[go: up one dir, main page]

CN115484600A - Wireless access detection method, device, electronic equipment and storage medium - Google Patents

Wireless access detection method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115484600A
CN115484600A CN202210901623.0A CN202210901623A CN115484600A CN 115484600 A CN115484600 A CN 115484600A CN 202210901623 A CN202210901623 A CN 202210901623A CN 115484600 A CN115484600 A CN 115484600A
Authority
CN
China
Prior art keywords
access
matching
foreground
address
wireless access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210901623.0A
Other languages
Chinese (zh)
Other versions
CN115484600B (en
Inventor
朱帅
周济
李伟泽
王小乾
李超明
单元元
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Cloud Technology Co Ltd
Original Assignee
China Telecom Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Cloud Technology Co Ltd filed Critical China Telecom Cloud Technology Co Ltd
Priority to CN202210901623.0A priority Critical patent/CN115484600B/en
Publication of CN115484600A publication Critical patent/CN115484600A/en
Application granted granted Critical
Publication of CN115484600B publication Critical patent/CN115484600B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of network security, in particular to a detection method, a device, electronic equipment and a storage medium for wireless access, wherein the method is applied to a foreground wireless access point which is correspondingly arranged with a target wireless access point, and comprises the following steps: receiving an access request sent by a sending end; analyzing the access request to determine an analysis result, wherein the analysis result comprises the current access step; matching the current access step with an access process template to determine a matching result, wherein the access process template is determined based on an authentication mode of a foreground wireless access point, and the access process template comprises an access step; and when the matching result is that the access is finished, forwarding the received data of the transmitting end to the target wireless access point for processing. The access process template is used for matching the current access step so as to segment the access process, and the connection process template is established, so that the difference between different authentication modes is eliminated, and the detection efficiency is improved.

Description

无线接入的检测方法、装置、电子设备及存储介质Wireless access detection method, device, electronic equipment and storage medium

技术领域technical field

本发明涉及网络安全技术领域,具体涉及无线接入的检测方法、装置、电子设备及存储介质。The invention relates to the technical field of network security, in particular to a wireless access detection method, device, electronic equipment and storage medium.

背景技术Background technique

近年来,无线局域网的应用越来越广泛,它具有接入速率高、组网灵活的特点,在传输移动数据方面有着巨大的优势。但是在这快速发展的过程中,无线局域网的安全问题也显得越来越重要。理论上,无线电波范围内的任何一台电脑都可以监听并接入该无线网络。因此,对企业用户来说,如果其无线局域网络的安全措施不够严密,那么就完全有可能被窃听、劫持甚至获取内部信息。为了避免无线局域网络被恶意接入,其安全就显得尤为重要。In recent years, the application of WLAN has become more and more extensive. It has the characteristics of high access rate and flexible networking, and has great advantages in transmitting mobile data. But in the process of this rapid development, the security problem of wireless local area network also appears more and more important. In theory, any computer within radio range could listen in and connect to the wireless network. Therefore, for enterprise users, if the security measures of their wireless local area network are not strict enough, it is entirely possible to be eavesdropped, hijacked or even obtained internal information. In order to prevent the WLAN from being maliciously accessed, its security is particularly important.

现有的无线接入检测方法一般是,在连接到无线网络中的终端发出的数据帧中增加额外信息,通过额外信息进行接入检测。然而,这种方式需要对原有数据帧进行改动,且还需要增加额外信息,增加了网络的传输负载,这在网络拥堵的情况下难以及时对无线接入进行检测。In the existing wireless access detection method, additional information is generally added to the data frame sent by the terminal connected to the wireless network, and the access detection is performed through the additional information. However, this method needs to modify the original data frame, and also needs to add additional information, which increases the transmission load of the network, which makes it difficult to detect wireless access in time when the network is congested.

发明内容Contents of the invention

有鉴于此,本发明实施例提供了一种无线接入的检测方法、装置、电子设备及存储介质,以解决无线接入检测的效率较低的问题。In view of this, embodiments of the present invention provide a wireless access detection method, device, electronic equipment, and storage medium, so as to solve the problem of low efficiency of wireless access detection.

根据第一方面,本发明实施例提供了一种无线接入的检测方法,应用于前台无线接入点,所述前台无线接入点与目标无线接入点对应设置,所述方法包括:According to the first aspect, an embodiment of the present invention provides a wireless access detection method, which is applied to a foreground wireless access point, where the foreground wireless access point is set correspondingly to a target wireless access point, and the method includes:

接收发送端发送的接入请求;Receive the access request sent by the sender;

对所述接入请求进行解析确定解析结果,所述解析结果包括当前接入步骤;Analyzing the access request to determine a parsing result, the parsing result including the current access step;

将所述当前接入步骤与接入过程模板进行匹配,确定匹配结果,所述接入过程模板是基于所述前台无线接入点的认证方式确定的,所述接入过程模板包括接入步骤;Matching the current access procedure with an access procedure template to determine a matching result, the access procedure template is determined based on the authentication mode of the foreground wireless access point, and the access procedure template includes an access procedure ;

当所述匹配结果为接入完成时,将接收到的所述发送端的数据转发至所述目标无线接入点进行处理。When the matching result is that the access is completed, the received data of the sending end is forwarded to the target wireless access point for processing.

本发明实施例提供的无线接入的检测方法,通过设置与目标无线接入点对应的前台无线接入点进行恶意接入检测,只有在前台无线接入点对检测通过之后,才会将数据转发至目标无线接入点进行处理,保证了目标无线接入点的安全性。同时,在前台无线接入点检测过程中,利用接入过程模板对当前接入步骤进行匹配,以对接入过程进行分割,建立连接过程模板消除了不同认证方式之间的差异,提升了检测方法的兼容性,且接入检测所采用的信息均是从接入请求中获得的,无需增加额外信息,无需对原有接入请求进行更改,减少了数据处理量,提高了检测效率。The wireless access detection method provided by the embodiment of the present invention performs malicious access detection by setting the foreground wireless access point corresponding to the target wireless access point. Only after the foreground wireless access point passes the detection will the data Forwarding to the target wireless access point for processing ensures the security of the target wireless access point. At the same time, in the foreground wireless access point detection process, the access process template is used to match the current access steps to divide the access process. The establishment of the connection process template eliminates the differences between different authentication methods and improves the detection process. The compatibility of the method, and the information used in the access detection is obtained from the access request, without adding additional information, without changing the original access request, reducing the amount of data processing, and improving the detection efficiency.

在一些实施方式中,所述解析结果包括发送端地址,所述将所述当前接入步骤与接入过程模板进行匹配,确定匹配结果,包括:In some implementations, the parsing result includes the address of the sender, and matching the current access step with the access process template to determine the matching result includes:

获取所述发送端地址对应的接入状态数据,所述接入状态数据包括所述发送端已完成的接入步骤;Obtain access status data corresponding to the address of the sender, where the access status data includes access steps completed by the sender;

将所述已完成的接入步骤与所述接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤;Matching the completed access steps with the access process template to determine the next access step of the last completed access step;

将所述当前接入步骤与确定出的下一接入步骤进行匹配,确定所述匹配结果。Matching the current access step with the determined next access step to determine the matching result.

本发明实施提供的无线接入的检测方法,利用接入状态数据对各个发送端地址的接入步骤进行存储,便于后续匹配时能够快速确定出最后一个已完成的接入步骤,提高了检测效率。The wireless access detection method provided by the implementation of the present invention uses the access state data to store the access steps of each sending end address, so that the last completed access step can be quickly determined during subsequent matching, and the detection efficiency is improved. .

在一些实施方式中,所述将所述当前接入步骤与确定出的下一接入步骤进行匹配,确定所述匹配结果,包括:In some implementation manners, the matching the current access step with the determined next access step, and determining the matching result includes:

当所述当前接入步骤与确定出的下一接入步骤匹配时,向所述发送端发送接入响应并更新所述接入状态数据。When the current access step matches the determined next access step, send an access response to the sending end and update the access state data.

本发明实施例提供的无线接入的检测方法,在检测出匹配时向发送端发送接入响应,以提醒发送端进行后续的接入步骤。The wireless access detection method provided by the embodiment of the present invention sends an access response to the sender when a match is detected, so as to remind the sender to perform subsequent access steps.

在一些实施方式中,所述将所述当前接入步骤与确定出的下一接入步骤进行匹配,确定所述匹配结果,包括:In some implementation manners, the matching the current access step with the determined next access step, and determining the matching result includes:

当所述当前接入步骤与确定出的下一接入步骤不匹配时,将所述发送端地址加入黑名单并忽略所述接入请求。When the current access step does not match the determined next access step, adding the sender address to a blacklist and ignoring the access request.

本发明实施例提供的无线接入的检测方法,在检测出不匹配时将发送端地址接入黑名单,当前台无线接入点在处理高并发接入请求时,将对黑名单中的发送端予以忽略,提高了高并发接入请求下的检测效率。In the wireless access detection method provided by the embodiment of the present invention, when a mismatch is detected, the address of the sending end is added to the blacklist, and when the current wireless access point is processing high concurrent access requests, the address of the sending end in the blacklist will be The terminal is ignored, which improves the detection efficiency under high concurrent access requests.

在一些实施方式中,所述解析结果还包括接收端地址,所述将所述已完成的接入步骤与所述接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤的步骤之前,包括:In some embodiments, the parsing result further includes the address of the receiving end, and the matching of the completed access step with the access process template determines the next step of the last completed access step Before entering the steps of the procedure, include:

将所述接收端地址与所述接入状态数据中的接收端地址进行比较;comparing the receiving end address with the receiving end address in the access state data;

当所述接收端地址与所述接入状态数据中的接收端地址一致时,执行将所述已完成的接入步骤与所述接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤的步骤。When the address of the receiving end is consistent with the address of the receiving end in the access status data, matching the completed access steps with the access process template to determine the last completed access step Step of the next access step.

本发明实施例提供的无线接入的检测方法,在进行接入步骤的匹配之前,先利用接收端地址进行匹配,只有在接收端地址一致的情况下方可进行接入过程模板的匹配,减少了匹配的数据量,提高了检测效率。In the wireless access detection method provided by the embodiment of the present invention, before the matching of the access step, the address of the receiving end is used for matching, and only when the address of the receiving end is consistent can the matching of the access process template be performed, which reduces the The amount of matching data improves the detection efficiency.

在一些实施方式中,所述获取所述发送端地址对应的接入状态数据,包括:In some implementation manners, the acquiring the access state data corresponding to the sender address includes:

利用所述发送端地址查询是否存在对应的接入状态数据;Querying whether there is corresponding access state data by using the sender address;

当不存在对应的接入状态数据时,建立所述发送端地址对应的接入状态数据,并向所述发送端发送响应帧,以获得下一个接入步骤;When there is no corresponding access state data, establish the access state data corresponding to the sender address, and send a response frame to the sender to obtain the next access step;

当存在对应的接入状态数据时,提取所述发送端地址对应的接入状态数据。When there is corresponding access state data, the access state data corresponding to the sender address is extracted.

在一些实施方式中,所述接入过程模板的确定方式包括:In some implementation manners, the manner of determining the access process template includes:

获取所述前台无线接入点的认证方式;Obtain the authentication mode of the foreground wireless access point;

基于所述认证方式的流程,采用键值对的方式建立所述接入过程模板。Based on the flow of the authentication mode, the access process template is established in the form of a key-value pair.

本发明实施例提供的无线接入的检测方法,采用键值对的方式建立接入过程模板,查找速度快,提高检测效率。同时利用认证方式建立接入过程模板,使得接入过程模板与认证方式一致,能够实现了不同认证方式下检测方式的统一;通过接入请求中数据的复用实现接入检测,也能够不额外增加通信链路的负荷。The wireless access detection method provided by the embodiment of the present invention uses a key-value pair to establish an access process template, which has a fast search speed and improves detection efficiency. At the same time, the access process template is established by using the authentication method, so that the access process template is consistent with the authentication method, and the unification of the detection methods under different authentication methods can be realized; the access detection can be realized by multiplexing the data in the access request, and no additional Increase the load on the communication link.

根据第二方面,本发明实施例提供了一种无线接入的检测装置,应用于前台无线接入点,所述前台无线接入点与目标无线接入点对应设置,所述装置包括:According to the second aspect, an embodiment of the present invention provides a wireless access detection device, which is applied to a foreground wireless access point, where the foreground wireless access point is set corresponding to a target wireless access point, and the device includes:

接收模块,用于接收发送端发送的接入请求;The receiving module is used to receive the access request sent by the sending end;

解析模块,用于对所述接入请求进行解析确定解析结果,所述解析结果包括当前接入步骤;An analysis module, configured to analyze the access request to determine an analysis result, the analysis result including the current access step;

匹配模块,用于将所述当前接入步骤与接入过程模板进行匹配,确定匹配结果,所述接入过程模板是基于所述前台无线接入点的认证方式确定的,所述接入过程模板包括接入步骤;A matching module, configured to match the current access step with an access process template to determine a matching result, the access process template is determined based on the authentication mode of the foreground wireless access point, and the access process The template includes access steps;

转发模块,用于当所述匹配结果为接入完成时,将接收到的所述发送端的数据转发至所述目标无线接入点进行处理。A forwarding module, configured to forward the received data of the sending end to the target wireless access point for processing when the matching result is that the access is completed.

根据第三方面,本发明实施例提供了一种电子设备,包括:存储器和处理器,所述存储器和所述处理器之间互相通信连接,所述存储器中存储有计算机指令,所述处理器通过执行所述计算机指令,从而执行第一方面或者第一方面的任意一种实施方式中所述的无线接入的检测方法。According to a third aspect, an embodiment of the present invention provides an electronic device, including: a memory and a processor, the memory and the processor are connected to each other in communication, the memory stores computer instructions, and the processor By executing the computer instructions, the wireless access detection method described in the first aspect or any implementation manner of the first aspect is executed.

根据第四方面,本发明实施例提供了一种计算机可读存储介质,所述计算机可读存储介质存储计算机指令,所述计算机指令用于使所述计算机执行第一方面或者第一方面的任意一种实施方式中所述的无线接入的检测方法。According to a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, the computer-readable storage medium stores computer instructions, and the computer instructions are used to enable the computer to execute any of the first aspect or the first aspect. A method for detecting wireless access described in an implementation manner.

需要说明的是,本发明实施例提供的无线接入的检测装置、电子设备及计算机可读存储介质的相应有益效果,请参见上文无线接入的检测方法的对应有益效果的描述,在此不再赘述。It should be noted that for the corresponding beneficial effects of the wireless access detection device, electronic equipment, and computer-readable storage medium provided by the embodiments of the present invention, please refer to the description of the corresponding beneficial effects of the wireless access detection method above, and here No longer.

附图说明Description of drawings

为了更清楚地说明本发明具体实施方式或现有技术中的技术方案,下面将对具体实施方式或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图是本发明的一些实施方式,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the specific embodiments of the present invention or the technical solutions in the prior art, the following will briefly introduce the accompanying drawings that need to be used in the description of the specific embodiments or prior art. Obviously, the accompanying drawings in the following description The drawings show some implementations of the present invention, and those skilled in the art can also obtain other drawings based on these drawings without creative work.

图1是根据本发明实施例的无线接入检测的场景图;FIG. 1 is a scene diagram of wireless access detection according to an embodiment of the present invention;

图2是根据本发明实施例的无线接入的检测方法的流程图;FIG. 2 is a flowchart of a method for detecting wireless access according to an embodiment of the present invention;

图3是根据本发明实施例的无线接入的检测方法的流程图;FIG. 3 is a flow chart of a method for detecting wireless access according to an embodiment of the present invention;

图4是根据本发明实施例的无线接入的检测装置的结构框图;FIG. 4 is a structural block diagram of a device for detecting wireless access according to an embodiment of the present invention;

图5是本发明实施例提供的电子设备的硬件结构示意图。FIG. 5 is a schematic diagram of a hardware structure of an electronic device provided by an embodiment of the present invention.

具体实施方式detailed description

为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

无线局域网目前所面临的威胁主要包括被动窃听与网络流量分析、主动窃听与消息注入、消息删除与拦截、假冒与恶意AP、会话劫持、中间人攻击以及拒绝服务(Denial ofService,DoS)攻击这七大类。在网络中执行802.11中规定的AES的CCMP加密机制可以解决被动窃听与网络流量分析、主动窃听与消息注入、消息删除与拦截;802.11中所提出的RSN解决方案可以消除假冒与恶意AP、会话劫持以及中间人攻击。而对于DoS攻击,目前的安全协议并不能提供很好的解决方案,并且由于无线局域网的一些特性使得它既会遭受常规有线网络中的DoS攻击,也会遭受一些无线局域网络中特有的DoS攻击。The current threats to wireless LANs mainly include passive eavesdropping and network traffic analysis, active eavesdropping and message injection, message deletion and interception, fake and malicious APs, session hijacking, man-in-the-middle attacks, and Denial of Service (DoS) attacks. kind. Implementing the AES CCMP encryption mechanism specified in 802.11 in the network can solve passive eavesdropping and network traffic analysis, active eavesdropping and message injection, message deletion and interception; the RSN solution proposed in 802.11 can eliminate fake and malicious APs and session hijacking and man-in-the-middle attacks. For DoS attacks, the current security protocols cannot provide a good solution, and due to some characteristics of wireless local area networks, it will not only suffer DoS attacks in conventional wired networks, but also suffer from some specific DoS attacks in wireless local area networks. .

DOS攻击中最为常见的是关联洪水攻击,这类攻击最为显著的特点就是在无线局域网络的接入阶段进行高并发操作,使得无线局域网接入点(AP)超出工作负荷,最终导致拒绝服务。关联洪水攻击,全称即关联洪水(泛洪)攻击,通常被简称为Asso攻击,是无线网络拒绝服务攻击的一种形式。它试图通过利用大量模仿的和伪造的无线客户端关联来填充AP的客户端关联表,从而达到淹没AP的目的。在802.11层,共享解密身份验证有缺陷,很难再用。仅有的其他备选项就是开放身份验证(空身份验证),该身份验证依赖于较高级别的身份验证,如802.1x或VPN。开放身份验证允许任何客户端通过身份验证然后关联。利用这种漏洞的攻击者可以通过创建多个到达已连接或已关联的客户端来模仿很多客户端,从而淹没目标AP的客户端关联表。客户端关联表溢出后,合法客户端将无法再关联,于是拒绝服务攻击即告完成。The most common type of DOS attack is the correlation flood attack. The most prominent feature of this type of attack is that it performs high concurrent operations during the access phase of the wireless LAN, which makes the wireless LAN access point (AP) overload and eventually leads to denial of service. Correlation flood attack, the full name is correlation flood (flooding) attack, usually referred to as Asso attack, is a form of wireless network denial of service attack. It attempts to flood the AP's client association table with a large number of impersonated and fake wireless client associations. At the 802.11 layer, shared decryption authentication is flawed and difficult to reuse. The only other alternative is open authentication (null authentication), which relies on higher-level authentication such as 802.1x or VPN. Open authentication allows any client to authenticate and then associate. An attacker exploiting this vulnerability could impersonate many clients by creating multiple reaching connected or associated clients, thereby flooding the target AP's client association table. Once the client association table is overflowed, legitimate clients can no longer associate, and the denial of service attack is complete.

目前在无线局域网络的接入阶段已经存在一些方法可以进行安全检测,比如:连接无线接入点的终端(STA)在向AP发送请求认证时会获取构造puzzle的参数,认证成功后,在关联阶段,STA需要携带puzzle解答,AP验证请求中携带的puzzle解答后决定是否接入该STA从而实现了对STA接入的合法性进行检查,避免了STA的恶意接入。或者,通过在连接模型中增加标签和密钥管理中心(KDC)来实现STA和AP之间信息的双向校验,来约束STA在接入过程中的行为,避免对AP的恶意攻击。At present, there are some methods for security detection in the access phase of the wireless local area network. For example, when the terminal (STA) connected to the wireless access point sends a request for authentication to the AP, it will obtain the parameters for constructing the puzzle. In this stage, the STA needs to carry the puzzle answer, and the AP verifies the puzzle answer carried in the request and decides whether to access the STA, thereby realizing the check of the legitimacy of the STA access and avoiding the malicious access of the STA. Or, by adding a label and key management center (KDC) in the connection model to realize bidirectional verification of information between STA and AP, to constrain the behavior of STA in the access process and avoid malicious attacks on AP.

但是上述方式都需要在STA的数据帧中增加额外信息,并且需要STA进行计算,这就增加了STA的计算负荷以及网络的传输负载,这在网络拥堵的情况下存在一定劣势。However, the above methods all need to add additional information in the data frame of the STA, and require the STA to perform calculations, which increases the calculation load of the STA and the transmission load of the network, which has certain disadvantages in the case of network congestion.

基于此,本发明实施例提供了一种无线接入的检测方法,该检测方法是通过前台无线接入点对接入请求进行分析,只有在前台无线接入点确认某发送端接入完成之后,才会将该发送端的数据转发至目标无线接入点。其中,前台无线接入点与目标无线接入点对应设置。Based on this, the embodiment of the present invention provides a wireless access detection method. The detection method is to analyze the access request through the foreground wireless access point. , the data of the sender will be forwarded to the target wireless access point. Wherein, the foreground wireless access point is set correspondingly to the target wireless access point.

例如,图1示出了无线接入检测的一种可选应用场景。目标AP为真实的无线接入点,前台AP与目标AP对应设置。在无线网络中,STA所有的接入请求是通过前台AP进行分析处理,之后在前台AP对STA检测通过之后,前台AP才会将该STA的数据转发至目标AP。其中,前台AP通过利用接入与认证方式对应的接入过程模板对接入请求进行分析,只有在接入请求与接入过程模板匹配时,才会确定发出该接入请求的发送端接入检测通过。所述的接入过程模板是用于表示接入认证的几个步骤,例如,认证方式A对应的认证步骤依次为a-b-c-d,那么,在接收到接入请求之后,将接入请求中的当前接入步骤与接入过程模板进行匹配,确定是否能够匹配上,从而确定发送该接入请求的STA是合法STA还是恶意STA。For example, Fig. 1 shows an optional application scenario of wireless access detection. The target AP is a real wireless access point, and the foreground AP is set correspondingly to the target AP. In a wireless network, all access requests of STAs are analyzed and processed by the foreground AP. After the foreground AP passes the detection of the STA, the foreground AP will forward the data of the STA to the target AP. Among them, the foreground AP analyzes the access request by using the access process template corresponding to the access and authentication mode, and only when the access request matches the access process template, will it determine that the sender that issued the access request accesses Test passed. The access process template is used to represent several steps of access authentication. For example, the authentication steps corresponding to authentication method A are a-b-c-d in sequence. Then, after receiving the access request, the current access in the access request In the step of entering, match the access process template to determine whether the match can be made, so as to determine whether the STA sending the access request is a legal STA or a malicious STA.

关于无线接入的检测方法的具体处理过程将在下文中进行详细描述。The specific processing procedure of the wireless access detection method will be described in detail below.

根据本发明实施例,提供了一种无线接入的检测方法实施例,需要说明的是,在附图的流程图示出的步骤可以在诸如一组计算机可执行指令的计算机系统中执行,并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。According to an embodiment of the present invention, an embodiment of a wireless access detection method is provided. It should be noted that the steps shown in the flowcharts of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

在本实施例中提供了一种无线接入的检测方法,用于上述的前台AP中,图2是根据本发明实施例的无线接入的检测方法的流程图,如图2所示,该流程包括如下步骤:In this embodiment, a method for detecting wireless access is provided, which is used in the above-mentioned foreground AP. FIG. 2 is a flowchart of a method for detecting wireless access according to an embodiment of the present invention. As shown in FIG. 2 , the The process includes the following steps:

S11,接收发送端发送的接入请求。S11. Receive the access request sent by the sender.

发送端(STA)在接入无线接入点(目标AP)时,需要先向前台AP发送接入请求,由于前台AP是与目标AP对应的,因此,前台AP能够接收到发送端发送的接入请求。对于不同的接入认证方式,若需要完成一次完整的无线接入,则需要经过多次的交互,每次交互时发送端向前台AP发送相应的数据帧,以表示当前进行到哪一个接入步骤。When the sender (STA) accesses the wireless access point (target AP), it needs to send an access request to the foreground AP first. Since the foreground AP corresponds to the target AP, the foreground AP can receive the access request sent by the sender. input request. For different access authentication methods, if you need to complete a complete wireless access, you need to go through multiple interactions. In each interaction, the sender sends a corresponding data frame to the foreground AP to indicate which access is currently in progress. step.

S12,对接入请求进行解析确定解析结果。S12, analyzing the access request to determine the analysis result.

其中,所述解析结果包括当前接入步骤。Wherein, the parsing result includes the current access step.

前台AP对接收到的接入请求进行解析,例如,对前台AP对接入请求的相应字段进行解析,确定当前接入步骤。The foreground AP parses the received access request, for example, the foreground AP parses the corresponding field of the access request to determine the current access procedure.

S13,将当前接入步骤与接入过程模板进行匹配,确定匹配结果。S13. Match the current access step with the access process template to determine a matching result.

其中,所述接入过程模板是基于所述前台无线接入点的认证方式确定的,所述接入过程模板包括接入步骤。Wherein, the access process template is determined based on the authentication mode of the foreground wireless access point, and the access process template includes an access step.

如上文所述,接入过程模板是与前台AP的认证方式对应的,表示的是无线接入所需要经过的几个步骤。即,对接入过程进行分割,得到相应的接入步骤,并依据接入步骤之间的逻辑进行存储,得到接入过程模板。As mentioned above, the access process template corresponds to the authentication mode of the foreground AP, and represents several steps required for wireless access. That is, the access process is divided to obtain corresponding access steps, which are stored according to the logic between the access steps to obtain an access process template.

前台AP在得到当前接入步骤时,将当前接入步骤与接入过程模板进行匹配,确定在接入过程模板中是否存在当前接入步骤,或者,依据接入步骤之间的顺序,当前是否应该执行到当前接入步骤,等等。若当前接入步骤无法与接入过程模板匹配,则能够确认该发送端为恶意STA;若当前接入步骤能够与接入过程模板匹配,则确认当前接入步骤是否为接入过程的最后一个步骤,若为最后一个步骤,则表示接入过程完成;若不是最后一个步骤,则向发送端发送接入响应,以获得下一个接入步骤。When the foreground AP obtains the current access step, it matches the current access step with the access process template to determine whether there is a current access step in the access process template, or, according to the order of the access steps, whether the current Should execute up to the current access step, and so on. If the current access step cannot match the access process template, it can be confirmed that the sending end is a malicious STA; if the current access step can match the access process template, it can be confirmed whether the current access step is the last one in the access process Step, if it is the last step, it means that the access process is completed; if it is not the last step, send an access response to the sender to obtain the next access step.

关于该步骤具体将在下文中进行详细描述。This step will be described in detail below.

S14,当匹配结果为接入完成时,将接收到的发送端的数据转发至目标无线接入点进行处理。S14. When the matching result is that the access is completed, forward the received data of the sending end to the target wireless access point for processing.

如上文所述,若当前接入步骤为接入过程的之后一个步骤,且能够与接入过程模板匹配,则表示接入完成。前台AP将接收到的发送端的数据转发至目标AP进行处理。具体地,当STA和AP进行数据交互时,前台AP会根据STA的MAC地址去检查对应的接入状态,只有STA处于接入完成状态时,该STA的数据包才会被前台AP转发至目标AP。如果该STA的接入状态不属于连接完成,或者不存在该数据结构,那么该数据将会被忽略。As mentioned above, if the current access step is a subsequent step of the access process and can match the access process template, it means that the access is completed. The foreground AP forwards the received data from the sender to the target AP for processing. Specifically, when the STA and the AP perform data interaction, the foreground AP will check the corresponding access status according to the MAC address of the STA. Only when the STA is in the access completion state, the data packet of the STA will be forwarded by the foreground AP to the target AP. If the STA's access status does not belong to connection complete, or the data structure does not exist, then the data will be ignored.

本实施例提供的无线接入的检测方法,通过设置与目标无线接入点对应的前台无线接入点进行恶意接入检测,只有在前台无线接入点对检测通过之后,才会将数据转发至目标无线接入点进行处理,保证了目标无线接入点的安全性。同时,在前台无线接入点检测过程中,利用接入过程模板对当前接入步骤进行匹配,以对接入过程进行分割,建立连接过程模板消除了不同认证方式之间的差异,提升了检测方法的兼容性,且接入检测所采用的信息均是从接入请求中获得的,无需增加额外信息,无需对原有接入请求进行更改,减少了数据处理量,提高了检测效率。The wireless access detection method provided in this embodiment is to perform malicious access detection by setting the foreground wireless access point corresponding to the target wireless access point, and the data will be forwarded only after the foreground wireless access point passes the detection. The target wireless access point is processed to ensure the security of the target wireless access point. At the same time, in the foreground wireless access point detection process, the access process template is used to match the current access steps to divide the access process. The establishment of the connection process template eliminates the differences between different authentication methods and improves the detection process. The compatibility of the method, and the information used in the access detection is obtained from the access request, without adding additional information, without changing the original access request, reducing the amount of data processing, and improving the detection efficiency.

在本实施例中提供了一种无线接入的检测方法,用于上述的前台AP中,图3是根据本发明实施例的无线接入的检测方法的流程图,如图3所示,该流程包括如下步骤:In this embodiment, a method for detecting wireless access is provided, which is used in the above-mentioned foreground AP. FIG. 3 is a flowchart of a method for detecting wireless access according to an embodiment of the present invention. As shown in FIG. 3 , the The process includes the following steps:

S21,接收发送端发送的接入请求。S21. Receive the access request sent by the sender.

详细请参见图2所示实施例的S11,在此不再赘述。For details, refer to S11 in the embodiment shown in FIG. 2 , and details are not repeated here.

S22,对接入请求进行解析确定解析结果。S22. Analyze the access request to determine the analysis result.

其中,所述解析结果包括当前接入步骤以及发送端地址。Wherein, the parsing result includes the current access procedure and the sender address.

详细请参见图2所示实施例的S12,在此不再赘述。For details, refer to S12 in the embodiment shown in FIG. 2 , and details are not repeated here.

S23,将当前接入步骤与接入过程模板进行匹配,确定匹配结果。S23. Match the current access step with the access process template to determine the matching result.

其中,所述接入过程模板是基于所述前台无线接入点的认证方式确定的,所述接入过程模板包括接入步骤。Wherein, the access process template is determined based on the authentication mode of the foreground wireless access point, and the access process template includes an access step.

具体地,上述S23包括:Specifically, the above S23 includes:

S231,获取发送端地址对应的接入状态数据。S231. Obtain access state data corresponding to the sender address.

其中,所述接入状态数据包括发送端已完成的接入步骤。Wherein, the access state data includes the access steps completed by the sending end.

在前台AP中存储有多个接入状态数据,接入状态数据与发送端地址对应。因此,前台AP利用发送端地址即可从多个接入状态数据中查询到对应的接入状态数据。A plurality of access state data are stored in the foreground AP, and the access state data corresponds to the sender address. Therefore, the foreground AP can query the corresponding access state data from multiple access state data by using the sender address.

接入状态数据用于表示发送端已经完成的接入步骤,例如,存储在前台AP中的STA接入状态数据的数据结构为:The access status data is used to indicate the access steps that the sender has completed. For example, the data structure of the STA access status data stored in the foreground AP is:

{STA的MAC地址:[AP的MAC地址,已完成的步骤]}{STA's MAC address: [AP's MAC address, completed steps]}

该数据结构为一个字典数据类型,字典的键为STA的MAC地址,值为一个列表,列表的第一个元素为AP的MAC地址,列表的第二个元素为一个链表,其中记录了该STA在接入过程中已经完成的步骤。其中,STA的MAC地址来源于接入请求,若接入请求采用的是802.11帧的形式,那么,802.11帧中的Address2表示的是STA的MAC地址,802.11帧中的Address1表示的是AP的MAC地址。The data structure is a dictionary data type. The key of the dictionary is the MAC address of the STA, and the value is a list. The first element of the list is the MAC address of the AP, and the second element of the list is a linked list, which records the STA. Steps that have been completed during the onboarding process. Among them, the MAC address of the STA comes from the access request. If the access request is in the form of an 802.11 frame, then Address2 in the 802.11 frame represents the MAC address of the STA, and Address1 in the 802.11 frame represents the MAC address of the AP. address.

在一些实施方式中,上述S231包括:In some implementations, the above S231 includes:

(1)利用发送端地址查询是否存在对应的接入状态数据。(1) Use the sender address to query whether there is corresponding access state data.

(2)当不存在对应的接入状态数据时,建立发送端地址对应的接入状态数据,并向发送端发送响应帧,以获得下一个接入步骤。(2) When there is no corresponding access state data, establish the access state data corresponding to the sender's address, and send a response frame to the sender to obtain the next access step.

(3)当存在对应的接入状态数据时,提取发送端地址对应的接入状态数据。(3) When there is corresponding access state data, extract the access state data corresponding to the sender address.

前台AP在获取到接入请求之后,利用接入请求的解析结果中的发送端地址进行接入状态数据的查询,以确定接入请求是否为新接入请求。若该接入请求为新接入请求,前台AP需要在内存中建立该STA的接入状态数据结构,之后向STA发送响应帧;若对于处于接入过程中的计入请求,前台AP需要根据STA的MAC地址获取到该STA的接入状态数据。After the foreground AP obtains the access request, it uses the address of the sender in the analysis result of the access request to query the access status data to determine whether the access request is a new access request. If the access request is a new access request, the foreground AP needs to establish the access status data structure of the STA in the memory, and then send a response frame to the STA; The MAC address of the STA is used to obtain the access state data of the STA.

S232,将已完成的接入步骤与接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤。S232. Match the completed access steps with the access process template, and determine the next access step of the last completed access step.

如上文所述,接入过程模板表示的接入过程的步骤,接入状态数据表示的是已完成的接入步骤。基于此,前台AP将接入状态数据中的最优一个已完成的接入步骤与接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤。As mentioned above, the access process template represents the steps of the access process, and the access state data represents the completed access steps. Based on this, the foreground AP matches the best completed access step in the access state data with the access process template, and determines the next access step of the last completed access step.

S233,将当前接入步骤与确定出的下一接入步骤进行匹配,确定匹配结果。S233. Match the current access step with the determined next access step, and determine the matching result.

其中,上述S232中得到的最后一个已完成的接入步骤的下一接入步骤,是从接入过程模板中确定的。前台AP将当前接入步骤与该确定出的下一接入步骤进行匹配,确定两者是否能够匹配,得到相应的匹配结果。Wherein, the next access step of the last completed access step obtained in S232 is determined from the access process template. The foreground AP matches the current access step with the determined next access step, determines whether the two can match, and obtains a corresponding matching result.

当当前接入步骤与确定出的下一接入步骤匹配时,向发送端发送接入响应并更新所述接入状态数据。当当前接入步骤与确定出的下一接入步骤不匹配时,将发送端地址加入黑名单并忽略接入请求。When the current access step matches the determined next access step, an access response is sent to the sender and the access state data is updated. When the current access step does not match the determined next access step, add the sending end address to the blacklist and ignore the access request.

具体地,根据接入过程模板,判断当前接入步骤是否是已完成接入步骤的最后一步的下一步,若符合模板则给与响应,不符合则丢弃。对于不符合接入过程模板的STA,前台AP会记录下该STA的MAC地址,并建立黑名单机制,当前台AP在处理高并发接入请求时,将对黑名单中的STA予以忽略。Specifically, according to the access process template, it is judged whether the current access step is the next step after the last step of the access step, and if it matches the template, a response is given, and if it does not match, it is discarded. For STAs that do not conform to the access process template, the foreground AP will record the MAC address of the STA and establish a blacklist mechanism. When the foreground AP processes high concurrent access requests, it will ignore the STAs in the blacklist.

在检测出匹配时向发送端发送接入响应,以提醒发送端进行后续的接入步骤。在检测出不匹配时将发送端地址接入黑名单,当前台无线接入点在处理高并发接入请求时,将对黑名单中的发送端予以忽略,提高了高并发接入请求下的检测效率。When a match is detected, an access response is sent to the sender to remind the sender to perform subsequent access steps. When a mismatch is detected, the address of the sender will be added to the blacklist. When the current wireless access point is processing high concurrent access requests, it will ignore the sender in the blacklist, which improves the efficiency under high concurrent access requests. detection efficiency.

在一些实施方式中,解析结果还包括接收端地址,基于此,上述S232之前还包括:In some implementations, the analysis result also includes the address of the receiving end. Based on this, the above S232 also includes:

(1)将接收端地址与接入状态数据中的接收端地址进行比较。(1) Compare the receiving end address with the receiving end address in the access state data.

(2)当接收端地址与接入状态数据中的接收端地址一致时,执行将已完成的接入步骤与所述接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤的步骤。(2) When the receiving end address is consistent with the receiving end address in the access state data, perform matching of the completed access steps with the access process template to determine the next step of the last completed access step Steps to access steps.

对于处于接入过程中的请求,前台AP需要根据STA的MAC地址获取到该STA的接入状态数据。首先判断接入请求中的接收端地址是否与接入状态数据中列表的第一个值相等,如果不等则直接丢弃,相等的话才会执行将已完成的接入步骤与所述接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤的步骤。For the request in the access process, the foreground AP needs to obtain the access status data of the STA according to the MAC address of the STA. First judge whether the address of the receiving end in the access request is equal to the first value in the list in the access state data, if not, discard it directly, and only execute the completed access steps and the access process if they are equal Templates are matched to determine the step of the next access step to the last completed access step.

在进行接入步骤的匹配之前,先利用接收端地址进行匹配,只有在接收端地址一致的情况下方可进行接入过程模板的匹配,减少了匹配的数据量,提高了检测效率。Before the matching of the access step, the address of the receiving end is used for matching. Only when the address of the receiving end is consistent can the matching of the access process template be performed, which reduces the amount of matching data and improves the detection efficiency.

S24,当匹配结果为接入完成时,将接收到的发送端的数据转发至目标无线接入点进行处理。S24. When the matching result is that the access is completed, forward the received data of the sending end to the target wireless access point for processing.

详细请参见图2所示实施例的S14,在此不再赘述。For details, refer to S14 in the embodiment shown in FIG. 2 , and details are not repeated here.

本实施例提供的无线接入的检测方法,利用接入状态数据对各个发送端地址的接入步骤进行存储,便于后续匹配时能够快速确定出最后一个已完成的接入步骤,提高了检测效率。The wireless access detection method provided in this embodiment uses the access state data to store the access steps of each sender address, so that the last completed access step can be quickly determined during subsequent matching, and the detection efficiency is improved. .

在一些实施方式中,接入过程模板的确定方式包括:In some implementation manners, the manner of determining the access process template includes:

(1)获取前台无线接入点的认证方式。(1) Obtain the authentication mode of the foreground wireless access point.

(2)基于认证方式的流程,采用键值对的方式建立接入过程模板。(2) Based on the flow of the authentication method, the access process template is established by means of key-value pairs.

在无线接入检测之前,需要为目标AP搭建一个前台AP用来接收接入请求,并隐藏目标AP。对于已经存在的目标AP,前台AP需要与目标AP拥有相同的名称、认证方式和密码,这样对于原有连接到此AP的STA来说实现无感切换。对于新建的目标AP,前台AP可以选择全新的名称、认证方式和密码,STA在通过前台AP验证之后,前台AP将该请求完全转发给目标AP即可。Before wireless access detection, it is necessary to build a foreground AP for the target AP to receive access requests and hide the target AP. For the existing target AP, the foreground AP needs to have the same name, authentication method and password as the target AP, so that the STA connected to this AP can realize a senseless handover. For the newly created target AP, the foreground AP can choose a new name, authentication method and password. After the STA passes the authentication of the foreground AP, the foreground AP can completely forward the request to the target AP.

根据前台AP的认证方式建立接入过程模板,包括但不限于认证、关联、四次握手等过程。该模板的格式为字典型,具体如下:Establish an access process template according to the authentication mode of the front-end AP, including but not limited to authentication, association, four-way handshake and other processes. The format of the template is a dictionary type, as follows:

{已完成步骤:下一步骤}{Completed step: next step}

其中,字典的键为已完成步骤,当STA进行接入时,前台AP可以快速判断出STA在接入时当前步骤是否为上一步骤的下一步骤以及在收到取消关联或者取消认证请求时,当前STA是否已经完成接入流程。Among them, the key of the dictionary is the completed step. When the STA accesses, the foreground AP can quickly determine whether the current step of the STA is the next step of the previous step when the STA accesses, and when receiving a disassociation or deauthentication request , whether the current STA has completed the access procedure.

采用键值对的方式建立接入过程模板,查找速度快,提高检测效率。同时利用认证方式建立接入过程模板,使得接入过程模板与认证方式一致,能够实现了不同认证方式下检测方式的统一;通过接入请求中数据的复用实现接入检测,也能够不额外增加通信链路的负荷。The access process template is established in the form of key-value pairs, which has a fast search speed and improves detection efficiency. At the same time, the access process template is established by using the authentication method, so that the access process template is consistent with the authentication method, and the unification of the detection methods under different authentication methods can be realized; the access detection can be realized by multiplexing the data in the access request, and no additional Increase the load on the communication link.

作为本实施例的一个具体应用实例,所述的无线接入的检测方法包括:As a specific application example of this embodiment, the wireless access detection method includes:

步骤1:为目标AP搭建一个前台AP用来接收接入请求,并隐藏目标AP,建立模式如图1所示。在图1中,具体的角色包含目标AP、前台AP、合法STA以及恶意STA。其中目标AP只和前台AP进行交互,目标AP在公开网络中不可见。外部STA可以检测到前台AP,无线局域网的连接模板和数据结构处理都在前台AP中进行。Step 1: Build a foreground AP for the target AP to receive access requests and hide the target AP. The establishment mode is shown in Figure 1. In Figure 1, the specific roles include target AP, foreground AP, legal STA and malicious STA. The target AP only interacts with the foreground AP, and the target AP is invisible in the public network. The external STA can detect the foreground AP, and the WLAN connection template and data structure processing are performed on the foreground AP.

步骤2:根据前台AP的认证方式建立接入过程模板,包括但不限于认证、关联、四次握手等过程。本实施例中,目标AP采用WEP认证方式,得出本实施例中前台AP的接入过程模板为:Step 2: Establish an access process template according to the authentication method of the foreground AP, including but not limited to authentication, association, four-way handshake and other processes. In this embodiment, the target AP adopts the WEP authentication mode, and the access process template of the foreground AP in this embodiment is obtained as follows:

{空:未认证未关联}{empty: not authenticated not associated}

{未认证未关联:认证未关联}{not authenticated not associated: authenticated not associated}

{认证未关联:已认证已关联}{Authentication Not Associated: Authentication Associated}

{已认证已关联:数据交换}{Authenticated Associated: Data Exchange}

步骤3:根据建立的接入过程模板,设计存储在前台AP中的STA接入状态数据的数据结构为:Step 3: According to the established access process template, design the data structure of the STA access status data stored in the foreground AP as follows:

{STA的MAC地址:[AP的MAC地址,已完成的步骤]}{STA's MAC address: [AP's MAC address, completed steps]}

该结构为一个字典数据类型,字典的键为STA的MAC地址,值为一个列表,列表的第一个元素为AP的MAC地址,列表的第二个元素为一个链表,其中记录了该STA在接入过程中已经完成的步骤。STA的MAC地址来源于802.11帧中的Address2,AP的MAC地址来源于802.11帧中的Address1。The structure is a dictionary data type. The key of the dictionary is the MAC address of the STA, and the value is a list. The first element of the list is the MAC address of the AP, and the second element of the list is a linked list, which records the STA's Steps already completed in the onboarding process. The STA's MAC address comes from Address2 in the 802.11 frame, and the AP's MAC address comes from Address1 in the 802.11 frame.

步骤4:对前台AP对接收到的STA接入请求帧进行处理。在本实施例中,假设AP的MAC地址为:00-01-6C-06-A6-29,STA的MAC地址为:00-01-6C-06-A6-28。当STA为新接入请求时,根据STA的MAC地址是无法再内存中找到相应的数据结构,此时定义前一个状态为“空”,并在前台AP内存中建立对应的数据结构:Step 4: Process the STA access request frame received by the foreground AP. In this embodiment, it is assumed that the MAC address of the AP is: 00-01-6C-06-A6-29, and the MAC address of the STA is: 00-01-6C-06-A6-28. When the STA requests a new access, the corresponding data structure cannot be found in the memory according to the MAC address of the STA. At this time, the previous state is defined as "empty", and the corresponding data structure is established in the memory of the foreground AP:

{00-01-6C-06-A6-28:[00-01-6C-06-A6-29,空]}{00-01-6C-06-A6-28:[00-01-6C-06-A6-29, empty]}

此时根据模板进行匹配,由于AP收到的是认证请求帧,所以当前的状态为“未认证未关联”,根据该STA的MAC地址可以查到,前一个状态为“空”,根据模板匹配出下一个状态为“未认证未关联”,所以是合法状态,如果认证通过则给STA发送认证响应,并修改数据结构为:At this time, the matching is performed according to the template. Since the AP received the authentication request frame, the current status is "unauthenticated and unassociated", which can be found according to the MAC address of the STA. The previous status is "empty", and the template is matched. The next state is "unauthenticated and unassociated", so it is a legal state. If the authentication is passed, an authentication response will be sent to the STA, and the data structure will be modified as follows:

{00-01-6C-06-A6-28:[00-01-6C-06-A6-29,空->未认证未关联]}{00-01-6C-06-A6-28:[00-01-6C-06-A6-29, empty -> unauthenticated and unassociated]}

如果验证失败,则发送对应认证失败响应,但不修改接入状态数据。If the authentication fails, the corresponding authentication failure response is sent, but the access state data is not modified.

对于恶意请求,根据模板规则也可以很好的匹配出来,对于不符合接入过程模板的STA,前台AP会记录下MAC地址,并建立黑名单机制,当前台AP在处理高并发接入请求时,将对黑名单中的STA予以忽略。Malicious requests can also be well matched according to the template rules. For STAs that do not conform to the access process template, the foreground AP will record the MAC address and establish a blacklist mechanism. When the foreground AP is processing high concurrent access requests , STAs in the blacklist will be ignored.

对于完成接入请求的STA,前台会将其数据转发至目标AP实现数据交互。For the STA that completes the access request, the foreground will forward its data to the target AP for data interaction.

步骤5:当STA和AP进行数据交互时,前台AP会根据STA的MAC去检查对应的状态,只有STA处于接入完成状态时,该STA的数据包才会被前台AP转发至目标AP。在本实施例中,只有接入状态数据的结构的形式为:Step 5: When the STA and the AP perform data interaction, the foreground AP will check the corresponding status according to the STA's MAC. Only when the STA is in the access completion state, the STA's data packets will be forwarded by the foreground AP to the target AP. In this embodiment, only the structure of the access state data is in the form:

{00-01-6C-06-A6-28:[00-01-6C-06-A6-29,空->未认证未关联->认证未关联->已认证已关联->数据交换]}时,才允许STA和目标AP进行数据交互。如果该STA的接入状态不属于连接完成,或者不存在该STA对应的接入状态数据,那么该数据将会被忽略。{00-01-6C-06-A6-28:[00-01-6C-06-A6-29, empty -> unauthenticated and unassociated -> authenticated and unassociated -> authenticated and associated -> data exchange]} , the STA is allowed to exchange data with the target AP. If the access status of the STA does not belong to connection completion, or there is no access status data corresponding to the STA, then the data will be ignored.

该方法通过对无线局域网的接入过程进行切割,建立连接过程模板消除了不同认证方式之间的差异,提升了检测方法的兼容性。为目标AP增加前台AP进一步提升了无线局域网络的安全性,对真实网络起到了一定的保护作用。同时对802.11帧中数据进行复用,降低了网络载荷,使得方法的可用性更好,避免在网络负荷较高的情况下,加大通信时延。该方法适用于无线局域网络中恶意接入的检测,该检测方法既实现了不同认证方式下检测方式的统一,也能够不额外增加通信链路的负荷。The method cuts the access process of the wireless local area network, establishes a connection process template, eliminates the difference between different authentication methods, and improves the compatibility of the detection method. Adding the foreground AP to the target AP further improves the security of the WLAN and protects the real network to a certain extent. At the same time, the data in the 802.11 frame is multiplexed, which reduces the network load, makes the usability of the method better, and avoids increasing the communication delay when the network load is high. The method is applicable to the detection of malicious access in the wireless local area network, and the detection method not only realizes the unification of the detection methods under different authentication methods, but also does not increase the load of the communication link additionally.

在本实施例中还提供了一种无线接入的检测装置,该装置用于实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。In this embodiment, a device for detecting wireless access is also provided, and the device is used to implement the above embodiments and preferred implementation modes, and what has been explained will not be repeated. As used below, the term "module" may be a combination of software and/or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

本实施例提供一种无线接入的检测装置,应用于前台无线接入点,所述前台无线接入点与目标无线接入点对应设置,如图4所示,该装置包括:This embodiment provides a wireless access detection device, which is applied to a foreground wireless access point, and the foreground wireless access point is set correspondingly to the target wireless access point, as shown in FIG. 4 , the device includes:

接收模块31,用于接收发送端发送的接入请求;The receiving module 31 is configured to receive the access request sent by the sending end;

解析模块32,用于对所述接入请求进行解析确定解析结果,所述解析结果包括当前接入步骤;An analysis module 32, configured to analyze the access request to determine an analysis result, the analysis result including the current access step;

匹配模块33,用于将所述当前接入步骤与接入过程模板进行匹配,确定匹配结果,所述接入过程模板是基于所述前台无线接入点的认证方式确定的,所述接入过程模板包括接入步骤;A matching module 33, configured to match the current access step with an access process template to determine a matching result, the access process template is determined based on the authentication mode of the foreground wireless access point, the access Process templates include access steps;

转发模块34,用于当所述匹配结果为接入完成时,将接收到的所述发送端的数据转发至所述目标无线接入点进行处理。The forwarding module 34 is configured to forward the received data of the sending end to the target wireless access point for processing when the matching result is that the access is completed.

在一些实施方式中,所述解析结果包括发送端地址,匹配模块33包括:In some implementations, the parsing result includes the address of the sender, and the matching module 33 includes:

获取单元,用于获取所述发送端地址对应的接入状态数据,所述接入状态数据包括所述发送端已完成的接入步骤;An acquisition unit, configured to acquire access status data corresponding to the address of the sender, where the access status data includes access steps completed by the sender;

第一匹配单元,用于将所述已完成的接入步骤与所述接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤;a first matching unit, configured to match the completed access steps with the access process template, and determine the next access step of the last completed access step;

第二匹配单元,用于将所述当前接入步骤与确定出的下一接入步骤进行匹配,确定所述匹配结果。The second matching unit is configured to match the current access step with the determined next access step, and determine the matching result.

在一些实施方式中,第一匹配单元包括:In some embodiments, the first matching unit includes:

第一匹配子单元,用于当所述当前接入步骤与确定出的下一接入步骤匹配时,向所述发送端发送接入响应并更新所述接入状态数据。The first matching subunit is configured to send an access response to the sending end and update the access state data when the current access step matches the determined next access step.

在一些实施方式中,第一匹配单元包括:In some embodiments, the first matching unit includes:

第二匹配子单元,用于当所述当前接入步骤与确定出的下一接入步骤不匹配时,将所述发送端地址加入黑名单并忽略所述接入请求。The second matching subunit is configured to add the sender address to a blacklist and ignore the access request when the current access step does not match the determined next access step.

在一些实施方式中,所述解析结果还包括接收端地址,匹配模块33包括:In some implementations, the parsing result also includes the receiver address, and the matching module 33 includes:

比较单元,用于将所述接收端地址与所述接入状态数据中的接收端地址进行比较;a comparison unit, configured to compare the address of the receiving end with the address of the receiving end in the access status data;

执行单元,用于当所述接收端地址与所述接入状态数据中的接收端地址一致时,执行将所述已完成的接入步骤与所述接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤的步骤。An executing unit, configured to match the completed access steps with the access process template when the address of the receiving end is consistent with the address of the receiving end in the access state data, and determine the last completed access procedure template The step of the next access step for the completed access step.

在一些实施方式中,获取单元包括:In some embodiments, the acquisition unit includes:

查询子单元,用于利用所述发送端地址查询是否存在对应的接入状态数据;a query subunit, configured to use the sender address to query whether there is corresponding access state data;

建立子单元,用于当不存在对应的接入状态数据时,建立所述发送端地址对应的接入状态数据,并向所述发送端发送响应帧,以获得下一个接入步骤;The establishment subunit is used to establish the access state data corresponding to the address of the sending end when there is no corresponding access state data, and send a response frame to the sending end to obtain the next access step;

提取子单元,用于当存在对应的接入状态数据时,提取所述发送端地址对应的接入状态数据。The extracting subunit is configured to extract the access state data corresponding to the sender address when there is corresponding access state data.

在一些实施方式中,所述接入过程模板的确定方式包括:In some implementation manners, the manner of determining the access process template includes:

获取所述前台无线接入点的认证方式;Obtain the authentication mode of the foreground wireless access point;

基于所述认证方式的流程,采用键值对的方式建立所述接入过程模板。Based on the flow of the authentication mode, the access process template is established in the form of a key-value pair.

本实施例中的无线接入的检测装置是以功能单元的形式来呈现,这里的单元是指ASIC电路,执行一个或多个软件或固定程序的处理器和存储器,和/或其他可以提供上述功能的器件。The device for detecting wireless access in this embodiment is presented in the form of a functional unit, where a unit refers to an ASIC circuit, a processor and a memory that execute one or more software or fixed programs, and/or other devices that can provide the above-mentioned functional devices.

上述各个模块的更进一步的功能描述与上述对应实施例相同,在此不再赘述。Further functional descriptions of the above-mentioned modules are the same as those in the above-mentioned corresponding embodiments, and will not be repeated here.

本发明实施例还提供一种电子设备,具有上述图4所示的无线接入的检测装置。An embodiment of the present invention also provides an electronic device, which has the apparatus for detecting wireless access shown in FIG. 4 above.

请参阅图5,图5是本发明可选实施例提供的一种电子设备的结构示意图,如图5所示,该电子设备可以包括:至少一个处理器41,例如CPU(Central Processing Unit,中央处理器),至少一个通信接口43,存储器44,至少一个通信总线42。其中,通信总线42用于实现这些组件之间的连接通信。其中,通信接口43可以包括显示屏(Display)、键盘(Keyboard),可选通信接口43还可以包括标准的有线接口、无线接口。存储器44可以是高速RAM存储器(Random Access Memory,易挥发性随机存取存储器),也可以是非不稳定的存储器(non-volatile memory),例如至少一个磁盘存储器。存储器44可选的还可以是至少一个位于远离前述处理器41的存储装置。其中处理器41可以结合图4所描述的装置,存储器44中存储应用程序,且处理器41调用存储器44中存储的程序代码,以用于执行上述任一方法步骤。Please refer to FIG. 5. FIG. 5 is a schematic structural diagram of an electronic device provided in an optional embodiment of the present invention. As shown in FIG. 5, the electronic device may include: at least one processor 41, such as a CPU (Central Processing Unit, central processor), at least one communication interface 43, memory 44, and at least one communication bus 42. Among them, the communication bus 42 is used to realize connection and communication between these components. Wherein, the communication interface 43 may include a display screen (Display) and a keyboard (Keyboard), and the optional communication interface 43 may also include a standard wired interface and a wireless interface. The memory 44 may be a high-speed RAM memory (Random Access Memory, volatile random access memory), or a non-volatile memory (non-volatile memory), such as at least one disk memory. Optionally, the memory 44 may also be at least one storage device located away from the aforementioned processor 41 . Wherein the processor 41 can be combined with the device described in FIG. 4 , the memory 44 stores an application program, and the processor 41 invokes the program code stored in the memory 44 to execute any of the above method steps.

其中,通信总线42可以是外设部件互连标准(peripheral componentinterconnect,简称PCI)总线或扩展工业标准结构(extended industry standardarchitecture,简称EISA)总线等。通信总线42可以分为地址总线、数据总线、控制总线等。为便于表示,图5中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。Wherein, the communication bus 42 may be a peripheral component interconnect standard (PCI for short) bus or an extended industry standard architecture (EISA for short) bus or the like. The communication bus 42 can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is used in FIG. 5 , but it does not mean that there is only one bus or one type of bus.

其中,存储器44可以包括易失性存储器(英文:volatile memory),例如随机存取存储器(英文:random-access memory,缩写:RAM);存储器也可以包括非易失性存储器(英文:non-volatile memory),例如快闪存储器(英文:flash memory),硬盘(英文:hard diskdrive,缩写:HDD)或固态硬盘(英文:solid-state drive,缩写:SSD);存储器44还可以包括上述种类的存储器的组合。Wherein, the memory 44 may include a volatile memory (English: volatile memory), such as a random-access memory (English: random-access memory, abbreviated as RAM); the memory may also include a non-volatile memory (English: non-volatile memory), such as flash memory (English: flash memory), hard disk (English: hard diskdrive, abbreviated: HDD) or solid-state hard disk (English: solid-state drive, abbreviated: SSD); memory 44 can also include the above-mentioned types of memory The combination.

其中,处理器41可以是中央处理器(英文:central processing unit,缩写:CPU),网络处理器(英文:network processor,缩写:NP)或者CPU和NP的组合。Wherein, the processor 41 may be a central processing unit (English: central processing unit, abbreviated: CPU), a network processor (English: network processor, abbreviated: NP) or a combination of CPU and NP.

其中,处理器41还可以进一步包括硬件芯片。上述硬件芯片可以是专用集成电路(英文:application-specific integrated circuit,缩写:ASIC),可编程逻辑器件(英文:programmable logic device,缩写:PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(英文:complex programmable logic device,缩写:CPLD),现场可编程逻辑门阵列(英文:field-programmable gate array,缩写:FPGA),通用阵列逻辑(英文:generic arraylogic,缩写:GAL)或其任意组合。Wherein, the processor 41 may further include a hardware chip. The aforementioned hardware chip may be an application-specific integrated circuit (English: application-specific integrated circuit, abbreviation: ASIC), a programmable logic device (English: programmable logic device, abbreviation: PLD) or a combination thereof. The above-mentioned PLD can be a complex programmable logic device (English: complex programmable logic device, abbreviation: CPLD), field-programmable logic gate array (English: field-programmable gate array, abbreviation: FPGA), general array logic (English: generic array logic , Abbreviation: GAL) or any combination thereof.

可选地,存储器44还用于存储程序指令。处理器41可以调用程序指令,实现如本申请任一实施例中所示的无线接入的检测方法。Optionally, memory 44 is also used to store program instructions. The processor 41 may invoke program instructions to implement the wireless access detection method shown in any embodiment of the present application.

本发明实施例还提供了一种非暂态计算机存储介质,所述计算机存储介质存储有计算机可执行指令,该计算机可执行指令可执行上述任意方法实施例中的无线接入的检测方法。其中,所述存储介质可为磁碟、光盘、只读存储记忆体(Read-Only Memory,ROM)、随机存储记忆体(Random Access Memory,RAM)、快闪存储器(Flash Memory)、硬盘(Hard DiskDrive,缩写:HDD)或固态硬盘(Solid-State Drive,SSD)等;所述存储介质还可以包括上述种类的存储器的组合。An embodiment of the present invention also provides a non-transitory computer storage medium, where the computer storage medium stores computer-executable instructions, and the computer-executable instructions can execute the wireless access detection method in any of the foregoing method embodiments. Wherein, the storage medium may be a magnetic disk, an optical disk, a read-only memory (Read-Only Memory, ROM), a random access memory (Random Access Memory, RAM), a flash memory (Flash Memory), a hard disk (Hard Disk) DiskDrive, abbreviation: HDD) or solid-state disk (Solid-State Drive, SSD), etc.; the storage medium may also include a combination of the above-mentioned types of memory.

虽然结合附图描述了本发明的实施例,但是本领域技术人员可以在不脱离本发明的精神和范围的情况下做出各种修改和变型,这样的修改和变型均落入由所附权利要求所限定的范围之内。Although the embodiments of the present invention have been described in conjunction with the accompanying drawings, those skilled in the art can make various modifications and variations without departing from the spirit and scope of the present invention. within the bounds of the requirements.

Claims (10)

1.一种无线接入的检测方法,其特征在于,应用于前台无线接入点,所述前台无线接入点与目标无线接入点对应设置,所述方法包括:1. A detection method for wireless access, characterized in that it is applied to a wireless access point in the foreground, and the wireless access point in the foreground is correspondingly set with the target wireless access point, and the method includes: 接收发送端发送的接入请求;Receive the access request sent by the sender; 对所述接入请求进行解析确定解析结果,所述解析结果包括当前接入步骤;Analyzing the access request to determine a parsing result, the parsing result including the current access step; 将所述当前接入步骤与接入过程模板进行匹配,确定匹配结果,所述接入过程模板是基于所述前台无线接入点的认证方式确定的,所述接入过程模板包括接入步骤;Matching the current access procedure with an access procedure template to determine a matching result, the access procedure template is determined based on the authentication mode of the foreground wireless access point, and the access procedure template includes an access procedure ; 当所述匹配结果为接入完成时,将接收到的所述发送端的数据转发至所述目标无线接入点进行处理。When the matching result is that the access is completed, the received data of the sending end is forwarded to the target wireless access point for processing. 2.根据权利要求1所述的方法,其特征在于,所述解析结果包括发送端地址,所述将所述当前接入步骤与接入过程模板进行匹配,确定匹配结果,包括:2. The method according to claim 1, wherein the parsing result includes the address of the sender, and matching the current access step with the access process template to determine the matching result comprises: 获取所述发送端地址对应的接入状态数据,所述接入状态数据包括所述发送端已完成的接入步骤;Obtain access status data corresponding to the address of the sender, where the access status data includes access steps completed by the sender; 将所述已完成的接入步骤与所述接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤;Matching the completed access steps with the access process template to determine the next access step of the last completed access step; 将所述当前接入步骤与确定出的下一接入步骤进行匹配,确定所述匹配结果。Matching the current access step with the determined next access step to determine the matching result. 3.根据权利要求2所述的方法,其特征在于,所述将所述当前接入步骤与确定出的下一接入步骤进行匹配,确定所述匹配结果,包括:3. The method according to claim 2, wherein the matching the current access step with the determined next access step and determining the matching result comprises: 当所述当前接入步骤与确定出的下一接入步骤匹配时,向所述发送端发送接入响应并更新所述接入状态数据。When the current access step matches the determined next access step, send an access response to the sending end and update the access state data. 4.根据权利要求2所述的方法,其特征在于,所述将所述当前接入步骤与确定出的下一接入步骤进行匹配,确定所述匹配结果,包括:4. The method according to claim 2, wherein the matching the current access step with the determined next access step to determine the matching result comprises: 当所述当前接入步骤与确定出的下一接入步骤不匹配时,将所述发送端地址加入黑名单并忽略所述接入请求。When the current access step does not match the determined next access step, adding the sender address to a blacklist and ignoring the access request. 5.根据权利要求2所述的方法,其特征在于,所述解析结果还包括接收端地址,所述将所述已完成的接入步骤与所述接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤的步骤之前,包括:5. The method according to claim 2, wherein the parsing result further includes the address of the receiving end, and the matching of the completed access steps with the access process template determines the last completed access procedure template. Complete the access step prior to the next access step step, including: 将所述接收端地址与所述接入状态数据中的接收端地址进行比较;comparing the receiving end address with the receiving end address in the access state data; 当所述接收端地址与所述接入状态数据中的接收端地址一致时,执行将所述已完成的接入步骤与所述接入过程模板进行匹配,确定最后一个已完成的接入步骤的下一接入步骤的步骤。When the address of the receiving end is consistent with the address of the receiving end in the access status data, matching the completed access steps with the access process template to determine the last completed access step Step of the next access step. 6.根据权利要求2所述的方法,其特征在于,所述获取所述发送端地址对应的接入状态数据,包括:6. The method according to claim 2, wherein said obtaining the access status data corresponding to the sender address comprises: 利用所述发送端地址查询是否存在对应的接入状态数据;Querying whether there is corresponding access state data by using the sender address; 当不存在对应的接入状态数据时,建立所述发送端地址对应的接入状态数据,并向所述发送端发送响应帧,以获得下一个接入步骤;When there is no corresponding access state data, establish the access state data corresponding to the sender address, and send a response frame to the sender to obtain the next access step; 当存在对应的接入状态数据时,提取所述发送端地址对应的接入状态数据。When there is corresponding access state data, the access state data corresponding to the sender address is extracted. 7.根据权利要求1所述的方法,其特征在于,所述接入过程模板的确定方式包括:7. The method according to claim 1, wherein the method for determining the access process template comprises: 获取所述前台无线接入点的认证方式;Obtain the authentication mode of the foreground wireless access point; 基于所述认证方式的流程,采用键值对的方式建立所述接入过程模板。Based on the flow of the authentication mode, the access process template is established in the form of a key-value pair. 8.一种无线接入的检测装置,其特征在于,应用于前台无线接入点,所述前台无线接入点与目标无线接入点对应设置,所述装置包括:8. A detection device for wireless access, characterized in that it is applied to a wireless access point in the foreground, the wireless access point in the foreground is set correspondingly to the target wireless access point, and the device includes: 接收模块,用于接收发送端发送的接入请求;The receiving module is used to receive the access request sent by the sending end; 解析模块,用于对所述接入请求进行解析确定解析结果,所述解析结果包括当前接入步骤;An analysis module, configured to analyze the access request to determine an analysis result, the analysis result including the current access step; 匹配模块,用于将所述当前接入步骤与接入过程模板进行匹配,确定匹配结果,所述接入过程模板是基于所述前台无线接入点的认证方式确定的,所述接入过程模板包括接入步骤;A matching module, configured to match the current access step with an access process template to determine a matching result, the access process template is determined based on the authentication mode of the foreground wireless access point, and the access process The template includes access steps; 转发模块,用于当所述匹配结果为接入完成时,将接收到的所述发送端的数据转发至所述目标无线接入点进行处理。A forwarding module, configured to forward the received data of the sending end to the target wireless access point for processing when the matching result is that the access is completed. 9.一种电子设备,其特征在于,包括:9. An electronic device, characterized in that it comprises: 存储器和处理器,所述存储器和所述处理器之间互相通信连接,所述存储器中存储有计算机指令,所述处理器通过执行所述计算机指令,从而执行权利要求1-7中任一项所述的无线接入的检测方法。A memory and a processor, the memory and the processor are connected in communication with each other, computer instructions are stored in the memory, and the processor performs any one of claims 1-7 by executing the computer instructions The wireless access detection method. 10.一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机指令,所述计算机指令用于使计算机执行权利要求1-7中任一项所述的无线接入的检测方法。10. A computer-readable storage medium, wherein the computer-readable storage medium stores computer instructions, and the computer instructions are used to make a computer perform the wireless access according to any one of claims 1-7 detection method.
CN202210901623.0A 2022-07-28 2022-07-28 Wireless access detection method, device, electronic device and storage medium Active CN115484600B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210901623.0A CN115484600B (en) 2022-07-28 2022-07-28 Wireless access detection method, device, electronic device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210901623.0A CN115484600B (en) 2022-07-28 2022-07-28 Wireless access detection method, device, electronic device and storage medium

Publications (2)

Publication Number Publication Date
CN115484600A true CN115484600A (en) 2022-12-16
CN115484600B CN115484600B (en) 2024-12-10

Family

ID=84421853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210901623.0A Active CN115484600B (en) 2022-07-28 2022-07-28 Wireless access detection method, device, electronic device and storage medium

Country Status (1)

Country Link
CN (1) CN115484600B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1645826A (en) * 2004-07-05 2005-07-27 华为技术有限公司 Method for building session connection to wireless local network user
US20060179475A1 (en) * 2003-03-14 2006-08-10 Junbiao Zhang Flexible wlan access point architecture capable of accommodating different user devices
CN107979838A (en) * 2017-11-27 2018-05-01 新华三技术有限公司 A kind of radio switch-in method, device, access point apparatus and storage medium
CN108012269A (en) * 2017-12-08 2018-05-08 新华三技术有限公司 A kind of radio switch-in method, device and equipment
CN113727345A (en) * 2021-08-30 2021-11-30 展讯半导体(成都)有限公司 Wireless network connection access control method, device, storage medium and terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060179475A1 (en) * 2003-03-14 2006-08-10 Junbiao Zhang Flexible wlan access point architecture capable of accommodating different user devices
CN1645826A (en) * 2004-07-05 2005-07-27 华为技术有限公司 Method for building session connection to wireless local network user
CN107979838A (en) * 2017-11-27 2018-05-01 新华三技术有限公司 A kind of radio switch-in method, device, access point apparatus and storage medium
CN108012269A (en) * 2017-12-08 2018-05-08 新华三技术有限公司 A kind of radio switch-in method, device and equipment
CN113727345A (en) * 2021-08-30 2021-11-30 展讯半导体(成都)有限公司 Wireless network connection access control method, device, storage medium and terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
侯惠芳;季新生;刘光强;: "异构无线网络中基于标识的匿名认证协议", 通信学报, no. 05, 25 May 2011 (2011-05-25) *

Also Published As

Publication number Publication date
CN115484600B (en) 2024-12-10

Similar Documents

Publication Publication Date Title
US11825303B2 (en) Method for performing verification by using shared key, method for performing verification by using public key and private key, and apparatus
US11159361B2 (en) Method and apparatus for providing notification of detected error conditions in a network
US9843575B2 (en) Wireless network authentication method and wireless network authentication apparatus
CN109688586B (en) Network function authentication method and device and computer readable storage medium
TWI388180B (en) Key generation in a communication system
EP3021549B1 (en) Terminal authentication apparatus and method
CN107483383B (en) Data processing method, terminal, background server and storage medium
WO2023280194A1 (en) Network connection management method and apparatus, readable medium, program product, and electronic device
CN101032107A (en) Method and system for fast roaming of a mobile unit in a wireless network
CN115499177A (en) Cloud desktop access method, zero-trust gateway, cloud desktop client and server
CN112954683B (en) Domain name resolution method, domain name resolution device, electronic equipment and storage medium
Schepers et al. Framing Frames: Bypassing {Wi-Fi} Encryption by Manipulating Transmit Queues
WO2021147369A1 (en) Message verification method and apparatus
Jain et al. ETGuard: detecting D2D attacks using wireless evil twins
CN111901116B (en) Identity authentication method and system based on EAP-MD5 improved protocol
CN1954580B (en) Methods and apparatus managing access to virtual private network for portable devices without VPN client
US20250300824A1 (en) Key authentication method, electronic device, and storage medium
Hafiz et al. Profiling and mitigating brute force attack in home wireless LAN
Hanna et al. Integrating post-quantum tls into the control plane of 5g networks
EP4221078A1 (en) Packet processing method and apparatus
CN100544348C (en) proxy detection method
CN115484600B (en) Wireless access detection method, device, electronic device and storage medium
CN111586017A (en) Communication user authentication method and device
CN105681364A (en) Enhanced binding based anti-attack method of IPv6 mobile terminal
CN116319935B (en) Asymmetric application identification detection on switches

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant