SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR IDENTIFYING UNWANTED ACTIVITY UTILIZING A HONEYPOT DEVICE ACCESSIBLE VIA VLAN TRUNKING
9 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for identifying unwanted activity utilizing a honeypot accessible via virtual local area network (VLAN) trunking. In use, a honeypot device is allowed to be accessed via VLAN trunking. Furthermore, unwanted data is identified, utilizing the honeypot device.
-
Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A method comprising:
-
identifying, by a network device, unwanted activity associated with an access request from a source device, the network device in communication with the source device via a virtual local area network (VLAN) of a local area network (LAN), wherein the unwanted activity is associated with one or more packets from the source device being incapable of communication outside the LAN; identifying the source device associated with the unwanted activity; and isolating the source device from the LAN in response to the source device being associated with the unwanted activity. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A computer program product embodied on a non-transitory computer readable medium for performing operations, comprising:
-
identifying, by a network device, unwanted activity associated with an access request from a source device, the network device in communication with the source device via a virtual local area network (VLAN) of a local area network (LAN), wherein the unwanted activity is associated with one or more packets from the source device being incapable of communication outside the LAN; identifying the source device associated with the unwanted activity; and isolating the source device from the LAN in response to the source device being associated with the unwanted activity.
-
-
40. A system, comprising:
-
a processor; and a memory coupled to the processor, wherein the system is configured for; identifying, by a network device, unwanted activity associated with an access request from a source device, the network device in communication with the source device via a virtual local area network (VLAN) of a local area network (LAN), wherein the unwanted activity is associated with one or more packets from the source device being incapable of communication outside the LAN; identifying the source device associated with the unwanted activity; and isolating the source device from the LAN in response to the source device being associated with the unwanted activity.
-
Specification