Cloaked device scan

A technology of equipment and physical equipment, applied in the system field of the target equipment, can solve the problems of no cost efficiency, expensive time density, not user friendly, etc.

Inactive Publication Date: 2007-11-14
ACCENTURE GLOBAL SERVICES LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing commercial products require the relocation of a device or proxy on each local segment of the network and are not cost effective for large networks with multiple remote locations
Also, more products on the market only utilize traffic information from switches or routers on the local segment, if so
Such a situation can be used to monitor traffic (but can be expensive), time density in setup and training, and is generally not user friendly from a network scanning point of view

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloaked device scan
  • Cloaked device scan
  • Cloaked device scan

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Aspects of the invention allow passive monitoring of network devices by collecting available data from routers and switches connected to the network. Figure 1 depicts a simplified example network upon which the present invention can be utilized. Network 100 may have multiple routers 110 , 130 , 142 , 144 and 150 , and multiple switches 120 and 160 attached to it. The network may be a local area network (LAN) with discrete subnets, or may be multiple LANs, such as network 140 separated by wide area network (WAN) 170 . Figure 1 is a simplified example of an extended and complex enterprise network, with examples of the many types of equipment that can be utilized. For example, the present invention may be used to locate targeted or unauthorized laptops 136 and 146 , desktops 124 , 152 , and 164 , wireless access point 114 , network bridge 134 , or gaming device 166 . FIG. 1 also illustrates the breadth of networking technologies that can be utilized, such as Ethernet bac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention described herein provides a method and system for the detection and location of unauthorized or otherwise targeted network devices on a network. According to aspects of the invention, the method disclosed herein consists of gathering a logical mapping of the devices on a computer network (which can be faked, spoofed or easily hidden) by mining data from the routers and switches on the network, and matching the logical mapping of the devices to the physical reality of the network environment which can't be easily hidden or spoofed. Based on the physical information acquired about the devices on the network, it is possible to identify devices that are either unauthorized or are otherwise targeted.

Description

technical field [0001] The present invention relates to systems and methods for locating unauthorized or other target devices on a network by using passive scanning, utilizing available information from switches and routers. Background technique [0002] Networks and enterprise systems are becoming increasingly distributed and complex. From a network management standpoint, this means that network devices are increasingly difficult to keep track of and manage from a central location. In addition, computers and other network devices are now equipped with additional capabilities, such as built-in firewalls and network address translation (NAT), which make it impossible to manage security settings on devices connected to the network. [0003] In an enterprise environment, network managers typically attempt to keep workstations and other network devices updated and protected with one or more of the various anti-virus capabilities available. However, viruses and worms crop up on...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/12
CPCH04L63/1441H04L63/20H04L63/1433
Inventor 罗伯特·约翰·布里姆
Owner ACCENTURE GLOBAL SERVICES LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products