Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for detecting rogue wireless access point in local area network

A wireless access point, local area network technology, applied in wireless communication, electrical components, security devices, etc., can solve the problems of confidential and private information theft, hacking, and destruction of enterprises and users

Inactive Publication Date: 2012-12-26
AEROSPACE INFORMATION
View PDF5 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Illegal wireless access point (Rogue AP) is the biggest security threat in WLAN. Hackers, malicious employees, or unintentional employees who do not consider the consequences just to improve work efficiency place unauthorized APs in WLAN ( Access Point, access point) or client computer provides unlimited access to the network, thus providing opportunities for intrusion and infiltration to outside lawbreakers, such consequences may be that a large number of confidential and private information of enterprises and users are stolen or even been destroyed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for detecting rogue wireless access point in local area network
  • Method and system for detecting rogue wireless access point in local area network
  • Method and system for detecting rogue wireless access point in local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0036] figure 1 It is a system block diagram of detecting illegal wireless access points in a local area network according to an embodiment of the present invention. Such as figure 1 As shown, the system includes:

[0037] The database 10 is used to store the corresponding information of legal wireless access points in the local area network in the legal list;

[0038] The wireless monitoring module 20 is used to periodically scan various channels in the lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system and a method for detecting a rogue wireless access point in a local area network. The system comprises a database, a wireless monitoring module and a central processing unit, wherein the database is used for storing the corresponding information of a legal wireless access point in the local area network in a legal list; the wireless monitoring module is used for periodically scanning each channel in the local area network to acquire identification information from the channel, and used for testing a suspected wireless access point determined by the central processing unit, trying connecting the suspected wireless access point in a management mode, and further trying connecting a plurality of legal nodes in the local area network by the suspected wireless access point if the connection is successful; and the central processing unit is used for comparing the identification information of an existed access point acquired by the scanning with the corresponding information in the legal list, and listing the wireless access point not occurring in the legal list as the suspected wireless access point and judging that the suspected wireless access point is the rogue wireless access point if successfully receiving the feedback information that the suspected wireless access point is successfully connected with the legal nodes from the wireless monitoring module.

Description

technical field [0001] The invention relates to the field of wireless local area networks, in particular to a method and system for detecting illegal wireless access points in a local area network. Background technique [0002] As a globally recognized authority on LANs, the standards established by the IEEE (Institute of Electrical and Electronics Engineers, Institute of Electrical and Electronics Engineers) Working Group 802 have dominated the LAN field in the past two decades. These protocols include 802.3Ethernet (Ethernet) protocol, 802.5Token Ring (token ring network) protocol, and 802.3z 100BASE-T Fast Ethernet protocol. In 1997, after seven years of work, IEEE released the 802.11 protocol, which is also the first internationally recognized protocol in the field of wireless local area networks. In September 1999, they proposed the 802.11b "High Rate" protocol to supplement the 802.11 protocol. 802.11b added two new network throughput rates of 5.5Mbps and 11Mbps under...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/08H04W24/00H04W12/122
Inventor 徐树民梁剑王永宝苏斌
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products