×

Detecting man-in-the-middle attacks

  • US 10,250,636 B2
  • Filed: 07/07/2016
  • Issued: 04/02/2019
  • Est. Priority Date: 07/07/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting man-in-the-middle (MITM) attacks, the method comprising:

  • monitoring, by a computer system, network configuration traffic among network devices and network management devices of one or more subnets;

    storing, by the computer system, first identification information for one or more network management devices referenced in the network configuration traffic;

    transmitting, by the computer system, on at least one of the one or more subnets, a broadcast request for network configuration information;

    detecting, by the computer system, at least one of (a) multiple responses to the broadcast request from multiple sources and (b) a response that includes second identification information that does not correspond to the first identification information; and

    in response to detecting at least one of (a) and (b), determining, by the computer system that a potential MITM attack has occurred;

    wherein the broadcast request for network configuration information is a request for a WPAD.dat file;

    wherein the first identification information includes a first WPAD.dat file;

    wherein the second identification information includes a second WPAD.dat file; and

    wherein detecting at least one of (a) and (b) comprises detecting (b);

    wherein detecting (b) comprises determining that the second WPAD.dat file is different from the first WPAD.dat file.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×