×

Systems and methods for detecting potentially illegitimate wireless access points

  • US 9,781,601 B1
  • Filed: 06/08/2015
  • Issued: 10/03/2017
  • Est. Priority Date: 06/08/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for detecting illegitimate wireless access points, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • determining that the computing device has established a connection with a wireless access point that resembles a known wireless access point to which the computing device has previously connected;

    performing, in response to determining that the computing device has established the connection with the wireless access point, an authentication process to determine the legitimacy of the wireless access point by;

    identifying a network resource to which the computing device is configured to connect as part of authentication processes to determine the legitimacy of wireless access points,establishing, via the wireless access point, a connection between the computing device and the network resource,collecting, based on the connection between the computing device and the network resource, a set of network details related to a route from the computing device to the network resource via the wireless access point, the set of network details describing properties of at least one network device that facilitates the connection between the computing device and the network resource, andcomparing the set of network details related to the route from the computing device to the network resource via the wireless access point with a previously collected set of network details related to a route from the computing device to the network resource via the known wireless access point;

    determining, based on the comparison, that at least a portion of the set of network details related to the route from the computing device to the network resource via the wireless access point does not match the previously collected set of network details related to the route from the computing device to the network resource via the known wireless access point;

    determining that the wireless access point is illegitimate by determining, based at least in part on the portion of the set of network details related to the route from the computing device to the network resource via the wireless access point not matching the previously collected set of network details related to the route from the computing device to the network resource via the known wireless access point, that a malicious network device is spoofing the known wireless access point; and

    performing, in response to determining that the wireless access point is illegitimate, a security action on the computing device to prevent the wireless access point from compromising a security state of the computing device.

View all claims
  • 6 Assignments
Timeline View
Assignment View
    ×
    ×