Supercharge Your Innovation With Domain-Expert AI Agents!

A method, apparatus and software product for detecting rogue access points in a wireless network

A wireless network, deceptive technology, used in the direction of security devices, wireless communications, electrical components, etc.

Inactive Publication Date: 2006-08-23
CISCO TECH INC
View PDF1 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the rogue AP may be a device installed in an adjacent location, detection methods requiring a wired connection may not always be successful

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, apparatus and software product for detecting rogue access points in a wireless network
  • A method, apparatus and software product for detecting rogue access points in a wireless network
  • A method, apparatus and software product for detecting rogue access points in a wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] A method for detecting rogue access points, including rogue and non-rogue access points, is described here. The invention will be described in the context of the IEEE 802.11 standard for WLANs. However, the present invention is not limited to WLANs conforming to the IEEE 802.11 standard.

[0031] managed wireless network

[0032] One embodiment of the present invention operates in a managed wireless network where APs and their clients are managed by a central management entity. Depending on size and complexity, the managed network is either a set of APs with a central control entity, or a hierarchical structure with a set of hierarchical control domains. Each control domain is managed by a management entity which we call a manager here. The number of levels in the hierarchical hierarchy depends on the complexity and / or size of the network, such that not all managed networks have all levels of control. For example, a simple managed network may have only one level of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method further includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received, the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if the MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.

Description

[0001] Related Patent Applications [0002] This application claims priority to U.S. Provisional Patent Application Serial No. 60 / 490,847, Docket / Reference No. CISCO-8125P, Inventor Tolson et al., entitled "A METHOD, APPARATUS, AND SOFTWARE PRODUCT FORDETECTING ROGUE ACCESS POINTS IN A WIRELESS NETWORK" rights, this patent application has been assigned to the assignee of the present invention and is incorporated herein by reference. [0003] This invention is related to copending U.S. Patent Application Serial No. 10 / 629,384, docket / reference number CISCO-7391, inventor to Kaiser et al., entitled "RADIOLOCATION USING A PATH LOSS DATA," which is assigned to the present invention assignee, which is hereby incorporated by reference. technical field [0004] The present invention relates to wireless networks, and more particularly to network security and detection of rogue access points in infrastructure wireless networks. Background technique [0005] The use of wireless netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/28H04L29/06H04W12/12
CPCH04W12/12H04L63/1433H04W12/122
Inventor 蒂莫西·S·欧尔森达瑞尔·A·凯瑟尔佩曼·D·罗珊
Owner CISCO TECH INC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More