can not influence the existing wireless web frame of enterprise with the various wireless network environment of compatible enterprise, seamless can dispose, and carries out intelligence, convenient management.

Description

Malice hot spot detecting method and system
Technical field
The present invention relates to technical field of network security, more particularly to a kind of malice hot spot detecting method And system.
Background technology
As the development of network technology, wireless network are because its convenience, range of application is increasingly Extensively.Some companies and family are because the demand of distinct device wireless networking, is additionally arranged wireless aps (Access Point, access point), enhances the mobility of equipment for surfing the net, compensate for wired network The limitation of network.
For enterprise customer, as the focus in enterprise network is continuously increased, form each The different focus of kind producer, model is simultaneously deposited;Meanwhile, distribution is chaotic, and device security is fragile. Because in wireless network, data are to carry out radiation propagation using wireless signal, and attacker can lead to Any position that focus is covered in invasion wireless network is crossed, intercepted, intercept, reset, destroyed The communication data of user, great security risk is brought to the network information security of enterprise.
In the focus that enterprises occur, mainly there are following several ways, various modes have one Fixed potential safety hazard and problem.
1st, legal focus
There are the focus built of planning, referred to as legal focus in enterprise.Said from security standpoint, it is legal Focus should be unique focus of enterprises, and other focuses all may bring safety to enterprise Risk.
But, legal focus there is also potential safety hazard, though carried out Wireless Encryption Protocol WEP, The password setups such as WPA, there is also weak passwurd, secret grade it is not enough the problems such as, and various Crack strategy and crack tool is full of in the environment of network, these cryptographic protocols are to attacker Speech is also to perform practically no function, and easily causes information by focus Entry Firm internal network by hacker Leakage such as is tampered at the serious consequence;Legal focus is likely to that ddos attack can be received, and causes nothing Method normal service.
2nd, other focuses for coming are covered
Due to the penetrability and the uncertainty on border of wireless network, the nothing of some neighbouring enterprises Gauze network may be covered mutually.This focus has two for the network security of enterprise The problem of aspect.One is whether uncertain other side's focus is safe;Two is that this enterprise staff may Access other side's focus.It is possible to that information leakage can be caused.
3rd, the focus that employee builds privately
As long as carry-on WiFi finds the computer terminal business of network, you can as one and this network The focus of UNICOM;Also many tool terminals provide the instrument for sharing WiFi.Many employees have Meaning can set up unintentionally focus in the terminal of oneself, and its security hardly results in guarantee, hold Easily by hacker attacks, Entry Firm network internal, and then steal inside data of enterprise.
4th, malice focus
In addition to above-mentioned focus, some attackers are also possible to deliberately set up malice heat around enterprise Point, using the title same or like with enterprise hot spots, between making the terminal of employee intentionally or accidentally It is connected to the focus.It is and attacker can obtain enterprises information by the focus or even logical Cross and invade the terminal, Entry Firm internal network.
Therefore, the network security technology such as security and access controllability, for wireless network Needs are paid much attention to.
Although enterprise may periodically carry out the safety inspection of wireless network, malice focus feelings are detected Condition, whether there is illegal focus etc., but be hardly formed normality.Whole malice cannot for a long time be paid close attention to Focus situation, for there is contingency than larger illegal focus, it is impossible to accomplish in real time find and Blocking.Also lack it is a kind of can continue, the method for the detection malice focus situation of stable operation and System.
When focus is subject to DDoS flood attacks, many enterprises are all that attacked cannot to network In the case of being continuing with, respective handling can be just found and carried out.Attacked for fishing focus, The means almost not found, so as to cause some terminals to be connected to fishing focus between being not intended to, Cause information leakage.Also lack effective safeguard procedures, find in time and blocking is attacked.
After there occurs security incident, such as:Whether some terminals set up WiFi privately, some Whether terminal connected illegal focus, and whether focus received attack etc..For examining afterwards Meter and tracking, lack necessary data and support and processing means.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide a kind of malice hot spot detecting method and System, with the shortcoming for overcoming above mentioned problem or solving or slow down above mentioned problem at least in part.
According to an aspect of the invention, there is provided a kind of malice hot spot detecting method, including with Lower step:
The hardware sensor of enterprises is deployed in, it is persistently all in capture current radio environment Data traffic, control server is real-time transmitted to by the data traffic;
Control server parses the characteristic information of needs from the data traffic;
The characteristic information is carried out matching detection by control server in feature database;
The connection of focus and client of the control server to belonging to this enterprises is entered to advance One step inspection, generates black and white lists;
Control server is positioned to the focus/client in blacklist, and by location information Management terminal is sent to be shown.
Alternatively, the hardware sensor includes wireless network card, real-time or timing acquiring wireless network The wireless data packet that focus, client are received or sent in network.
Alternatively, the characteristic information includes:Focus SSID, focus cipher mode, focus are frequently Road, focus MAC Address, client mac address.
Alternatively, the characteristic information is carried out matching inspection by the control server in feature database Survey includes:
The SSID name and client mac address of the hotspot in statistics wireless data packet, Mark off the focus and client for belonging to this enterprises, and the heat for being not belonging to this enterprises Point and client.
Alternatively, the control server is to belonging to the focus of this enterprises and the company of client Connect situation further to be checked, generation black and white lists include:
If what the focus of enterprises was connected is not the client of enterprises, institute is judged There is exception in the focus for stating enterprises, and the client is divided in blacklist;
If what the client of enterprises was connected is not the focus of enterprises, institute is judged There is exception in the client for stating enterprises, and the client is divided in blacklist;
If occur in the focus of enterprises SSID name identical multiple hotspot and And one or more hotspot in multiple hotspot receive broken string bag frequency exceeded it is pre- If threshold value, it is determined that occur abnormal, the focus be divided into blacklist;
If the quantity of the focus that the client of enterprises is connected in certain time period exceedes pre- If threshold value, the client is divided in blacklist.
Alternatively, the control server carries out positioning bag to the focus/client in blacklist Include:
The planar structure comprising sensor geographical location information has been imported in control server in advance Figure, is carried out using sensor three-point fix technology to the focus/client in sensor coverage It is accurately positioned.
Alternatively, management terminal receives the focus/client in the blacklist that control server sends Location information;The received location information of display simultaneously sends alarm prompt to keeper;According to User confirms, the focus/client in blacklist is added in white list.
According to another aspect of the present invention, there is provided a kind of malice Hot spots detection system, including Hardware sensor, control server, management terminal, wherein,
The hardware sensor is deployed in enterprises, persistently captures the institute in current radio environment There is data traffic, the data traffic is real-time transmitted to control server;
The control server parses the characteristic information of needs from the data traffic;By institute State characteristic information carries out matching detection in feature database;Focus and visitor to belonging to this enterprises The connection at family end further checked, generates black and white lists;To the focus in blacklist/ Client is positioned, and location information is sent into management terminal is shown;
The management terminal receives the location information from control server.
Alternatively, the hardware sensor includes wireless network card, real-time or timing acquiring wireless network The wireless data packet that focus, client are received or sent in network.
Alternatively, the characteristic information includes:Focus SSID, focus cipher mode, focus are frequently Road, focus MAC Address, client mac address.
Alternatively, the characteristic information is carried out matching inspection by the control server in feature database Survey includes:
The SSID name and client mac address of the hotspot in statistics wireless data packet, Mark off the focus and client for belonging to this enterprises, and the heat for being not belonging to this enterprises Point and client.
Alternatively, the control server is to belonging to the focus of this enterprises and the company of client Connect situation further to be checked, generation black and white lists include:
If what the focus of enterprises was connected is not the client of enterprises, institute is judged There is exception in the focus for stating enterprises, and the client is divided in blacklist;
If what the client of enterprises was connected is not the focus of enterprises, institute is judged There is exception in the client for stating enterprises, and the client is divided in blacklist;
If occur in the focus of enterprises SSID name identical multiple hotspot and And one or more hotspot in multiple hotspot receive broken string bag frequency exceeded it is pre- If threshold value, it is determined that occur abnormal, the focus be divided into blacklist;
If the quantity of the focus that the client of enterprises is connected in certain time period exceedes pre- If threshold value, the client is divided in blacklist.
Alternatively, the control server carries out positioning bag to the focus/client in blacklist Include:
The planar structure comprising sensor geographical location information has been imported in control server in advance Figure, is carried out using sensor three-point fix technology to the focus/client in sensor coverage It is accurately positioned.
Alternatively, the management terminal includes:
Receiving unit, for the focus/client in the blacklist for receiving control server transmission Location information;
Display alarm unit, for showing received location information and sending alarm to keeper Prompting;
Black and white lists administrative unit, for being confirmed according to user, by the focus/visitor in blacklist Family end is added in white list.
Malice Hot spots detection localization method of the invention and system, by the wireless data to gathering Wrap and detected, the malice focus/client in wireless network can be detected, and positioned. The security of wireless network is improve, enterprise can not be influenceed with the various wireless network environment of compatible enterprise The existing wireless web frame of industry, seamless can dispose, and carry out intelligence, convenient management.
Described above is only the general introduction of technical solution of the present invention, in order to better understand this hair Bright technological means, and being practiced according to the content of specification, and in order to allow the present invention Above and other objects, features and advantages can become apparent, below especially exemplified by of the invention Specific embodiment.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantage and benefit Will be clear understanding for those of ordinary skill in the art.Accompanying drawing is only used for showing to be preferable to carry out The purpose of mode, and it is not considered as limitation of the present invention.And in whole accompanying drawing, use Identical reference symbol represents identical part.In the accompanying drawings:
Fig. 1 shows the stream of malice Hot spots detection localization method according to an embodiment of the invention Cheng Tu;
Fig. 2 shows the structure of malice Hot spots detection system according to an embodiment of the invention Figure;
Fig. 3 shows the middle control clothes of malice Hot spots detection system according to an embodiment of the invention Business device structure chart;
Fig. 4 shows the management end of malice Hot spots detection system according to an embodiment of the invention End structure figure.
Specific embodiment
The invention will be further described with specific embodiment below in conjunction with the accompanying drawings.
As shown in Figure 1, a kind of malice hot spot detecting method of one embodiment of the invention, tool Body is comprised the following steps:
Step 101, is deployed in the hardware sensor of enterprises, persistently captures current wireless ring All data traffics in border, control server is real-time transmitted to by the data traffic.
The hardware sensor includes wireless network card, can be in real time or in timing acquiring wireless network The wireless data packet that focus, client are received or sent.The form of wireless data packet can be 802.11 etc..The wireless data packet that sensor will be collected is encapsulated, by wired or wireless Connected mode is transmitted to control server.
Focus includes:Wireless router, wireless aps etc..Client includes:Mobile terminal, PC, notebook computer etc..
Step 102, control server parses the characteristic information of needs from the data traffic.
The characteristic information includes:Focus SSID, focus cipher mode, focus channel, focus MAC Address, client mac address etc..
The characteristic information is carried out matching detection by step 103, control server in feature database.
The SSID name and client mac address of the hotspot in statistics wireless data packet, Mark off the focus and client for belonging to this enterprises, and the heat for being not belonging to this enterprises Point and client.
Step 104, by packet, to belonging to the focus of this enterprises and the company of client Connect situation further to be checked, generate black and white lists.
If what the focus of enterprises was connected is not the client of enterprises, institute is judged There is exception in the focus for stating enterprises, and the client is divided in blacklist;Or root According to the confirmation of administrative staff or user, it is also possible to which the client is added in white list;
If what the client of enterprises was connected is not the focus of enterprises, institute is judged There is exception in the client for stating enterprises, and the client is divided in blacklist;Or According to the confirmation of administrative staff or user, it is also possible to which the client is added in white list;
If occur in the focus of enterprises SSID name identical multiple hotspot and And one or more hotspot in multiple hotspot receive broken string bag frequency exceeded it is pre- If threshold value, it is determined that occur abnormal, the focus be divided into blacklist;
If the SSID name length of certain hotspot exceedes default threshold value, due to SSID is used to distinguish different wireless networks, is probably to attack if SSID length overlength Person is carrying out flooding, and the client launched a offensive is added in blacklist;
If the quantity of the focus that the client of enterprises is connected in certain time period exceedes pre- If threshold value, the client is divided in blacklist;Or according to administrative staff or user Confirmation, it is also possible to the client is added in dynamic white list;Client is frequently connected During the focus of a predetermined level is exceeded, the client is probably scanner, and trial is cracked in enterprise The focus in portion.
Step 105, control server is positioned to the focus/client in blacklist, and will Location information is sent to management terminal and is shown.
The planar structure comprising sensor geographical location information has been imported in control server in advance Figure, is carried out using sensor three-point fix technology to the focus/client in sensor coverage It is accurately positioned, helps the tracking focus or client of administrative staff's express delivery, positions wireless attack thing The source that part occurs.
Control server obtain at least one sensor report for being carried out to focus/client The information of positioning, according to obtain at least one sensor report for entering to focus/client The information of row positioning, positions to focus/client, wherein,
If sensor is three or more than three, according to each sensor to focus/client The intensity of signal is received, the distance between the sensor and focus/client is determined;
Geographical location information and each sensor and focus/client according to each sensor The distance between, using three-point fix algorithm, determine that geographical position coordinates estimate evaluation;Calculate Above-mentioned geographical position coordinates estimate the geometric center position coordinates of evaluation, used as focus/client The final estimate of geographical position coordinates.
The management terminal receives the focus/client in the blacklist that control server sends Location information;The received location information of display simultaneously sends alarm prompt to keeper;According to Family confirms, the focus/client in blacklist is added in white list.
The management terminal can be mobile terminal, PC, the notebook being connected with control server Computer etc..Further, the management terminal can be operated in and is connected with control server Web end pipe platform on mobile terminal, PC, notebook computer etc..
As shown in Figure 2, a kind of malice Hot spots detection system bag of one embodiment of the invention Include:Hardware sensor, control server and management terminal.
The hardware sensor is distributed in each position in enterprise's working environment, for persistently capturing All data traffics in current radio environment, middle control clothes are real-time transmitted to by the data traffic Business device.
The hardware sensor includes wireless network card, can be in real time or in timing acquiring wireless network The wireless data packet that focus, client are received or sent.The form of wireless data packet can be 802.11 etc..The wireless data packet that sensor will be collected is encapsulated, by wired or wireless Connected mode is transmitted to control server.
Wherein, the focus includes:Wireless router, wireless aps etc.;The client bag Include:Mobile terminal, the PC with wireless network card, notebook computer etc..
As shown in Figure 3, the control server includes:
Receiving unit, for receiving data traffic from the hardware sensor;
Resolution unit, the characteristic information for parsing needs from the data traffic;
Matching detection unit, for the characteristic information to be carried out into matching detection in feature database;
Black and white lists generation unit, for belonging to the focus of this enterprises and the company of client The situation of connecing carries out further checking generation black and white lists;
Positioning unit, for being positioned to the focus/client in blacklist;
Transmitting element, is shown for location information to be sent into management terminal.
Specifically, the resolution unit parses the characteristic information of needs from the data traffic Including:
Focus SSID, focus cipher mode, focus channel, focus MAC Address, client MAC Address etc.;Can also include:Client access time, client be assigned to IP, Annexation of AP and client etc..
The characteristic information is carried out matching detection bag by the matching detection unit in feature database Include:
The SSID name and client mac address of the hotspot in statistics wireless data packet, Mark off the focus and client for belonging to this enterprises, and the heat for being not belonging to this enterprises Point and client.
The black and white lists generation unit is to belonging to the connection of the focus and client of this enterprises Situation carries out further checking that generation black and white lists include:
If what the focus of enterprises was connected is not the client of enterprises, institute is judged There is exception in the focus for stating enterprises, and the client is divided in blacklist;Or root According to the confirmation of administrative staff or user, it is also possible to which the client is added in white list;
If what the client of enterprises was connected is not the focus of enterprises, institute is judged There is exception in the client for stating enterprises, and the client is divided in blacklist;Or According to the confirmation of administrative staff or user, it is also possible to which the client is added in white list;
If occur in the focus of enterprises SSID name identical multiple hotspot and And one or more hotspot in multiple hotspot receive broken string bag frequency exceeded it is pre- If threshold value, it is determined that occur abnormal, the focus be divided into blacklist;
If the SSID name length of certain hotspot exceedes default threshold value, due to SSID is used to distinguish different wireless networks, is probably to attack if SSID length overlength Person is carrying out flooding, and the client launched a offensive is added in blacklist;
If the quantity of the focus that the client of enterprises is connected in certain time period exceedes pre- If threshold value, the client is divided in blacklist;Or according to administrative staff or user Confirmation, it is also possible to the client is added in dynamic white list;Client is frequently connected During the focus of a predetermined level is exceeded, the client is probably scanner, and trial is cracked in enterprise The focus in portion.
The positioning unit, for being positioned to the focus/client in blacklist;
The plane structure chart comprising sensor geographical location information has been imported in advance in positioning unit, Essence is carried out to the focus/client in sensor coverage using sensor three-point fix technology It is determined that position, helps the tracking focus or client of administrative staff's express delivery, wireless attack event is positioned The source of generation.
Positioning unit obtain at least one sensor report for being determined focus/client Position information, according to obtain at least one sensor report for being carried out to focus/client The information of positioning, positions to focus/client, wherein,
If sensor is three or more than three, according to each sensor to focus/client The intensity of signal is received, the distance between the sensor and focus/client is determined;
Geographical location information and each sensor and focus/client according to each sensor The distance between, using three-point fix algorithm, determine that geographical position coordinates estimate evaluation;Calculate Above-mentioned geographical position coordinates estimate the geometric center position coordinates of evaluation, used as focus/client The final estimate of geographical position coordinates.
Transmitting element, is shown for location information to be sent into management terminal.
As shown in Figure 4, the management terminal includes:
Receiving unit, for the focus/client in the blacklist for receiving control server transmission Location information;
Display alarm unit, for showing received location information and sending alarm to keeper Prompting;
Black and white lists administrative unit, for being confirmed according to user, by the focus/client in blacklist End is added in white list.
The management terminal can be mobile terminal, PC, the notebook being connected with control server Computer etc..Further, the management terminal can be operated in and is connected with control server Web end pipe platform on mobile terminal, PC, notebook computer etc..
Malice Hot spots detection localization method and system that above-described embodiment is provided, by collection Wireless data packet detected, can detect the malice focus/client in wireless network, and Positioned.Improve the security of wireless network, can with the various wireless network environment of compatible enterprise, The existing wireless web frame of enterprise is not influenceed, seamless can be disposed, carry out intelligence, convenient management.
All parts embodiment of the invention can realize with hardware, or with one or many The software unit run on individual processor is realized, or is realized with combinations thereof.This area It will be appreciated by the skilled person that microprocessor or digital signal processor can be used in practice (DSP) some in malice Hot spots detection alignment system according to embodiments of the present invention are realized Or some or all functions of whole parts.The present invention is also implemented as performing this In described method some or all equipment or program of device (for example, calculating Machine program and computer program product).It is such to realize that program of the invention is stored in meter On calculation machine computer-readable recording medium, or there can be the form of one or more signal.Such letter Number can be downloaded from internet website and obtained, or provided on carrier signal, or to appoint What other forms is provided.
" one embodiment ", " embodiment " or " one or more implementation referred to herein Example " is it is meant that the special characteristic, structure or the characteristic that describe are included in the present invention in conjunction with the embodiments At least one embodiment in.Further, it is noted that word " in one embodiment " here Example is not necessarily all referring to same embodiment.
In specification mentioned herein, numerous specific details are set forth.However, can manage Solution, embodiments of the invention can be put into practice in the case of without these details.One In a little examples, known method, structure and technology is not been shown in detail, so as not to fuzzy to this The understanding of specification.
It should be noted that above-described embodiment the present invention will be described is carried out rather than to the present invention Limit, and those skilled in the art without departing from the scope of the appended claims may be used Design alternative embodiment.In the claims, any reference that will should not be located between bracket Symbol construction is into limitations on claims.Word "comprising" do not exclude the presence of be not listed in right will Element or step in asking.Word "a" or "an" before element does not exclude the presence of many Individual such element.The present invention by means of the hardware for including some different elements and can be borrowed Help properly programmed computer to realize.If in the unit claim for listing equipment for drying, Several in these devices can be embodied by same hardware branch.Word first, Second and third use do not indicate that any order.These words can be construed to title.
Furthermore, it should also be noted that the language used in this specification primarily to it is readable and The purpose of teaching and select, selected rather than in order to explain or limit subject of the present invention 's.Therefore, in the case of without departing from the scope of the appended claims and spirit, for this Many modifications and changes will be apparent from for the those of ordinary skill of technical field.For The scope of the present invention, is illustrative and not restrictive, sheet to the disclosure that the present invention is done The scope of invention is defined by the appended claims.

Claims (10)

1. a kind of malice hot spot detecting method, it is characterised in that comprise the following steps:
The hardware sensor of enterprises is deployed in, it is persistently all in capture current radio environment Data traffic, control server is real-time transmitted to by the data traffic;
Control server parses the characteristic information of needs from the data traffic;
The characteristic information is carried out matching detection by control server in feature database;
The connection of focus and client of the control server to belonging to this enterprises is entered to advance One step inspection, generates black and white lists;
Control server is positioned to the focus/client in blacklist, and by location information Management terminal is sent to be shown.
2. malice hot spot detecting method as claimed in claim 1, it is characterised in that
The hardware sensor include wireless network card, in real time or timing acquiring wireless network in focus, The wireless data packet that client is received or sent;
The characteristic information includes:Focus SSID, focus cipher mode, focus channel, focus MAC Address, client mac address.
3. malice hot spot detecting method as claimed in claim 1, it is characterised in that in described The characteristic information is carried out matching detection by control server in feature database to be included:
The SSID name and client mac address of the hotspot in statistics wireless data packet, Mark off the focus and client for belonging to this enterprises, and the heat for being not belonging to this enterprises Point and client;
The connection of focus and client of the control server to belonging to this enterprises is entered Row further checks that generation black and white lists include:
If what the focus of enterprises was connected is not the client of enterprises, institute is judged There is exception in the focus for stating enterprises, and the client is divided in blacklist;
If what the client of enterprises was connected is not the focus of enterprises, institute is judged There is exception in the client for stating enterprises, and the client is divided in blacklist;
If occur in the focus of enterprises SSID name identical multiple hotspot and And one or more hotspot in multiple hotspot receive broken string bag frequency exceeded it is pre- If threshold value, it is determined that occur abnormal, the focus be divided into blacklist;
If the quantity of the focus that the client of enterprises is connected in certain time period exceedes pre- If threshold value, the client is divided in blacklist.
4. malice hot spot detecting method as claimed in claim 1, it is characterised in that described Control server carries out positioning to the focus/client in blacklist to be included:
The planar structure comprising sensor geographical location information has been imported in control server in advance Figure, is carried out using sensor three-point fix technology to the focus/client in sensor coverage It is accurately positioned;
The method also includes:
Management terminal receives the positioning of the focus/client in the blacklist that control server sends Information;The received location information of display simultaneously sends alarm prompt to keeper;It is true according to user Recognize, the focus/client in blacklist is added in white list.
5. a kind of malice Hot spots detection system, it is characterised in that including hardware sensor, middle control Server, management terminal, wherein,
The hardware sensor is deployed in enterprises, persistently captures the institute in current radio environment There is data traffic, the data traffic is real-time transmitted to control server;
The control server parses the characteristic information of needs from the data traffic;By institute State characteristic information carries out matching detection in feature database;Focus and visitor to belonging to this enterprises The connection at family end further checked, generates black and white lists;To the focus in blacklist/ Client is positioned, and location information is sent into management terminal is shown;
The management terminal receives the location information from control server.
6. malice Hot spots detection system as claimed in claim 5, it is characterised in that
The hardware sensor include wireless network card, in real time or timing acquiring wireless network in focus, The wireless data packet that client is received or sent.
7. malice Hot spots detection system as claimed in claim 5, it is characterised in that the spy Reference breath includes:Focus SSID, focus cipher mode, focus channel, focus MAC Address, Client mac address;
The characteristic information is carried out matching detection by the control server in feature database to be included:
The SSID name and client mac address of the hotspot in statistics wireless data packet, Mark off the focus and client for belonging to this enterprises, and the heat for being not belonging to this enterprises Point and client.
8. malice Hot spots detection system as claimed in claim 5, it is characterised in that in described The connection of focus and client of the control server to belonging to this enterprises is further examined Look into, generation black and white lists include:
If what the focus of enterprises was connected is not the client of enterprises, institute is judged There is exception in the focus for stating enterprises, and the client is divided in blacklist;
If what the client of enterprises was connected is not the focus of enterprises, institute is judged There is exception in the client for stating enterprises, and the client is divided in blacklist;
If occur in the focus of enterprises SSID name identical multiple hotspot and And one or more hotspot in multiple hotspot receive broken string bag frequency exceeded it is pre- If threshold value, it is determined that occur abnormal, the focus be divided into blacklist;
If the quantity of the focus that the client of enterprises is connected in certain time period exceedes pre- If threshold value, the client is divided in blacklist.
9. malice Hot spots detection system as claimed in claim 5, it is characterised in that in described Control server carries out positioning to the focus/client in blacklist to be included:
The planar structure comprising sensor geographical location information has been imported in control server in advance Figure, is carried out using sensor three-point fix technology to the focus/client in sensor coverage It is accurately positioned.
10. malice Hot spots detection system as claimed in claim 5, it is characterised in that described Management terminal includes:
Receiving unit, for the focus/client in the blacklist for receiving control server transmission Location information;
Display alarm unit, for showing received location information and sending alarm to keeper Prompting;
Black and white lists administrative unit, for being confirmed according to user, by the focus/client in blacklist End is added in white list.
CN201510959228.8A 2015-12-18 2015-12-18 Malice hot spot detecting method and system Pending CN106878241A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510959228.8A CN106878241A (en) 2015-12-18 2015-12-18 Malice hot spot detecting method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510959228.8A CN106878241A (en) 2015-12-18 2015-12-18 Malice hot spot detecting method and system

Publications (1)

Publication Number Publication Date
CN106878241A true CN106878241A (en) 2017-06-20

Family

ID=59238948

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510959228.8A Pending CN106878241A (en) 2015-12-18 2015-12-18 Malice hot spot detecting method and system

Country Status (1)

Country Link
CN (1) CN106878241A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107484173A (en) * 2017-09-30 2017-12-15 北京奇虎科技有限公司 Wireless network intrusion detection method and device
CN107908660A (en) * 2017-10-17 2018-04-13 东华大学 The data division of data-oriented opening and shares and method for organizing
CN109195166A (en) * 2018-09-14 2019-01-11 厦门美图移动科技有限公司 Internet access method and device
CN109462851A (en) * 2018-12-28 2019-03-12 北京奇安信科技有限公司 Fishing hot spot detecting method, device, electronic equipment and storage medium
CN110022560A (en) * 2019-01-16 2019-07-16 阿里巴巴集团控股有限公司 Network environment monitoring method, system, device and electronic equipment
CN112217834A (en) * 2020-10-21 2021-01-12 北京理工大学 Internet encryption flow interactive feature extraction method based on graph structure

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130185794A1 (en) * 2012-01-17 2013-07-18 Samsung Electronics Co. Ltd. Base station for detecting denial-of-service attacks in communication system and method for controlling the same
CN104270761A (en) * 2014-09-30 2015-01-07 北京金山安全软件有限公司 pseudo-WIFI (Wireless Fidelity) identification and processing method and device
CN104852894A (en) * 2014-12-10 2015-08-19 北京奇虎科技有限公司 Wireless message monitor detecting method, system and central control server
CN105281981A (en) * 2015-11-04 2016-01-27 北京百度网讯科技有限公司 Data traffic monitoring method and device for network service

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130185794A1 (en) * 2012-01-17 2013-07-18 Samsung Electronics Co. Ltd. Base station for detecting denial-of-service attacks in communication system and method for controlling the same
CN104270761A (en) * 2014-09-30 2015-01-07 北京金山安全软件有限公司 pseudo-WIFI (Wireless Fidelity) identification and processing method and device
CN104852894A (en) * 2014-12-10 2015-08-19 北京奇虎科技有限公司 Wireless message monitor detecting method, system and central control server
CN105281981A (en) * 2015-11-04 2016-01-27 北京百度网讯科技有限公司 Data traffic monitoring method and device for network service

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107484173A (en) * 2017-09-30 2017-12-15 北京奇虎科技有限公司 Wireless network intrusion detection method and device
CN107908660A (en) * 2017-10-17 2018-04-13 东华大学 The data division of data-oriented opening and shares and method for organizing
CN107908660B (en) * 2017-10-17 2021-07-09 东华大学 Data division and organization method for data open sharing
CN109195166A (en) * 2018-09-14 2019-01-11 厦门美图移动科技有限公司 Internet access method and device
CN109462851A (en) * 2018-12-28 2019-03-12 北京奇安信科技有限公司 Fishing hot spot detecting method, device, electronic equipment and storage medium
CN110022560A (en) * 2019-01-16 2019-07-16 阿里巴巴集团控股有限公司 Network environment monitoring method, system, device and electronic equipment
CN112217834A (en) * 2020-10-21 2021-01-12 北京理工大学 Internet encryption flow interactive feature extraction method based on graph structure
CN112217834B (en) * 2020-10-21 2021-06-18 北京理工大学 Internet encryption flow interactive feature extraction method based on graph structure

Similar Documents

Publication Publication Date Title
CN106878241A (en) Malice hot spot detecting method and system
US7970894B1 (en) Method and system for monitoring of wireless devices in local area computer networks
Lim et al. Wireless intrusion detection and response
Nikbakhsh et al. A novel approach for rogue access point detection on the client-side
CN104852894B (en) A kind of air message listening detection method, system and control server
CN104540134B (en) Wireless access node detection method, wireless network detecting system and server
CN107197456B (en) Detection method and detection device for identifying pseudo AP (access point) based on client
CN106330935B (en) A kind of detection method for the Wi-Fi that goes fishing
Lanze et al. Undesired relatives: protection mechanisms against the evil twin attack in IEEE 802.11
CN106878992A (en) Wireless network secure detection method and system
CN101540667A (en) Method and equipment for interfering with communication in wireless local area network
CN105681272A (en) Method for detecting and defensing fishing WiFi of mobile terminal
Plósz et al. Security vulnerabilities and risks in industrial usage of wireless communication
Lovinger et al. Detection of wireless fake access points
Fuster et al. Analysis of security and privacy issues in wearables for minors
KR100874015B1 (en) WLAN intrusion prevention system and method
WO2010027121A1 (en) System and method for preventing wireless lan intrusion
CN111405548B (en) Fishing wifi detection method and device
US9100429B2 (en) Apparatus for analyzing vulnerability of wireless local area network
KR20120132086A (en) System for detecting unauthorized AP and method for detecting thereof
Ziayi et al. YAICD: Yet another IMSI catcher detector in GSM
Metwally et al. Detecting semantic social engineering attack in the context of information security
Li Anti-forensic digital investigation for unauthorized intrusion on a wireless network
Patel et al. Safeguarding the IoT: Taxonomy, security solutions, and future research opportunities
Fayssal et al. A proactive wireless self-protection system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170620

RJ01 Rejection of invention patent application after publication