FIELD: detecting attacks on wireless networks.
SUBSTANCE: in the method, control commands are additionally transmitted from the application servers to the analysing devices via a computer network to start the detection of unauthorized and fake access points together with the transfer of data on the parameters of the protected access points that were previously entered into the databases, after scanning the airwaves by the analysing devices throughout range of Wi-Fi frequencies and capturing packets from the air, the parameters of access points present on the air are selected, the selected parameters are compared with the parameters of the access points to be protected, received from application servers, and, if the access points present on the air have a unique identifier and/ or network name equivalent to the unique identifier and/or network name of the access points to be protected, but other parameters of the access points present on the air do not match the parameters of the access points to be protected, then the analysing device generates a fake access point detection event.
EFFECT: reducing the time period for detecting unauthorized and fake access points, increasing the invisibility of actions to detect unauthorized and fake access points.
1 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD AND SYSTEM FOR COLLECTING USER DEVICE IDENTIFIERS IN FORM OF MAC ADDRESSES | 2021 |
|
RU2765980C1 |
WIRELESS COMMUNICATION METHOD AND SYSTEM | 2019 |
|
RU2724132C1 |
SYSTEM AND METHOD FOR COMMUNICATION MEANS IDENTIFICATION AND CONTROL | 2017 |
|
RU2691191C2 |
METHOD AND SYSTEM SEARCHING WIRELESS ACCESS POINTS APPROVED BY DEVICE | 2014 |
|
RU2592387C2 |
METHOD FOR GOODS PROMOTION TO BUYERS BASED ON ANALYSIS OF DATA AND USER ACTIONS RECORDED BY AN INTERACTIVE MIRROR | 2018 |
|
RU2686033C1 |
INTERACTION AND INTEGRATION OF VARIOUS NETWORKS OF RADIO ACCESS | 2015 |
|
RU2669780C2 |
METHOD AND APPARATUS FOR SHARING CONNECTION SETTINGS VIA SOCIAL NETWORKS | 2011 |
|
RU2574817C2 |
METHOD AND SYSTEM FOR DETERMINING FACT OF USER VISITING A POINT OF INTEREST | 2020 |
|
RU2767958C2 |
METHODS, TERMINALS AND SYSTEMS FOR FACILITATING DATA SHARING | 2013 |
|
RU2604812C2 |
METHOD OF LOCATING LOST ELECTRONIC DEVICES | 2011 |
|
RU2480949C1 |
Authors
Dates
2023-12-21—Published
2023-09-28—Filed