Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for wireless network security detection and repair

A wireless network and security detection technology, applied in the field of security detection and repair systems, can solve problems such as home routers are easy to intrude, wireless network security is low, router firmware security loopholes, etc., and achieve the effect of curbing phishing

Active Publication Date: 2017-04-05
三六零数字安全科技集团有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The first is that due to the security loopholes in the router firmware, hackers can control the router through the loopholes, monitor the online behavior of all devices such as users' computers, mobile phones, and pads, wait for opportunities to steal online banking and online shopping account passwords, and even hijack users to visit phishing websites.
[0005] The second is that most users have low awareness of wireless network security, such as using the default router user name and password, using low-level encryption technology, using the default router management IP address, etc., resulting in most home routers being easily hacked. Intrusion, thereby tampering with arbitrary settings on the router, including DNS (Domain NameSystem, Domain Name System) settings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for wireless network security detection and repair
  • Method and system for wireless network security detection and repair
  • Method and system for wireless network security detection and repair

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] refer to figure 1 , shows a flow chart of steps of a method for security detection and repair of a wireless network according to an embodiment of the present invention, the method for security detection and repair of a wireless network may specifically include the following steps:

[0043] Step S101, the client detects the network configuration of the wireless network, and sends a security detection request to the cloud detection server. The security detection request carries the detection result of the network configuration, wherein the network configuration includes: DNS (domain name) of the WAN (wide area network) interface system), DNS for DHCP (Dynamic Host Configuration Protocol).

[0044] The WAN (Wide Area Network, wide area network) interface is the port where the network device connects to the external network. Hackers often change the DNS of the WAN interface of the network connection device to malicious DNS. Malicious DNS resolves normal URLs to phishing web...

Embodiment 2

[0053] refer to figure 2 , shows a flow chart of steps of a method for security detection and repair of a wireless network according to an embodiment of the present invention, the method for security detection and repair of a wireless network may specifically include the following steps:

[0054] Step S201, the client downloads the security level judgment rules from the cloud detection server, and saves them locally on the client.

[0055] Step S202, the client detects the network configuration of the wireless network, and sends a security detection request to the cloud detection server. The security detection request carries the detection result of the network configuration. If the communication between the client and the cloud detection server is normal, step S203 is executed. ; If the communication between the client and the cloud detection server is abnormal, execute step S204.

[0056] Wherein, the network configuration includes: the DNS of the WAN interface, the DNS of...

Embodiment 3

[0111] The following assumptions are only for describing the present invention more clearly, and do not constitute undue limitation to the protection scope of the present invention.

[0112] Assumption: the client is a Windows client, the wireless network connection device used is a TP-LINK router, the model is R860, the TP-LINK router uses the DHCP service, and the TP-LINK router uses the default management username and password , that is, the management user name and management password are both admin, the hacker tampered with the DNS of the router’s WAN interface to a malicious DNS (184.105.175.69, 66.102.253.29), and the TP-LINK router adopted WEP encrypted password authentication.

[0113] When a Windows client connects to the above router, the IP address is automatically obtained: 192.168.1.100, and the DNS server is also automatically set to (184.105.175.69, 66.102.253.29).

[0114] To ensure wireless network security, refer to Figure 4 , shows a flow chart of steps o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method and system for security detection and repair of a wireless network, wherein the method for security detection and repair of a wireless network includes: a client detects a network configuration of a wireless network, sends a security detection request to a cloud detection terminal server, The security detection request carries the detection result of the network configuration; the cloud detection server determines the security level corresponding to the wireless network of the client according to the detection result and the set security level judgment rules, and sends the determined security level to the client. Judgment rules include: if the DNS conforms to the first DNS security rule, then the DNS security level is dangerous; if the DNS conforms to the second DNS security rule, then the DNS security level is safe; if the DNS conforms to the third DNS security rule, then the DNS security level is Warning; the client makes repairs to network configurations identified as dangerous and warning. Through the present invention, the security risk of DNS tampering is curbed.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a method for security detection and repair of a wireless network, and a system for security detection and repair of a wireless network. Background technique [0002] With the continuous popularization of wireless Internet access technology, more and more users use computers, mobile phones, Pads and other devices to access the Internet through wireless network connection devices. Among them, routers can implement functions such as addressing, route selection, segmentation / combination, store-and-forward, and packet filtering. Many families and businesses use routers to realize network interconnection. [0003] However, due to the popularity of computer security software, routers have become new targets for hackers. Once routers are hacked, users' money and privacy will face great risks. Large-scale router hacking incidents have also begun to appear in China, and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/00H04W24/04H04W12/088H04W12/122
Inventor 江爱军刘智锋李勇高祎玮
Owner 三六零数字安全科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products