Detection of intrusion in a wireless network
First Claim
1. A method for detecting intrusion of a wireless network, the method comprising:
- determining, by one or more processors, that a first data stream received by the wireless network does not include N1 communication protocols included in a second data stream previously determined to be valid, N1 being a positive integer;
determining, by the one or more processors, that N1 exceeds a predetermined first tolerance, and in response, the one or more processors determining that the first data stream does not include N2 communication protocols included in a third data stream previously determined to be intrusive to the wireless network, N2 being an integer equal to or greater than zero;
determining, by the one or more processors, that N2 is less than a predetermined second tolerance, and in response, generating, by the one or more processors, an alert that the received first data stream is potentially intrusive to the wireless network;
determining, by the one or more processors, that the first data stream does not include N3 communication protocols included in a fourth data stream previously determined to be intrusive to the wireless network, in response to the determining that N1 exceeds the predetermined first tolerance and prior to the determining that the first data stream does not include the N2 communication protocols included in a third data stream, wherein N3 is an integer equal to or greater than one; and
determining, by the one or more processors, that N3 is equal to or greater than the predetermined second tolerance,wherein N1 is 2, the predetermined first tolerance is 1, N2 is 1 and the predetermined second tolerance is 2.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and associated system for detecting intrusion of a wireless network. A determination is made that a first data stream received by the wireless network does not include N1 communication protocols included in a second data stream previously determined to be valid, N1 being a positive integer. A determination is made that N1 exceeds a predetermined first tolerance, and in response, that the first data stream does not include N2 communication protocols included in a third data stream previously determined to be intrusive to the wireless network, N2 being an integer equal to or greater than zero. A determination is made that N2 is less than a predetermined second tolerance, and in response, an alert that the received data stream is potentially intrusive to the wireless network is generated.
13 Citations
14 Claims
-
1. A method for detecting intrusion of a wireless network, the method comprising:
-
determining, by one or more processors, that a first data stream received by the wireless network does not include N1 communication protocols included in a second data stream previously determined to be valid, N1 being a positive integer; determining, by the one or more processors, that N1 exceeds a predetermined first tolerance, and in response, the one or more processors determining that the first data stream does not include N2 communication protocols included in a third data stream previously determined to be intrusive to the wireless network, N2 being an integer equal to or greater than zero; determining, by the one or more processors, that N2 is less than a predetermined second tolerance, and in response, generating, by the one or more processors, an alert that the received first data stream is potentially intrusive to the wireless network; determining, by the one or more processors, that the first data stream does not include N3 communication protocols included in a fourth data stream previously determined to be intrusive to the wireless network, in response to the determining that N1 exceeds the predetermined first tolerance and prior to the determining that the first data stream does not include the N2 communication protocols included in a third data stream, wherein N3 is an integer equal to or greater than one; and determining, by the one or more processors, that N3 is equal to or greater than the predetermined second tolerance, wherein N1 is 2, the predetermined first tolerance is 1, N2 is 1 and the predetermined second tolerance is 2. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer program product for detecting intrusion of a wireless network, the computer program product comprising one or more computer-readable storage devices and program instructions stored on at least one of the one or more storage devices, the program instructions comprising:
-
program instructions to determine that a first data stream received by the wireless network does not include N1 communication protocols included in a second data stream previously determined to be valid, N1 being a positive integer; program instructions to determine that N1 exceeds a predetermined first tolerance, and in response, to determine that the first data stream does not include N2 communication protocols included in a third data stream previously determined to be intrusive to the wireless network, N2 being an integer equal to or greater than zero; program instructions to determine that N2 is less than a predetermined second tolerance, and in response, to generate an alert that the received first data stream is potentially intrusive to the wireless network; program instructions to determine that the first data stream does not include N3 communication protocols included in a fourth data stream previously determined to be intrusive to the wireless network, in response to a determination that N1 exceeds the predetermined first tolerance and prior to a determination that the first data stream does not include the N2 communication protocols included in a third data stream, wherein N3 is an integer equal to or greater than one; and program instructions to determine that N3 is equal to or greater than the predetermined second tolerance, wherein N1 is 2, the predetermined first tolerance is 1, N2 is 1 and the predetermined second tolerance is 2. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A computer system for detecting intrusion of a wireless network, the computer system comprising:
-
one or more processors, one or more computer-readable memories, one or more computer-readable storage devices, and program instructions stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions comprising; program instructions to determine that a first data stream received by the wireless network does not include N1 communication protocols included in a second data stream previously determined to be valid, N1 being a positive integer; program instructions to determine that N1 exceeds a predetermined first tolerance, and in response, to determine that the first data stream does not include N2 communication protocols included in a third data stream previously determined to be intrusive to the wireless network, N2 being an integer equal to or greater than zero; program instructions to determine that N2 is less than a predetermined second tolerance, and in response, to generate an alert that the received first data stream is potentially intrusive to the wireless network; program instructions to determine that the first data stream does not include N3 communication protocols included in a fourth data stream previously determined to be intrusive to the wireless network, in response to a determination that N1 exceeds the predetermined first tolerance and prior to a determination that the first data stream does not include the N2 communication protocols included in a third data stream, wherein N3 is an integer equal to or greater than one; and program instructions to determine that N3 is equal to or greater than the predetermined second tolerance, wherein N1 is 2, the predetermined first tolerance is 1, N2 is 1 and the predetermined second tolerance is 2. - View Dependent Claims (12, 13, 14)
-
Specification