Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Automated sniffer apparatus and method for monitoring computer systems for unauthorized access

a computer system and sniffer technology, applied in the field of wireless computer networking techniques, can solve the problems of affecting the security of the system, unable to contain radio waves in the physical space, and a variety of security threats, so as to prevent unauthorized wireless access to local area computer networks, facilitate use, and minimize human effort

Inactive Publication Date: 2008-05-08
AIRTIGHT NETWORKS
View PDF50 Cites 66 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0016] Certain advantages and / or benefits may be achieved using the present invention. For example, the present technique provides an easy to use process that relies upon conventional computer hardware and software technologies. In some embodiments, the method and system are fully automated and can be used to prevent unauthorized wireless access of local area computer networks. The automated operation minimizes the human effort required during the system operation and improves the system response time and accuracy. In some embodiments, the method and system advantageously reduce or eliminate the false positives on intrusion events thereby eliminating the nuisance factor during the system operation. This is because the technique of the invention intelligently distinguishes between unauthorized APs and external APs, the latter usually being the source of false positives. According to specific embodiment, the invention provides for standalone appliance implementation of intrusion detection system thereby providing intrusion detection solution at a low cost and at a low or no other network management infrastructure requirement. This is particularly advantageous for smaller network installations such as those in small offices, coffee shops, house, apartment, etc. Additionally, the invention is compatible with conventional wireless and wired networking technologies without substantial modifications to conventional equipment and processes according to a specific embodiment. Depending upon the embodiment, one or more of these benefits may be achieved. These and other benefits will be described in more throughout the present specification and more particularly below.

Problems solved by technology

Although much progress occurred with computers and networking, we now face a variety of security threats on many computing environments from the hackers connected to the computer network.
Unfortunately, certain limitations still exist with WiFi.
That is, the radio waves often cannot be contained in the physical space bounded by physical structures such as the walls of a building.
Hence, wireless signals often spill outside the area of interest.
Consequently, the conventional security measure of controlling access to the physical space where the LAN connection ports are located is now inadequate.
Despite these measures, many limitations still exist.
The unauthorized AP creates a security vulnerability.
The unauthorized AP allows wireless intruders to connect to the LAN through itself.
Soft APs, ad hoc networks, and misconfigured APs connected to the LAN also pose similar threats.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
  • Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
  • Automated sniffer apparatus and method for monitoring computer systems for unauthorized access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] According to the present invention, techniques for wireless computer networking are provided. More particularly, the invention provides a sniffer apparatus and method for providing intrusion detection for local area wireless networks according to a specific embodiment. Merely by way of example, the invention has been applied to a computer networking environment based upon the IEEE 802.11 family of standards, commonly called “WiFi.” But it would be recognized that the invention has a much broader range of applicability. For example, the invention can be applied to UWB, WiMAX (802.16), Bluetooth, and others.

[0031]FIG. 1 shows the LAN architecture that supports the intrusion detection according to one embodiment of the invention. This diagram is merely an example, which should not unduly limit the scope of the claims herein. One of ordinary skill in the art would recognize other variations, modifications, and alternatives. As shown in FIG. 1, the core transmission infrastructur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An apparatus for wireless communication including an automated intrusion detection process is provided. The apparatus has a portable housing, which may have a length no greater than 1 meter, a width no greater than 1 meter, and a height of no greater than 1 meter. A processing unit (e.g., CPU) is within the housing. One or more wireless network interface devices are within the housing and are coupled to the processing unit. The apparatus has an Ethernet (or like) network interface device within the housing and coupled to the processing unit. A network connector is coupled to the Ethernet network device. One or more memories are coupled to the processing unit. A code is directed to perform a process for detection of a wireless activity within a selected local geographic region. According to a specific embodiment, the wireless activity is derived from at least one authorized device or at least an other device. A code is directed to receiving at least identity information associated with the wireless activity from the detection process in a classification process. A code is directed to labeling the identity information into at least one of a plurality of categories in the classification process. Depending upon the embodiment, other codes may exist to carry out the functionality described herein.

Description

CROSS-REFERENCE TO RELATED APPLICATIONS [0001] This present application claims priority to U.S. Provisional Application No. 60 / 543,632, titled “An Automated Method and an RF Sensor System for Wireless Unauthorized Transmission, Intrusion Detection and Prevention,” filed Feb. 10, 2004, commonly assigned, and hereby incorporated by reference for all purposes. [0002] This present application is also related to U.S. Ser. No. ______ (Attorney Docket Number 022384-000610US______) filed on the same date, commonly assigned, and hereby incorporated by reference for all purposes, which claims priority to U.S. Provisional Application No. 60 / 543,632, titled “An Automated Method and an RF Sensor System for Wireless Unauthorized Transmission, Intrusion Detection and Prevention,” filed Feb. 10, 2004, commonly assigned, and hereby incorporated by reference for all purposes.BACKGROUND OF THE INVENTION [0003] The present invention relates generally to wireless computer networking techniques. More par...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F11/00H04L12/28H04L29/06H04W12/12
CPCH04L12/2602H04L43/00H04L63/1416H04W12/08G06F21/55H04L69/16H04L69/161H04L69/163H04W12/00H04W12/12H04W12/03H04W12/069H04W12/088H04W12/102H04W12/122
Inventor BHAGWAT, PRAVINGOGATE, SHANTANUKING, DAVID C.
Owner AIRTIGHT NETWORKS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products