yl23455永利(中国)有限公司

Wireless Scheme Position:Home » Solutions » Wireless Scheme
Simple, convenient and safe operation is always a double-edged sword, and WLAN (WirelessLAN) is a typical representative of this kind of applications. WLAN business office, business development will bring great convenience at the same time, all kinds of threats can not be ignored, and the complexity of many uncontrollable factors: a mobile phone can become a wireless network access point, can easily build a deception environment; notebook computer inappropriate wireless configuration may reveal some useful information in imperceptibly such as wireless, wireless, wireless session hijacking, phishing attacks such as proxy Lvjian newspapers.
 
 
WLAN security risk analysis
Password cracking: now crack WEP and WPA tools have a high degree of integration, wireless network password cracking technology is more and more low threshold, so it is easy to single authentication has been cracked, caused by the leakage of internal information resources.
Data leakage: due to the openness of the wireless network, through wireless sniffer, wireless monitoring, wireless session hijacking and other ways to steal email user name and password, the POP3 server and the SMTP server IP address. The internal information system will be completely exposed in front of the hacker.
Phishing: phishing attacks using the same SSID can result in the use of wireless Internet users to be fooled into taking user data.
Wireless denial of service attacks: wireless denial of service attacks can cause wireless signals to be found, wireless networks, or wireless systems. The wireless network department will eventually be available.

Solution
Self defense security principle
From the above security risks, it can be concluded that wireless security attacks are not controllable boundaries, and will happen at any time and anywhere. In the face of the risk, only to the same principles and processes to solve. XXXWLAN self defense security system is a set of wireless security self defense system, which is based on the concept of security and concept. The security problem of the system mainly focuses on the WLAN interface, and the implementation of WLAN service network protection solutions of WLAN network intrusion detection, the main principle of security system mainly includes three parts:
1.able to control classified networks, usually WLAN network signals and devices are not allowed to access.
 
 
2.In a WLAN network area, the legitimate AP, rogue AP (phishing AP), external AP, and rogue AP can be identified and blocked.
 
3.pairs of legitimate AP, able to identify legitimate, illegal terminal connections, and illegal terminal blocking it.
 
By deploying an illegal device detection function in an existing WLAN network, you can monitor the abnormal equipment in the entire WLAN network, and you can attack the illegal equipment as needed.

Wireless intelligent security defense
Intelligent security defense is based on the premise of illegal device detection. Device detection first detects the surrounding wireless signals and messages through device detection, and then creates the detected device information by analyzing the signals and messages.
Fishing AP is found in the range of wireless network monitoring. The device will suppress the performance of phishing AP by way of denial of service, while launching offline frames to the client, allowing the user to go offline under phishing AP, allowing users to connect to legitimate users.
When a wireless crack attack is found in the wireless network monitoring range, the detection system will collect a large number of data frames for wireless cracking, which is used to discover the source of wireless crack attack. An intelligent defense system initiates a special frame of data from an attack source, causing the crack tool to stop working. Wireless attack against protection.
When a wireless denial of service attack is found in the wireless network surveillance range, the smart defense system will initiate data frames against the type of denial of service attack to suppress the effectiveness of denial of service attacks. Reduce the impact of denial of service attacks.
 
Wireless intrusion detection
Intrusion detection is mainly to detect the intentional or unintentional attack in WLAN network, and notify the network manager by recording information or log. According to the results of intrusion detection, network managers can adjust the network configuration in time, remove the insecurity factors of WLAN network, and ensure the WLAN network no longer be attacked.
Intrusion detection mainly includes 802.11 message Flood attack detection, AP Spoof detection and Weak IV detection, and Flood attack detection can be detected according to different types of message.

Highly accurate positioning
To identify the location of the mobile device through the wireless signal communication of mobile devices and wireless network access point three, due to the different mobile devices from three wireless access points in the distance, so the reflected radio signal intensity of the mobile device in the wireless access point will have the difference, through the difference algorithm, can accurate determine the location of items or positioning equipment.
Triangular ToA positioning is usually said, advantages of triangulation is a simple calculation, no need to learn a complex process, but its shortcomings are obvious, there is a strong reflection in the ring in the indoor environment, influence of wireless multipath effect on the positioning accuracy is very large, because the ToA positioning technology is generally used in outdoor in the area, can reach the accuracy of 10 meters.
 
Customer benefit
XXXWLAN security self defense solutions can be applied to corporate offices, hospitals, retail stores, production plants, warehouses, educational institutions, financial institutions, local and national government departments. It supports a wide range of WLAN applications, including mobile healthcare, inventory management, retail POS, video surveillance, real-time data access, asset tracking and network viewing. In the complex wireless network applications and wired network interactive transmission, to ensure data reliability, validity and confidentiality.

  

Solutions

© 2000-2024 Suzhou HuaSu Info-Tech Co., Ltd.   |   Su ICP 16051456号-1

              Technical support:HUICHENG

Online
Baidu
sogou