Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Wireless router protection method and system based on cloud shadow system

A wireless router and cloud server technology, applied in the transmission system, digital transmission system, electrical components, etc., can solve the problems of slow action of equipment manufacturers, low security awareness of wireless router users, and difficult security issues of wireless routers, etc., to achieve convenient promotion Effect

Active Publication Date: 2018-11-13
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF12 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is clear that due to the limitations of wireless router resources, performance, deployment costs, human-computer interaction and other factors, protection solutions such as installing security protection software inside the wireless router or deploying additional security hardware outside the wireless router do not have a good solution. Feasibility, and device manufacturers are slow to release firmware updates
[0004] To sum up, the rapid expansion of the market prompted by the current large demand for wireless router equipment has brought a lot of security problems, but the hardware identity of wireless routers and the generally low security awareness of users have caused wireless routers to of security issues are difficult to solve in a short time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wireless router protection method and system based on cloud shadow system
  • Wireless router protection method and system based on cloud shadow system
  • Wireless router protection method and system based on cloud shadow system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to enable relevant persons in the technical field to better understand the technical solution of the present invention, and to make the purpose, features and points of the present invention more obvious and easy to understand, the core technology of the present invention will be described below in conjunction with the accompanying drawings and examples Further clarification.

[0032] Core content of the present invention mainly comprises:

[0033] 1. Traffic data packet acquisition. Traffic data packet acquisition is the most basic function point in the wireless router protection system. For the data packets flowing through the router, it is obtained through the middleman technology, and analyzed, classified according to the destination address, and the data packets whose destination address is not the router are released. .

[0034] 2. Packet detection. Packet detection is a key part of the wireless router protection system. It uses the regularly updated ma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a wireless router protection method and system based on a cloud shadow system. The method comprises the following steps: 1) detecting a network traffic data packet passing through a wireless router to judge whether the network traffic data packet is a malicious traffic data packet; and 2) forwarding the detected malicious traffic data packet to the cloud shadow system, thereby implementing the protection of the wireless router. The system comprises the wireless router and a cloud server, wherein the wireless router comprises a traffic acquisition module, a traffic detection module and a traffic traction module, and the cloud server comprises the cloud shadow system. According to the wireless router protection method and system provided by the invention, an attackeris introduced into a cloud shadow system that is completely the same as a user wireless router system, the wireless router protection method is a wireless router lightweight protection scheme based on the cloud shadow system, and a security worker can further understand the attack means of the attacker conveniently and make more effective response according to the attack means of the attacker.

Description

technical field [0001] The invention belongs to the field of computer network security, and generally uses network traffic identification and shadow system technologies to propose a protection scheme for wireless routers, and specifically relates to a wireless router protection method and system based on cloud shadow services. Background technique [0002] With the popularity of smart phones and many smart devices, as well as the rapid development of Internet and Internet of Things technology, wireless routers have become an indispensable part of a family. As wireless routers play an increasingly important role in our lives, the introduction of such technologies and devices also brings new security and privacy risks. Of course, router equipment not only plays an important role in family life, but also plays an indispensable role in public places such as companies, shopping malls, and hotels. As far as the current situation is concerned, the competition in the wireless route...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L12/851
CPCH04L47/2441H04L47/2483H04L63/1425H04L63/1441H04L67/10
Inventor 刘奇旭刘井强靳泽胡恩泽刘潮歌
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products