Systems and methods for wireless vulnerability analysis
First Claim
Patent Images
1. A system for identifying security vulnerabilities in a wireless network, the system comprising:
- a system data store configured to store a plurality of wireless attack patterns, network default data associated with the wireless network, and responses received from the wireless network in response to simulated wireless attacks using one or more of the plurality of wireless attack patterns; and
a control engine comprising one or more processing elements, wherein the control engine is in communication with the system data store and wherein the control engine is configured to perform the steps comprising of;
performing simulated wireless attacks on the wireless network by communicating with at least one wireless device on the wireless network;
receiving a response to the simulated wireless attack from the wireless network;
analyzing the response of the wireless network to the simulated wireless attacks to identify a vulnerability of the wireless network; and
determining which of the wireless attacks is most probable to occur based on the analyzed vulnerability, such that steps may be taken to mitigate the analyzed vulnerability.
9 Assignments
0 Petitions
Accused Products
Abstract
Security vulnerability assessment for wireless networks is provided. Systems and methods for security vulnerability assessment simulate an attack upon the wireless network, capture the response from the wireless network, and identify a vulnerability associated with the wireless network after analyzing the response from the wireless network.
316 Citations
27 Claims
-
1. A system for identifying security vulnerabilities in a wireless network, the system comprising:
-
a system data store configured to store a plurality of wireless attack patterns, network default data associated with the wireless network, and responses received from the wireless network in response to simulated wireless attacks using one or more of the plurality of wireless attack patterns; and
a control engine comprising one or more processing elements, wherein the control engine is in communication with the system data store and wherein the control engine is configured to perform the steps comprising of;
performing simulated wireless attacks on the wireless network by communicating with at least one wireless device on the wireless network;
receiving a response to the simulated wireless attack from the wireless network;
analyzing the response of the wireless network to the simulated wireless attacks to identify a vulnerability of the wireless network; and
determining which of the wireless attacks is most probable to occur based on the analyzed vulnerability, such that steps may be taken to mitigate the analyzed vulnerability. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for identifying security vulnerabilities in a wireless network, the method comprising the steps of:
-
initiating a simulated attack on the wireless network based upon stored wireless attack patterns;
scanning a plurality of wireless devices coupled to the wireless network for responses from the plurality of wireless devices;
analyzing the responses of the wireless devices to the simulated attack;
identifying a security vulnerability based upon the analysis; and
adapting the wireless devices to mitigate the security vulnerability based upon the responses. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
-
27. A system for identifying security vulnerabilities in a wireless network, the system comprising:
-
a system data store configured to store a plurality of wireless attack patterns, network default data associated with the wireless network, and responses received from the wireless network in response to simulated wireless attacks using one or more of the plurality of wireless attack patterns;
a control engine comprising one or more processing elements, wherein the control engine is in communication with the system data store and wherein the control engine is configured to perform the steps comprising of;
monitoring data transmitted on the wireless network, analyzing the data to identify a vulnerability of the wireless network; and
determining which of the wireless attacks is most probable to occur based on the analyzed vulnerability, such that steps may be taken to mitigate the analyzed vulnerability; and
wherein the system is configured to operate concurrently on the wireless network without disrupting the data.
-
Specification