Systems and methods for adaptively scanning for wireless communications
First Claim
1. A method for adaptively scanning wireless network channels, the method comprising the steps of:
- (a) receiving scan data based upon a scan of a plurality of wireless network channels according to a scanning pattern, wherein each wireless network channel in the plurality has a designation of primary or secondary, wherein at least one channel of the plurality is designated as a secondary channel and wherein the scanning pattern is determined based upon the designation associated with each wireless network channel in the plurality;
(b) determining whether anomalous activity is present on a selected wireless network channel designated as secondary based upon the received scan data; and
(c) if anomalous activity is determined to be present on the selected wireless network channel, adapting the scanning pattern by altering at least one monitoring parameter associated with the selected wireless network channel.
9 Assignments
0 Petitions
Accused Products
Abstract
This application is directed to systems and methods for adaptively scanning for wireless communications. Scan data associated with scanning one or more wireless network channels based upon a scan pattern is received. Each wireless channel has a designation of primary or secondary with at least one channel having the secondary designation. A determination is made as to whether anomalous activity is present on a selected wireless channel designated as secondary. If anomalous activity is determined to be present, at least one scanning parameter of the selected channel is altered.
-
Citations
25 Claims
-
1. A method for adaptively scanning wireless network channels, the method comprising the steps of:
-
(a) receiving scan data based upon a scan of a plurality of wireless network channels according to a scanning pattern, wherein each wireless network channel in the plurality has a designation of primary or secondary, wherein at least one channel of the plurality is designated as a secondary channel and wherein the scanning pattern is determined based upon the designation associated with each wireless network channel in the plurality;
(b) determining whether anomalous activity is present on a selected wireless network channel designated as secondary based upon the received scan data; and
(c) if anomalous activity is determined to be present on the selected wireless network channel, adapting the scanning pattern by altering at least one monitoring parameter associated with the selected wireless network channel. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for adaptively scanning wireless network channels, the system comprising:
-
(a) a system data store capable of storing information relating to a plurality of wireless network channels and a scanning pattern; and
(b) a system processor comprising one or more processing elements, wherein the system process is in communication with the system data store, and wherein the one or more processing elements are programmed or adapted to perform the steps comprising of;
(i) receiving scan data based upon a scan of a plurality of wireless network channels according to a scanning pattern, wherein each wireless network channel in the plurality has a designation of primary or secondary, wherein at least one channel of the plurality is designated as a secondary channel and at least one other channel of the plurality is designated as a primary channel and wherein the scanning pattern is determined based upon the designation associated with each wireless network channel in the plurality;
(ii) determining whether anomalous activity is present on a selected wireless network channel designated as secondary based upon the received scan data; and
(iii) if anomalous activity is determined to be present on the selected wireless network channel, adapting the scanning pattern by altering at least one monitoring parameter associated with the selected wireless network channel based upon time, traffic activity, threat level or combinations thereof and initiating at least one defensive action selected from the group consisting of;
(A) jamming wireless transmissions;
(B) CRC errors;
(C) transmitting frames comprising random data;
(D) locking-down the wireless computer network;
(E) activating a honeypot defense;
(F) initiating dynamic location tracking with respect to a wireless station or access point;
(G) de-authorizing a wireless station or access point;
(H) disabling a selected access point'"'"'s wireless transceiver; and
(I) alerting an external network management system or an associated network component; and
(iv) repeating steps (i) through (iii) a plurality of times. - View Dependent Claims (21, 22, 23)
-
-
24. One or more computer readable media that store instructions that upon execution by a system processor cause the system processor to adaptively scan wireless network channel by performing steps comprising of:
-
(a) receiving scan data based upon a scan of a plurality of wireless network channels according to a scanning pattern, wherein each wireless network channel in the plurality has a designation of primary or secondary, wherein at least one channel of the plurality is designated as a secondary channel and at least one other channel of the plurality is designated as a primary channel and wherein the scanning pattern is determined based upon the designation associated with each wireless network channel in the plurality;
(b) determining whether anomalous activity is present on a selected wireless network channel designated as secondary based upon the received scan data; and
(c) if anomalous activity is determined to be present on the selected wireless network channel, adapting the scanning pattern by altering at least one monitoring parameter associated with the selected wireless network channel based upon time, traffic activity, threat level or combinations thereof and initiating at least one defensive action selected from the group consisting of;
(i) jamming wireless transmissions;
(ii) CRC errors;
(iii) transmitting frames comprising random data;
(iv) locking-down the wireless computer network;
(v) activating a honeypot defense;
(vi) de-authorizing a wireless station or access point;
(vii) initiating dynamic location tracking with respect to a wireless station or access point;
(viii) disabling a selected access point'"'"'s wireless transceiver; and
(ix) alerting external a network management system or an associated network component; and
(d) repeating steps (a) through (c) a plurality of times.
-
-
25. A system for adaptively scanning wireless network channels, the system comprising:
-
(a) storing means for storing information relating to a plurality of wireless network channels and a scanning pattern;
(b) receiving means for receiving scan data based upon a scan of a plurality of wireless network channels according to a scanning pattern, wherein each wireless network channel in the plurality has a designation of primary or secondary, wherein at least one channel of the plurality is designated as a secondary channel and at least one other channel of the plurality is designated as a primary channel and wherein the scanning pattern is determined based upon the designation associated with each wireless network channel in the plurality;
(c) anomalous activity detecting means for determining whether anomalous activity is present on a selected wireless network channel designated as secondary based upon received scan data from the receiving means; and
(d) anomalous activity response means for responsive to the anomalous activity detecting means adapting the scanning pattern by altering at least one monitoring parameter associated with the selected wireless network channel based upon time, traffic activity, threat level or combinations thereof, for notifying a user or a computer system of anomalous activity determined by the anomalous activity detecting means, and for initiating at least one defensive action selected from the group consisting of;
(i) jamming wireless transmissions;
(ii) CRC errors;
(iii) transmitting frames comprising random data;
(iv) locking-down the wireless computer network;
(v) activating a honeypot defense;
(vi) de-authorizing a wireless station or access point;
(vii) initiating dynamic location tracking with respect to a wireless station or access point;
(viii) disabling a selected access point'"'"'s wireless transceiver; and
(ix) alerting external a network management system or an associated network component.
-
Specification