SYSTEM AND METHOD FOR WIRELESS LOCAL AREA NETWORK MONITORING AND INTRUSION DETECTION
First Claim
1. A computer-implemented system for managing network traffic from an unknown wireless device on a computer network, the system comprising:
- a security component residing in a wired area of the computer network and configured to;
passively monitor network traffic from a wireless area of the computer network for network traffic from an unknown wireless device; and
upon detecting network traffic from an unknown wireless device;
probe the unknown wireless device to determine at least one characteristic of the wireless device;
generate a device profile of the unknown wireless device according to the at least one determined characteristic;
determine access privileges to give to the unknown wireless device according to the determined profile and activities exhibited by the wireless device; and
permit network traffic from the unknown wireless device to pass to the computer network according to the determined access privileges.
0 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for managing network traffic from an unknown wireless device on a computer network are presented. A security component residing in a wired area of the computer network is configured to passively monitor network traffic from a wireless area of the computer network for network traffic from an unknown wireless device. Upon detecting network traffic from an unknown wireless device, the security component probes the unknown wireless device to determine at least one characteristic of the wireless device. After probing the device, the security component generates a device profile of the unknown wireless device according to the at least one determined characteristic. Access privileges are determined to give to the unknown wireless device according to the determined profile and activities exhibited by the wireless device. Thereafter, network traffic from the unknown wireless device is permitted to pass to the computer network according to the determined access privileges.
-
Citations
3 Claims
-
1. A computer-implemented system for managing network traffic from an unknown wireless device on a computer network, the system comprising:
a security component residing in a wired area of the computer network and configured to;
passively monitor network traffic from a wireless area of the computer network for network traffic from an unknown wireless device; and
upon detecting network traffic from an unknown wireless device;
probe the unknown wireless device to determine at least one characteristic of the wireless device;
generate a device profile of the unknown wireless device according to the at least one determined characteristic;
determine access privileges to give to the unknown wireless device according to the determined profile and activities exhibited by the wireless device; and
permit network traffic from the unknown wireless device to pass to the computer network according to the determined access privileges.
-
2. A computer-implemented method for detecting managing network traffic from an unknown wireless device on a computer network, comprising:
-
passively monitoring for network traffic from a wireless area of the computer network for network traffic of an unknown wireless device; and
upon detecting network traffic from the unknown wireless device;
probing the unknown wireless device to determine at least one characteristic of the wireless device;
generate a device profile of the unknown wireless device according to the at least one determined characteristic;
determine access privileges to give to the unknown wireless device according to the determined profile and the activities exhibited by the wireless device; and
permitting the network traffic from the unknown wireless device to pass to the computer network according to the determined access privileges.
-
-
3. A tangible computer-readable medium having computer-executable instructions which, when executed, carry out a method for detecting managing network traffic from an unknown wireless device on a computer network, comprising:
-
passively monitoring for network traffic from a wireless area of the computer network for network traffic of an unknown wireless device; and
upon detecting network traffic from the unknown wireless device;
probing the unknown wireless device to determine at least one characteristic of the wireless device;
generate a device profile of the unknown wireless device according to the at least one determined characteristic;
determine access privileges to give to the unknown wireless device according to the determined profile and the activities exhibited by the wireless device; and
permitting the network traffic from the unknown wireless device to pass to the computer network according to the determined access privileges.
-
Specification