×

Systems and methods for detecting network security deficiencies on endpoint devices

  • US 10,348,755 B1
  • Filed: 06/30/2016
  • Issued: 07/09/2019
  • Est. Priority Date: 06/30/2016
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for detecting network security deficiencies on endpoint devices, at least a portion of the method being performed by a network device comprising at least one processor, the method comprising:

  • intercepting, at the network device, a request from an endpoint device to automatically connect to a wireless network;

    evaluating whether the endpoint device is vulnerable to network attacks involving attempts to connect the endpoint device to illegitimate networks by;

    extracting, from the request, a network identifier of the wireless network requested by the endpoint device;

    creating, by the network device, a wireless network that appears to be the wireless network requested by the endpoint device but is not actually the requested wireless network;

    indicating that the wireless network that appears to be the requested wireless network is available to the endpoint device by sending, to the endpoint device from the network device, a response that contains the network identifier of the requested wireless network;

    determining that the endpoint device establishes a network connection to the wireless network that appears to be the requested wireless network; and

    determining, based on the endpoint device establishing the network connection to the wireless network that appears to be the requested wireless network, that the endpoint device is vulnerable to the network attacks; and

    directing, via the network connection, a user of the endpoint device to increase network security protocols on the endpoint device by at least one of;

    preventing the endpoint device from automatically attempting to connect to the requested wireless network; and

    removing the requested wireless network from a list of trusted wireless networks that indicates wireless networks to which the endpoint device automatically attempts to connect.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×