System and method for wireless local area network monitoring...

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000

Reexamination Certificate

active

07849500

ABSTRACT:
Systems and methods for providing improved network security against unauthorized wireless devices are presented. A security component within in a wired portion of a computer network is provided. The security component is configured to control the bridging of network activity between the wireless portion and wired portion of the computer network. Using the security component, network traffic between the wireless and wired portions of the computer network for unknown wireless devices is passively monitored. Upon network traffic between the wireless and wired portions of the computer network for an unknown wireless device, the security component determines at least one identifying characteristic of the unknown wireless device by actively probing the device for an identifying characteristic. The security component determines at least one behavioral characteristic of the device according to the network traffic between the device and devices in the wired portion of the computer network. A device profile for the unknown wireless device is generated according to the identifying and behavioral characteristics, access privileges corresponding to the unknown wireless device according to the device profile are determined, and network traffic from the unknown wireless device is permitted to pass to the computer network according to the determined access privileges.

REFERENCES:
patent: 6279113 (2001-08-01), Vaidya
patent: 6408391 (2002-06-01), Huff
patent: 6560611 (2003-05-01), Nine
patent: 6754488 (2004-06-01), Won
patent: 7020476 (2006-03-01), Day
patent: 7042852 (2006-05-01), Hrastar
patent: 7058796 (2006-06-01), Lynn et al.
patent: 7068998 (2006-06-01), Zavidniak
patent: 7069438 (2006-06-01), Balabine
patent: 7086089 (2006-08-01), Hrastar et al.
patent: 7257107 (2007-08-01), Swier et al.
patent: 7277404 (2007-10-01), Tanzella et al.
patent: 7295524 (2007-11-01), Gray
patent: 7322044 (2008-01-01), Hrastar
patent: 7324804 (2008-01-01), Hrastar et al.
patent: 7340768 (2008-03-01), Rosenberger
patent: 7355996 (2008-04-01), Hrastar
patent: 7359676 (2008-04-01), Hrastar
patent: 7383577 (2008-06-01), Hrastar et al.
patent: 7448073 (2008-11-01), Rosenberger
patent: 7522908 (2009-04-01), Hrastar
patent: 7526808 (2009-04-01), Lynn et al.
patent: 7532895 (2009-05-01), Hrastar
patent: 7577424 (2009-08-01), Sinha et al.
patent: 2003/0120934 (2003-06-01), Ortiz
patent: 2003/0217283 (2003-11-01), Hrastar
patent: 2003/0217289 (2003-11-01), Ammon
patent: 2004/0003285 (2004-01-01), Whelan
patent: 2004/0008652 (2004-01-01), Tanzella
patent: 2004/0034773 (2004-02-01), Balabine
patent: 2004/0098610 (2004-05-01), Hrastar
patent: 2004/0121787 (2004-06-01), Day
patent: 2004/0157624 (2004-08-01), Hrastar
patent: 2004/0209634 (2004-10-01), Hrastar
patent: 2004/0210654 (2004-10-01), Hrastar
patent: 2004/0215957 (2004-10-01), Moineau
patent: 2004/0252837 (2004-12-01), Harvey
patent: 1039689 (2000-09-01), None
patent: 1760611 (2007-03-01), None
patent: 00/34867 (2000-06-01), None
patent: 00/70458 (2000-11-01), None
patent: 01/71499 (2001-09-01), None
patent: 02/082730 (2002-10-01), None
patent: 03/100559 (2003-12-01), None
patent: 2004/017552 (2004-02-01), None
patent: 2004/062160 (2004-07-01), None
patent: 2004/092925 (2004-10-01), None
patent: 2004/095192 (2004-11-01), None
patent: 2005/024598 (2005-03-01), None
Asaka, M., “Information Gathering With Mobile Agents for an Intrusion Detection System,” Systems and Computers in Japan 30(2):31-37, 1999.
Denning, D.E., “An Intrusion-Detection Model,” IEEE Transactions on Software Engineering SE-13(2):222-232, Feb. 1987.
Goan, T., “A Cop on the Beat: Collecting and Appraising Intrusion,” Communications of the ACM 42(7):46-52, Jul. 1999.
Kluepfel, H.M., “Foiling the Wiley Hacker: More Than Analysis and Containment,” Proceedings of the Annual IEEE International Carnahan Conference on Security Technology (1989 ICCST), Zurich, Oct. 3-5, 1989, pp. 15-21.
Labuschagne, L., and J.H.P. Eloff, “The Use of Real-Time Risk Analysis to Enable Dynamic Activation of Countermeasures,” Computers & Security 17(4):347-357, 1998.
Lin, L.-M., “A Case Study on Hunting a Brilliant Hacker,” Proceeding of the 25th Annual IEEE International Conference on Security Technolgy, Taipei, Oct. 1-3, 1991, pp. 177-180.
McKosky, R.A., and S.G. Shiva, “A File Integrity Checking System to Detect and Recover From Program Modification Attacks in Multi-User Computer Systems,” Computers & Security 9(5):431-446, 1990.
Snapp, S.R., et al., “DIDS (Distribution Intrusion Detection System): Motivation, Architecture, and an Early Prototype,” Proceedings of the 14th National Computer Security Conference, Washington, D.C., Oct. 1991, pp. 167-176, <http://seclab.cs.ucdavis.edu/papers/DIDS.ncsc91.pdf>.
Stoll, C., “Stalking the Wily Hacker,” Communications of the ACM 31(5):484-497, May 1988.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for wireless local area network monitoring... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for wireless local area network monitoring..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for wireless local area network monitoring... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4206275

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.