Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
First Claim
1. A method for monitoring for unauthorized wireless access to computer networks, the method comprising:
- monitoring wireless communications within a selected geographic region using one or more monitoring devices that are positioned within the selected geographic region, the selected geographic region including a wired portion of a computer network;
detecting an active wireless access point device that transmits wireless signals over a wireless medium within the selected geographic region;
injecting a marker packet into the wired portion of the computer network at least for a purpose of detecting unauthorized access to the wired portion, the marker packet being adapted to be transferred to the wireless medium from the wired portion of the computer network through a wireless access point device which is connected to the wired portion of the computer network and functions as a layer two bridge between its wired and wireless interfaces, wherein the marker packet has a predetermined format, and at least one of the monitoring devices is configured to identify at least a portion of the predetermined format;
identifying, based on the monitored wireless communications, that the marker packet was transferred from the wired portion of the computer network to the wireless medium within the selected geographic region through the active wireless access point device;
determining that the active wireless access point device is connected to the wired portion of the computer network, based at least upon the marker packet being identified as transferred from the wired portion of the computer network to the wireless medium within the selected geographic region through the active wireless access point device;
determining that the active wireless access point device is unauthorized; and
determining that the active wireless access point device provides unauthorized access to the wired portion of the computer network, based at least upon the determination that the active wireless access point device is connected to the wired portion of the computer network and the determination that the active wireless access point is unauthorized.
8 Assignments
0 Petitions
Accused Products
Abstract
An apparatus for wireless communication including an automated intrusion detection process is provided. The apparatus includes a processing unit. It includes a wireless network interface device and an Ethernet (or like) wired network interface device that are coupled to the processing unit. One or more memories are coupled to the processing unit. A code is directed to perform a process for detection of wireless activity within a selected local geographic region. According to a specific embodiment, the wireless activity is derived from a wireless access point device that is operational about the selected local geographic region. A code is directed to performing connectivity test using one or more marker packets to determine connectivity status of the wireless access point device to network to be protected from intrusion. Depending upon the embodiment, other codes may exist to carry out the functionality described herein.
252 Citations
20 Claims
-
1. A method for monitoring for unauthorized wireless access to computer networks, the method comprising:
-
monitoring wireless communications within a selected geographic region using one or more monitoring devices that are positioned within the selected geographic region, the selected geographic region including a wired portion of a computer network; detecting an active wireless access point device that transmits wireless signals over a wireless medium within the selected geographic region; injecting a marker packet into the wired portion of the computer network at least for a purpose of detecting unauthorized access to the wired portion, the marker packet being adapted to be transferred to the wireless medium from the wired portion of the computer network through a wireless access point device which is connected to the wired portion of the computer network and functions as a layer two bridge between its wired and wireless interfaces, wherein the marker packet has a predetermined format, and at least one of the monitoring devices is configured to identify at least a portion of the predetermined format; identifying, based on the monitored wireless communications, that the marker packet was transferred from the wired portion of the computer network to the wireless medium within the selected geographic region through the active wireless access point device; determining that the active wireless access point device is connected to the wired portion of the computer network, based at least upon the marker packet being identified as transferred from the wired portion of the computer network to the wireless medium within the selected geographic region through the active wireless access point device; determining that the active wireless access point device is unauthorized; and determining that the active wireless access point device provides unauthorized access to the wired portion of the computer network, based at least upon the determination that the active wireless access point device is connected to the wired portion of the computer network and the determination that the active wireless access point is unauthorized. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for monitoring for unauthorized wireless access to computer networks, the system comprising:
-
a wired network interface for coupling the system to a wired portion of a computer network; a first portion of computer memory coupled to the wired network interface, the first portion of computer memory comprising computer-readable code executable to inject one or more marker packets into the wired portion of the computer network using the wired network interface at least for a purpose of detecting unauthorized access to the wired portion, the one or more marker packets being adapted to be transferred to a wireless medium from the wired portion of the computer network through one or more wireless access point devices which are connected to the wired portion of the computer network and function as layer two bridges between their wired and wireless interfaces, a predetermined format being associated with the one or more marker packets; a wireless network interface for monitoring wireless communication activity; a second portion of computer memory coupled to the wireless network interface, the second portion of computer memory comprising computer-readable code executable to identify, based on the monitored wireless communication activity, at least one marker packet from the one or more marker packets that was transferred to the wireless medium from the wired portion of the computer network through a first wireless access point device; a third portion of computer memory comprising computer-readable code executable to determine that the first wireless access point device is connected to the wired portion of the computer network, based at least upon the at least one marker packet being identified as transferred to the wireless medium from the wired portion of the computer network through the first wireless access point device; a fourth portion of computer memory comprising computer-readable code executable to determine that the first wireless access point is unauthorized; and a fifth portion of computer memory comprising computer-readable code executable to determine unauthorized access to the wired portion of the computer network based at least upon the determination that the first wireless access point device is connected to the wired portion of the computer network and the determination that the first wireless access point is unauthorized. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A method for monitoring unauthorized wireless access to a network, the method comprising:
-
monitoring wireless communications in the network by one or more monitoring devices, wherein the network comprises a wired portion and a wireless medium; detecting a wireless access point that transmits wireless signals over the wireless medium in the network; injecting a marker packet into the wired potion of the network at least for a purpose of detecting unauthorized access to the wired portion; determining that the wireless access point is connected to the wired portion of the network if at least one of the monitoring devices detects that the marker packet was transferred from the wired portion to the wireless medium of the network through the wireless access point; determining that the wireless access point is unauthorized; and determining that the wireless access point provides unauthorized access to the wired portion of the network based upon the determination that the wireless access point is unauthorized and is connected to the wired portion of the network.
-
Specification