Snoop echo response extractor
First Claim
Patent Images
1. A computer implemented method for extracting a response from a snooping device in a computer network, the computer implemented method comprising:
- generating, by a packet source device in the computer network, an Internet Control Message Protocol echo request packet comprising a source hardware address and a source network protocol address of the packet source device, a bogus destination hardware address, and a valid destination network protocol address to elicit an Internet Control Message Protocol echo response from the snooping device;
sending, by the packet source device, the Internet Control Message Protocol echo request packet to one or more devices in the computer network;
responsive to receiving an Internet Control Message Protocol echo response packet at the packet source device in the computer network, identifying, by the packet source device, a presence of the snooping device among the one or more devices; and
examining the Internet Control Message Protocol echo response packet to identify a source network address of the snooping device.
0 Assignments
0 Petitions
Accused Products
Abstract
A mechanism is provided for identifying a snooping device in a network environment. A snoop echo response extractor generates an echo request packet with a bogus MAC address that will only be received by a snooping device. The snoop echo response extractor also uses an IP address that will cause the snooping device to respond to the echo request.
13 Citations
20 Claims
-
1. A computer implemented method for extracting a response from a snooping device in a computer network, the computer implemented method comprising:
-
generating, by a packet source device in the computer network, an Internet Control Message Protocol echo request packet comprising a source hardware address and a source network protocol address of the packet source device, a bogus destination hardware address, and a valid destination network protocol address to elicit an Internet Control Message Protocol echo response from the snooping device; sending, by the packet source device, the Internet Control Message Protocol echo request packet to one or more devices in the computer network; responsive to receiving an Internet Control Message Protocol echo response packet at the packet source device in the computer network, identifying, by the packet source device, a presence of the snooping device among the one or more devices; and examining the Internet Control Message Protocol echo response packet to identify a source network address of the snooping device. - View Dependent Claims (2, 3, 4, 5, 6, 19, 20)
-
-
7. An apparatus for extracting a response from a snooping device in a computer network, the apparatus comprising:
-
a processor; a network adapter operatively coupled to the processor; and a memory operatively coupled to the processor, wherein the memory has computer instructions stored therein, wherein the processor, under control of the computer instructions, generates an Internet Control Message Protocol echo request packet comprising a source hardware address and a source network protocol address of a packet source device, a bogus destination hardware address, and a valid destination network protocol address to elicit an Internet Control Message Protocol echo response from the snooping device, sends the Internet Control Message Protocol echo request packet to one or more devices in the computer network using the network adapter, identifies a presence of the snooping device among the one or more devices responsive to receiving an Internet Control Message Protocol echo response packet at the packet source device in the computer network, and examines the Internet Control Message Protocol echo response packet to identify a source network address of the snooping device. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer program product for extracting a response from a snooping device in a computer network, the computer program product comprising:
a non-transitory computer usable storage medium having computer usable program code stored thereon, the computer usable program code configured to; generate an Internet Control Message Protocol echo request packet comprising a source hardware address and a source network protocol address of a packet source device, a bogus destination hardware address, and a valid destination network protocol address to elicit an Internet Control Message Protocol echo response from the snooping device; send the Internet Control Message Protocol echo request packet to one or more devices in the computer network; identify a presence of the snooping device among the one or more devices responsive to receiving an Internet Control Message Protocol echo response packet at the packet source device in the computer network; and examine the Internet Control Message Protocol echo response packet to identify a source network address of the snooping device. - View Dependent Claims (14, 15, 16, 17, 18)
Specification