System and method for wireless local area network monitoring...

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000

Reexamination Certificate

active

07448073

ABSTRACT:
Systems and methods for managing network traffic from an unknown wireless device on a computer network are presented. A security component residing in a wired area of the computer network is configured to passively monitor network traffic from a wireless area of the computer network for network traffic from an unknown wireless device. Upon detecting network traffic from an unknown wireless device, the security component probes the unknown wireless device to determine at least one characteristic of the wireless device. After probing the device, the security component generates a device profile of the unknown wireless device according to the at least one determined characteristic. Access privileges are determined to give to the unknown wireless device according to the determined profile and activities exhibited by the wireless device. Thereafter, network traffic from the unknown wireless device is permitted to pass to the computer network according to the determined access privileges.

REFERENCES:
patent: 6279113 (2001-08-01), Vaidya
patent: 6408391 (2002-06-01), Huff
patent: 6560611 (2003-05-01), Nine
patent: 6754488 (2004-06-01), Won
patent: 7020476 (2006-03-01), Day
patent: 7068998 (2006-06-01), Zavidniak
patent: 7069438 (2006-06-01), Balabine
patent: 7277404 (2007-10-01), Tanzella
patent: 7295524 (2007-11-01), Gray
patent: 7340768 (2008-03-01), Rosenberger
patent: 2003/0120934 (2003-06-01), Ortiz
patent: 2003/0217283 (2003-11-01), Hrastar
patent: 2003/0217289 (2003-11-01), Ammon
patent: 2004/0003285 (2004-01-01), Whelan
patent: 2004/0008652 (2004-01-01), Tanzella
patent: 2004/0034773 (2004-02-01), Balabine
patent: 2004/0098610 (2004-05-01), Hrastar
patent: 2004/0121787 (2004-06-01), Day
patent: 2004/0157624 (2004-08-01), Hrastar
patent: 2004/0209634 (2004-10-01), Hrastar
patent: 2004/0210654 (2004-10-01), Hrastar
patent: 2004/0215957 (2004-10-01), Moineau
patent: 2004/0252837 (2004-12-01), Harvey et al.
patent: 1039689 (2000-09-01), None
patent: 1760611 (2007-03-01), None
patent: 00/34867 (2000-06-01), None
patent: 00/70458 (2000-11-01), None
patent: 01/71499 (2001-09-01), None
patent: 02/082730 (2002-10-01), None
patent: 03/100559 (2003-12-01), None
patent: 2004/017552 (2004-02-01), None
patent: 2004/062160 (2004-07-01), None
patent: WO 2004/092925 (2004-10-01), None
patent: 2004/095192 (2004-11-01), None
patent: 2005/024598 (2005-03-01), None
Asaka, M., “Information Gathering With Mobile Agents for an Intrusion Detection System,” Systems and Computers in Japan 30(2):31-37, 1999.
Denning, D.E., “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering SE-13(2):222-232, Feb. 1987.
Goan, T., “A Cop on the Beat: Collecting and Appraising Intrusion,” Communications of the ACM 42(7):46-52, Jul. 1999.
Kluepfel, H.M., “Foiling the Wiley Hacker: More Than Analysis and Containment,” Proceedings of the Annual IEEE International Carnahan Conference on Security Technology (1989 ICCST), Zurich, Oct. 3-5, 1989, pp. 15-21.
Labuschagne, L., and J.H.P. Eloff, “The Use of Real-Time Risk Analysis to Enable Dynamic Activation of Countermeasures,” Computers & Security 17(4):347-357, 1998.
Lin, L.-M., “A Case Study on Hunting a Brilliant Hacker,” Proceedings of the 25th Annual IEEE International Conference on Security Technolgy, Taipei, Oct. 1-3, 1991, pp. 177-180.
McKosky, R.A., and S.G. Shiva, “A File Integrity Checking System to Detect and Recover From Program Modification Attacks in Multi-User Computer Systems,” Computers & Security 9(5):431-446, 1990.
Snapp, S.R., et al., “DIDS (Distribution Intrusion Detection System): Motivation, Architecture, and an Early Prototype,” Proceedings of the 14th National Computer Security Conference, Washington, D.C., Oct. 1991, pp. 167-176, <http://seclab.cs.ucdavis.edu/papers/DIDS.ncsc91.pdf>.
Stoll, C., “Stalking the Wily Hacker,” Communications of the ACM 31(5):484-497, May 1988.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for wireless local area network monitoring... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for wireless local area network monitoring..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for wireless local area network monitoring... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4032474

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.