Method, apparatus, and software product for detecting rogue access points in a wireless network
First Claim
1. A method comprising:
- managing managed access points (APs) of a wireless network, the managing using a central management entity and including carrying out one or both of power control and frequency selection to configure one or more configuration parameters of the managed access point;
maintaining an AP database that includes information about managed APs and friendly APs of the wireless network, including for each managed AP in the AP database, the service set identifier of the managed AP and one or more of the configuration parameters;
receiving information from at least one of the managed APs including information on any beacon or probe response received by the managed AP that was sent by any potential rogue AP, including the MAC address of the potential rogue AP and one or more configuration parameters; and
for each potential rogue AP that sent a beacon or probe response on which information is received, ascertaining if the potential rogue AP is a managed AP, including, ascertaining if there is a match for the service set identifier of the potential rogue AP in the AP database, and further ascertaining if there is a match for one or more configuration parameters of the potential rogue AP in the AP database,such that at least a plurality of parameters are matched in the AP database to ascertain whether a potential rogue AP is a managed AP.
0 Assignments
0 Petitions
Accused Products
Abstract
A method, an apparatus, and a software program to implement a method to detect a rogue access point of a wireless network. The method includes maintaining an AP database that includes information about managed access point (APs) and friendly APs, including the MAC address of each managed AP. The method further includes sending a scan request to one or more managed APs, including one or more of a request for the receiving managed AP to scan for beacons and probe responses and a request for the receiving managed AP to request its clients to scan for beacons and probe responses. The method further includes receiving reports from at least one of the receiving managed APs, a report including information on any beacon or probe response received that was sent by an AP. For each beacon or probe response on which information is received, the method analyzes the information received in the report about the AP that sent the beacon or probe response, the analyzing including ascertaining if the MAC address of the AP that sent the beacon or probe response matches a MAC address of an AP in the AP database to ascertain whether or not the AP is a potential rogue AP or a managed or friendly AP.
99 Citations
20 Claims
-
1. A method comprising:
-
managing managed access points (APs) of a wireless network, the managing using a central management entity and including carrying out one or both of power control and frequency selection to configure one or more configuration parameters of the managed access point; maintaining an AP database that includes information about managed APs and friendly APs of the wireless network, including for each managed AP in the AP database, the service set identifier of the managed AP and one or more of the configuration parameters; receiving information from at least one of the managed APs including information on any beacon or probe response received by the managed AP that was sent by any potential rogue AP, including the MAC address of the potential rogue AP and one or more configuration parameters; and for each potential rogue AP that sent a beacon or probe response on which information is received, ascertaining if the potential rogue AP is a managed AP, including, ascertaining if there is a match for the service set identifier of the potential rogue AP in the AP database, and further ascertaining if there is a match for one or more configuration parameters of the potential rogue AP in the AP database, such that at least a plurality of parameters are matched in the AP database to ascertain whether a potential rogue AP is a managed AP. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. One or more non-transitory computer-readable media with computer program instructions encoded thereon that when executed on one or more processors of a processing system are operable to implement a method comprising:
- managing managed access points (APs) of a wireless network, the managing using a central management entity and including carrying out one or both of power control and frequency selection to configure one or more configuration parameters of the managed access point;
maintaining an AP database that includes information about managed APs and friendly APs of the wireless network, including for each managed AP in the AP database, the service set identifier of the managed AP and one or more of the configuration parameters;
receiving information from at least one of the managed APs including information on any beacon or probe response received by the managed AP that was sent by any potential rogue AP, including the MAC address of the potential rogue AP and one or more configuration parameters; and
for each potential rogue AP that sent a beacon or probe response on which information is received, ascertaining if the potential rogue AP is a managed AP, including, ascertaining if there is a match for the service set identifier of the potential rogue AP in the AP database, and further ascertaining if there is a match for one or more configuration parameters of the potential rogue AP in the AP database, such that at least a plurality of parameters are matched in the AP database to ascertain whether a potential rogue AP is a managed AP. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
- managing managed access points (APs) of a wireless network, the managing using a central management entity and including carrying out one or both of power control and frequency selection to configure one or more configuration parameters of the managed access point;
-
19. A system comprising:
-
a central management entity of a wireless network, the central management entity coupled to one or more managed access points (APs) of the wireless network and operative to manage the managed APs, including carrying out one or both of power control and frequency selection to configure one or more configuration parameters of the managed access point; a storage subsystem maintaining an AP database that includes information about managed APs and friendly APs of the wireless network, including for each managed AP in the AP database, the service set identifier of the managed AP and one or more of the configuration parameters; and a processing system coupled to the central management and the storage subsystem operative to receive information from at least one of the managed APs including information on any beacon or probe response received by the managed AP that was sent by any potential rogue AP, including the MAC address of the potential rogue AP and one or more configuration parameters; and for each potential rogue AP that sent a beacon or probe response on which information is received, ascertain if the potential rogue AP is a managed AP, including, ascertaining if there is a match for the service set identifier of the potential rogue AP in the AP database, and further ascertain if there is a match for one or more configuration parameters of the potential rogue AP in the AP database, such that at least a plurality of parameters are matched in the AP database to ascertain whether a potential rogue AP is a managed AP. - View Dependent Claims (20)
-
Specification