Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack test system and method for wireless router

A technology for wireless routers and attack testing, applied in transmission systems, digital transmission systems, electrical components, etc., can solve problems such as inability to accurately simulate attack scenarios and difficulty in setting up test environments, and achieve flexible attack testing, high testing efficiency, and comprehensive testing Effect

Inactive Publication Date: 2017-11-17
台州市吉吉知识产权运营有限公司
View PDF7 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to solve the above-mentioned difficulties in setting up the test environment and the inability to accurately simulate attack scenarios, a new test system and method are needed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack test system and method for wireless router
  • Attack test system and method for wireless router
  • Attack test system and method for wireless router

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0085] refer to Figure 4 , a kind of attack test method for wireless router comprises:

[0086] Step S100 scans wireless signals in the environment, and selects a target router according to the scanning result;

[0087] Step S200 When other terminals are associated with the target router, the test system also monitors the message interaction between the two;

[0088] Step S300 sets test requirements;

[0089] Step S400 sends a corresponding attack message to the target router according to the test requirements;

[0090] Step S500 monitors message interaction with the target router;

[0091] The test requirement includes at least one of test type, packet quantity, and packet frequency.

[0092] Compared with the aforementioned basic flow, this embodiment specifically adds step S100, which can set the test object more conveniently. By scanning the wireless signals in the environment, the test system can obtain all wireless routers in the test environment, which is similar ...

Embodiment 2

[0097] refer to Figure 5 , a kind of attack test method for wireless router comprises:

[0098] Step S110 scans the wireless signals in the environment, displays the scan results, and selects the target router;

[0099] Step S210 When other terminals are associated with the target router, the test system also monitors the message interaction between the two, and displays;

[0100] Step S300 sets test requirements;

[0101] Step S400 sends a corresponding attack message to the target router according to the test requirements;

[0102] Step S510 monitors and displays message interaction with the target router;

[0103] The test requirement includes at least one of target router information, test type, packet quantity, and packet frequency; and / or, the test requirement further includes multiple target router information and / or multiple test types and / or multiple message quantities and / or multiple message frequencies.

[0104] Compared with Embodiment 1, this embodiment adds ...

Embodiment 3

[0106] refer to Figure 5 , a kind of attack test method for wireless router comprises:

[0107] Step S110 scans the wireless signals in the environment, displays the scan results, and selects the target router;

[0108] Step S210 When other terminals are associated with the target router, the test system also monitors the message interaction between the two, and displays;

[0109] Step S300 sets test requirements;

[0110] Step S400 sends a corresponding attack message to the target router according to the test requirements;

[0111] Step S510 monitors and displays message interaction with the target router;

[0112] The test requirements include at least one of test type, message quantity, and message frequency;

[0113] There are multiple target routers, there are multiple test requirements, and the multiple target routers match the multiple test requirements one by one; and / or, the tests of the multiple target routers are independent of each other.

[0114] The flow c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attack test system and method for a wireless router, wherein the system comprises a setting module, configured to set a test requirement; a message sending module configured to send a corresponding message to a target router according to the test requirement; and a monitoring module configured to monitor message interaction with the target router. The system and method can simulate a plurality of wireless terminals to send attack messages so as to make the attack environment of the wireless router easy to create; can control the type, the quantity and the frequency of the attack messages, simulate various combined scenarios to make the test flexible, and can test multiple target routers simultaneously to make testing more efficient.

Description

technical field [0001] The invention relates to the field of testing, in particular to an attack testing system and method for wireless routers. Background technique [0002] At present, with the popularity of household broadband, the utilization rate of WiFi wireless routers is getting higher and higher, and there are more and more attacks against WiFi wireless routers. Taking the common wireless connection denial of service (DOS) attack as an example, the attacker Send a large number of forged authentication requests, or de-authentication requests, or association requests, or de-association requests to the wireless router, exhausting the system resources of the wireless router in a short time, making legitimate users unable to be processed, or even dropped, This hinders the normal communication in the network and brings great harm to the network. In view of this, it is necessary to fully test the anti-attack capability of the wireless router before leaving the factory. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26
CPCH04L43/08H04L43/50
Inventor 张尧
Owner 台州市吉吉知识产权运营有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products