×

Automated sniffer apparatus and method for monitoring computer systems for unauthorized access

  • US 8,789,191 B2
  • Filed: 02/17/2012
  • Issued: 07/22/2014
  • Est. Priority Date: 02/11/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method for monitoring for unauthorized wireless access to computer networks, the method comprising:

  • monitoring wireless communications within a selected geographic region using one or more monitoring devices that are positioned within the selected geographic region, the selected geographic region including a wired portion of a computer network;

    detecting an active wireless access point device that transmits wireless signals over a wireless medium within the selected geographic region;

    injecting a marker packet into the wired portion of the computer network at least for a purpose of detecting unauthorized access to the wired portion, the marker packet being adapted to be transferred to the wireless medium from the wired portion of the computer network through a wireless access point device which is connected to the wired portion of the computer network and functions as a layer two bridge between its wired and wireless interfaces, wherein the marker packet has a predetermined format, and at least one of the monitoring devices is configured to identify at least a portion of the predetermined format;

    identifying, based on the monitored wireless communications, that the marker packet was transferred from the wired portion of the computer network to the wireless medium within the selected geographic region through the active wireless access point device;

    determining that the active wireless access point device is connected to the wired portion of the computer network, based at least upon the marker packet being identified as transferred from the wired portion of the computer network to the wireless medium within the selected geographic region through the active wireless access point device;

    determining that the active wireless access point device is unauthorized; and

    determining that the active wireless access point device provides unauthorized access to the wired portion of the computer network, based at least upon the determination that the active wireless access point device is connected to the wired portion of the computer network and the determination that the active wireless access point is unauthorized.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×