Determination of spoofing of a unique machine identifier
First Claim
Patent Images
1. A method, comprising:
- receiving, at an administrative device, current browsing information from an edge network device, the received current browsing information associated with a media access control (MAC) address of an end user device;
sending, by the administrative device, an acknowledgment request to the end user device;
determining, by the administrative device, if an acknowledgement is received from the end user device in response to the acknowledgement request;
if the acknowledgement is not received at the administrative device from the end user device;
determining, based on a comparison of the received current browsing information with stored historical information associated with the MAC address of the end user device, whether the MAC address of the end user device has been spoofed.
2 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, an edge network device may monitor a network service that is provided at a network service device. Information related to the monitored network service may be temporarily stored at the edge network device and transmitted to a remote network device. In one embodiment, an administrative device may compare current extracted information with stored historical information to determine if a unique machine identifier of an end user device has been spoofed.
18 Citations
19 Claims
-
1. A method, comprising:
-
receiving, at an administrative device, current browsing information from an edge network device, the received current browsing information associated with a media access control (MAC) address of an end user device; sending, by the administrative device, an acknowledgment request to the end user device; determining, by the administrative device, if an acknowledgement is received from the end user device in response to the acknowledgement request; if the acknowledgement is not received at the administrative device from the end user device; determining, based on a comparison of the received current browsing information with stored historical information associated with the MAC address of the end user device, whether the MAC address of the end user device has been spoofed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. An apparatus, comprising:
-
a memory, storing a set of instructions; and a processor, to execute the stored set of instructions, the processor to; receive, from an edge network device, current browsing information associated with a media access control (MAC) address of an end user device; send an acknowledgment to an end user device; determine whether an acknowledgement is received from the end user device in response to the acknowledgement request; if the acknowledgement is not received from the end user device; compare the current browsing information associated with the unique machine identifier to historical information associated with the MAC address of the end user device to determine, based on a result of the comparison, whether the MAC address of the end user device has been spoofed. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable medium, storing a set of instructions, executable by a processor, to perform a method comprising:
-
receiving, at an administrative network device, current browsing information from an edge network device, the received current browsing information associated with a media access control (MAC) address of an end user device; sending, by the administrative network device, an acknowledgment request to the end user device; determining, by the administrative network device, if an acknowledgement is received from the end user device in response to the acknowledgement request; if the acknowledgement is not received at the administrative network device from the end user device; determining, based on a comparison of the received current browsing information with stored historical information associated with the MAC address of the end user device, whether the MAC address of the end user device has been spoofed. - View Dependent Claims (16, 17, 18, 19)
-
Specification