Apparatus for analyzing vulnerability of wireless local area network
    2.
    发明授权
    Apparatus for analyzing vulnerability of wireless local area network 有权
    用于分析无线局域网的脆弱性的装置

    公开(公告)号:US09100429B2

    公开(公告)日:2015-08-04

    申请号:US14033654

    申请日:2013-09-23

    Abstract: Disclosed herein is an apparatus for analyzing the vulnerability of a wireless local area network (LAN). The apparatus includes a collection unit, an analysis unit, and an attack unit. The collection unit collects packets transmitted and received in a wireless LAN service. The analysis unit analyzes the state of a network using the collected packets. The attack unit makes a wireless attack against an attack target using the state of the network, and controls the mode switching of a device driver based on an operating mode.

    Abstract translation: 本文公开了一种用于分析无线局域网(LAN)的脆弱性的装置。 该装置包括收集单元,分析单元和攻击单元。 收集单元收集在无线LAN服务中发送和接收的分组。 分析单元使用收集的分组来分析网络的状态。 攻击单元使用网络的状态对攻击目标进行无线攻击,并且基于操作模式来控制设备驱动程序的模式切换。

    Apparatus and method for identifying rogue device
    3.
    发明授权
    Apparatus and method for identifying rogue device 有权
    用于识别流氓设备的装置和方法

    公开(公告)号:US09420469B2

    公开(公告)日:2016-08-16

    申请号:US14540384

    申请日:2014-11-13

    CPC classification number: H04W12/08 H04W12/12 H04W88/08

    Abstract: An apparatus and a method for identifying a rogue device having a media access control (MAC) address counterfeited/forged when a wireless intrusion prevention system controls an access to an access point (AP) and a wireless terminal which are not applied are disclosed. The apparatus includes: a sensor unit configured to collect MAC addresses, RSSI values, and RF feature values based on RF signals of wireless terminals; an RF feature database configured to store the collected MAC addresses, RSSI values, and RF feature values; and a terminal identification unit configured to identify whether a MAC of any one of the wireless terminals is forged by comparing information of the RF feature database with the RSSI value and the RF feature value of any one of the wireless terminals according to a MAC verification request of any one of the wireless terminals from the sensor unit.

    Abstract translation: 公开了一种用于识别当无线入侵防御系统控制对未应用的接入点(AP)和无线终端的接入时伪造/伪造的具有媒体访问控制(MAC)地址的流氓设备的装置和方法。 该装置包括:传感器单元,被配置为基于无线终端的RF信号收集MAC地址,RSSI值和RF特征值; RF特征数据库,被配置为存储所收集的MAC地址,RSSI值和RF特征值; 以及终端识别单元,被配置为通过根据MAC验证请求将RF特征数据库的信息与RSSI值和任何一个无线终端的RF特征值进行比较来识别无线终端中的任何一个的MAC是否被伪造 从传感器单元的任何一个无线终端。

Patent Agency Ranking