CA2484041A1 - Method and system for wireless intrusion detection - Google Patents

Method and system for wireless intrusion detection Download PDF

Info

Publication number
CA2484041A1
CA2484041A1 CA002484041A CA2484041A CA2484041A1 CA 2484041 A1 CA2484041 A1 CA 2484041A1 CA 002484041 A CA002484041 A CA 002484041A CA 2484041 A CA2484041 A CA 2484041A CA 2484041 A1 CA2484041 A1 CA 2484041A1
Authority
CA
Canada
Prior art keywords
results
wireless network
monitoring cycle
wireless
interest
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002484041A
Other languages
French (fr)
Other versions
CA2484041C (en
Inventor
Ken Ammon
Chris O'ferrell
Wayne Mitzen
Dan Frasnelli
Lawrence Wimble
Yin Yang
Tom Mchale
Rick Doten
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OL Security LLC
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2484041A1 publication Critical patent/CA2484041A1/en
Application granted granted Critical
Publication of CA2484041C publication Critical patent/CA2484041C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas

Abstract

A wireless intrusion dection system (WIDS) is disclosed for monitoring both authorized and unauthorized access to a wireless portion of a network. The WIDS consists of a collect (110) and one or more nodes (120) that communicate via an out of band means that is separate from the network. Unauthorized access points (140) and unauthorized clients (160) in the network can be detected. The WIDS can be used to monitor, for example, a network implemented using the 802.11 protocol. In addition, the WIDS can be used by one company to provide a service that monitors the wireless network of another company.

Claims (42)

1. A method comprising:
monitoring, for at least one monitoring cycle, a wireless network of interest for a plurality of signals from one or more wireless access devices;
storing results from the monitoring cycle;
transmitting the results of the monitoring cycle to a data collector;
processing the results of the monitoring cycle to determine whether any access of the wireless network of interest has occurred; and notifying a user of the results of the processing of the monitoring cycle.
2. The method of claim 1, further comprising:
detecting access points in the wireless network; and detecting clients in the wireless network.
3. The method of claim 1, further comprising:
using a separate communications channel for the transmission of the results of the monitoring cycle to the data collector.
4. The method of claim 1, further comprising:
encrypting the results from the monitoring cycle prior to transmitting to the collector.
5. The method of claim 1, further comprising:
performing a monitoring cycle utilizing one or more nodes.
6. The method of claim 5, further comprising:
monitoring the status of the one or more nodes.
7. The method of claim 1, further comprising:
tracking of authorized and unauthorized access points and clients.
8. The method of claim 1, further comprising:
locating any unauthorized devices.
9. The method of claim 1, further comprising:
determining the status of any authorized access points.
10. The method of claim 9, further comprising:
determining whether any authorized access points have changed.
11. The method of claim 9, further comprising:
determining whether any authorized access points are not operating.
12. The method of claim 1, further comprising:
identifying any denial of service attempts.
13. The method of claim 1, further comprising:
tracking of multiple connection attempts to the wireless network by any unauthorized devices.
14. The method of claim 1, further comprising:
tracking how long any unauthorized device has attempted to access the wireless network.
15. The method of claim 1, further comprising:
identifying attempts to spoof an authorized access point.
16. The method of claim 1, further comprising:
notifying the user of any authorized attempts to access the wireless network.
17. The method of claim 1, further comprising:
notifying the user of any unauthorized attempts to access the wireless network.
18. The method of claim 1, wherein the transmitting of results further comprises transmitting over a wireless communications medium.
19. The method of claim 18, wherein the transmitting of results over a wireless communications medium further comprises transmitting a 900MHz radio transmission.
20. The method of claim 1, wherein the transmitting of results further comprises transmitting to a remotely located data collector.
21. The method of claim 1, wherein the monitoring of signals from one or more wireless access devices further comprises monitoring for access points.
22. The method of claim 1, wherein the monitoring of signals from one or more wireless access devices further comprises monitoring for clients.
23. A wireless intrusion detection system, comprising:
one or more nodes, each node configured to monitor a wireless network of interest for signals received from at least one wireless access device; and a collector, each of the one or more nodes in communication with the collector;
wherein the collector receives results from the monitoring cycle of signals by the one or more nodes and determines whether any unauthorized access of the wireless network of interest has occurred.
24. A system as in claim 23, wherein at least one of the nodes is a primary node that communicates directly with the collector.
25. A system as in claim 24, wherein at least one of the nodes is a secondary node that communicates with the primary node.
26. A system as in claim 23, wherein the communications between the collector and the one or more nodes occur over a different communications path than the wireless network of interest.
27. A system as in claim 23, the determining of unauthorized access of the wireless network of interest further comprising one or more of:
tracking of authorized and unauthorized access points and clients;
locating any unauthorized devices;
determining the status of any authorized access points;
determining whether any authorized access points have changed;
determining whether any authorized access points are not operating;
identifying any denial of service (DoS) attempts;
tracking of multiple connection attempts to the wireless network by any unauthorized devices;
tracking how long any unauthorized device has attempted to access the wireless network; and identifying attempts to spoof an authorized access point.
28. A wireless intrusion detection node, comprising:
means for performing a monitoring cycle of a plurality of signals from one or more wireless networks, including one wireless network of interest;
means for storing results from the monitoring cycle; and means for transmitting the results of the monitoring cycle to a data collector.
29. A wireless intrusion detection collector, comprising:
means for receiving from a node results of a monitoring cycle of a plurality of signals from one or more wireless networks, including one wireless network of interest;
means for processing the results of the monitoring cycle; and means for notifying a user of the results of the monitoring cycle.
30. A method for controlling a wireless intrusion detection system comprising:
transmitting a plurality of beacon packets from a collector;

receiving one or more of the beacon packets at a node; and establishing a communications link between the collector and the node for detecting unauthorized access of a wireless network of interest;
wherein the collector controls a wireless intrusion detection system by a communications link that utilizes a different means of communication than the wireless network.
31. A method as in claim 30, the communications link being a 900MHz radio channel.
32. A method comprising:
receiving the results of a monitoring cycle of a plurality of signals from one or more wireless networks that were previously monitored by one or more nodes;
processing the results of the monitoring cycle at a location remote from the location of the one or more nodes to generate at least one indicator indicative of unauthorized access to the wireless network of interest; and communicating the at least one indicator to an operator that monitors the status of the wireless network of interest.
33. A method as in claim 32, the operator being a human being.
34. A method as in claim 32, the operator being an automated process.
35. A method comprising:
receiving, from a node, results of a monitoring cycle of a plurality of signals from one or more wireless access devices in a wireless network of interest;
processing the results of the monitoring cycle to generate at least one indicator indicative of unauthorized access to the wireless network of interest;
recognizing patterns in the results of the monitoring cycle; and refining the responses to the results of the monitoring cycle based on recognized patterns.
36. A method as in claim 35, further comprising:
applying adaptive learning techniques to evolve recognition of unauthorized access to the wireless network of interest.
37. A method as in claim 36, wherein the step of applying adaptive learning techniques further comprises:
utilizing genetic algorithms.
38. A method comprising:
receiving results from a node of a monitoring cycle of a plurality of signals from one or more wireless networks;
processing the results of the monitoring cycle to generate at least one indicator indicative of unauthorized access to the wireless network of interest; and determining, based on the processing of the results of the monitoring cycle, a location of any unauthorized access to the wireless network of interest.
39. A system comprising:
means for monitoring, for at least one monitoring cycle, a wireless network of interest for a plurality of signals from one or more wireless access devices;
means for storing results from the monitoring cycle;
means for transmitting the results of the monitoring cycle to a data collector;
means for processing the results of the monitoring cycle to determine whether any access of the wireless network of interest has occurred; and means for notifying a user of the results of the processing of the monitoring cycle.
40. A computer readable medium containing computer program instructions for:
monitoring, for at least one monitoring cycle, a wireless network of interest for a plurality of signals from one or more wireless access devices;
storing results from the monitoring cycle;
transmitting the results of the monitoring cycle to a data collector;

processing the results of the monitoring cycle to determine whether any access of the wireless network of interest has occurred; and notifying a user of the results of the processing of the monitoring cycle.
41. A system for controlling a wireless intrusion detection system comprising:
means for transmitting a plurality of beacon packets from a collector;
means for receiving one or more of the beacon packets at a node; and means for establishing a communications link between the collector and the node for detecting unauthorized access of a wireless network of interest;
wherein the collector controls a wireless intrusion detection system by a communications link that utilizes a different means of communication than the wireless network.
42. A computer readable medium containing computer program instructions for:
transmitting a plurality of beacon packets from a collector;
receiving one or more of the beacon packets at a node; and establishing a communications link between the collector and the node for detecting unauthorized access of a wireless network of interest;
wherein the collector controls a wireless intrusion detection system by a communications link that utilizes a different means of communication than the wireless network.
CA2484041A 2002-05-17 2003-05-15 Method and system for wireless intrusion detection Expired - Fee Related CA2484041C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US10/147,308 US7778606B2 (en) 2002-05-17 2002-05-17 Method and system for wireless intrusion detection
US10/147,308 2002-05-17
PCT/US2003/015076 WO2003101023A2 (en) 2002-05-17 2003-05-15 Method and system for wireless intrusion detection

Publications (2)

Publication Number Publication Date
CA2484041A1 true CA2484041A1 (en) 2003-12-04
CA2484041C CA2484041C (en) 2012-09-11

Family

ID=29418991

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2484041A Expired - Fee Related CA2484041C (en) 2002-05-17 2003-05-15 Method and system for wireless intrusion detection

Country Status (7)

Country Link
US (1) US7778606B2 (en)
EP (1) EP1506637B1 (en)
AT (1) ATE486439T1 (en)
AU (1) AU2003237842A1 (en)
CA (1) CA2484041C (en)
DE (1) DE60334689D1 (en)
WO (1) WO2003101023A2 (en)

Families Citing this family (166)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6825776B2 (en) * 1999-08-09 2004-11-30 Power Measurement Ltd. External I/O and communications interface for a revenue meter
WO2002063775A2 (en) * 2001-02-05 2002-08-15 Expway Method and system for compressing structured documents
US7584425B2 (en) * 2001-07-31 2009-09-01 Verizon Business Global Llc Systems and methods for generating reports
US20030041125A1 (en) * 2001-08-16 2003-02-27 Salomon Kirk C. Internet-deployed wireless system
US8209756B1 (en) 2002-02-08 2012-06-26 Juniper Networks, Inc. Compound attack detection in a computer network
US7519729B2 (en) * 2002-02-27 2009-04-14 Ricoh Co. Ltd. Method and apparatus for monitoring remote devices through a local monitoring station and communicating with a central station supporting multiple manufacturers
AU2003217021A1 (en) * 2002-03-28 2003-10-13 British Telecommunications Public Limited Company Method and apparatus for network security
US7277404B2 (en) * 2002-05-20 2007-10-02 Airdefense, Inc. System and method for sensing wireless LAN activity
US7086089B2 (en) * 2002-05-20 2006-08-01 Airdefense, Inc. Systems and methods for network security
US7042852B2 (en) * 2002-05-20 2006-05-09 Airdefense, Inc. System and method for wireless LAN dynamic channel change with honeypot trap
US7383577B2 (en) * 2002-05-20 2008-06-03 Airdefense, Inc. Method and system for encrypted network management and intrusion detection
US20040203764A1 (en) * 2002-06-03 2004-10-14 Scott Hrastar Methods and systems for identifying nodes and mapping their locations
US7532895B2 (en) * 2002-05-20 2009-05-12 Air Defense, Inc. Systems and methods for adaptive location tracking
CA2486519C (en) * 2002-05-20 2015-01-27 Airdefense, Inc. System and method for making managing wireless network activity
US7058796B2 (en) 2002-05-20 2006-06-06 Airdefense, Inc. Method and system for actively defending a wireless LAN against attacks
US6965674B2 (en) * 2002-05-21 2005-11-15 Wavelink Corporation System and method for providing WLAN security through synchronized update and rotation of WEP keys
US7322044B2 (en) * 2002-06-03 2008-01-22 Airdefense, Inc. Systems and methods for automated network policy exception detection and correction
US8539580B2 (en) * 2002-06-19 2013-09-17 International Business Machines Corporation Method, system and program product for detecting intrusion of a wireless network
US7965842B2 (en) * 2002-06-28 2011-06-21 Wavelink Corporation System and method for detecting unauthorized wireless access points
US7853983B2 (en) * 2002-07-29 2010-12-14 Bea Systems, Inc. Communicating data from a data producer to a data receiver
US7068999B2 (en) * 2002-08-02 2006-06-27 Symbol Technologies, Inc. System and method for detection of a rogue wireless access point in a wireless communication network
US7606242B2 (en) * 2002-08-02 2009-10-20 Wavelink Corporation Managed roaming for WLANS
US7522906B2 (en) * 2002-08-09 2009-04-21 Wavelink Corporation Mobile unit configuration management for WLANs
US7224678B2 (en) * 2002-08-12 2007-05-29 Harris Corporation Wireless local or metropolitan area network with intrusion detection features and related methods
US7316031B2 (en) * 2002-09-06 2008-01-01 Capital One Financial Corporation System and method for remotely monitoring wireless networks
US7293289B1 (en) * 2002-09-10 2007-11-06 Marvell International Ltd. Apparatus, method and computer program product for detection of a security breach in a network
WO2004028121A2 (en) * 2002-09-23 2004-04-01 Wimetrics Corporation System and method for wireless local area network monitoring and intrusion detection
US20040064731A1 (en) * 2002-09-26 2004-04-01 Nguyen Timothy Thien-Kiem Integrated security administrator
JP2004266342A (en) * 2003-02-03 2004-09-24 Sony Corp System and terminal for radio ad hoc communication, decrypting method and encrypting method in the terminal, broadcast encrypting key distributing method, and program for making the terminal execute the method
US7797531B2 (en) * 2003-02-03 2010-09-14 Sony Corporation Wireless ad-hoc communication system, terminal, method for suggesting issuance of attribute certificate and method for requesting issuance of attribute certificate in the terminal, and program for causing the terminal to execute the method
US7853250B2 (en) 2003-04-03 2010-12-14 Network Security Technologies, Inc. Wireless intrusion detection system and method
US7603710B2 (en) 2003-04-03 2009-10-13 Network Security Technologies, Inc. Method and system for detecting characteristics of a wireless network
US7895649B1 (en) 2003-04-04 2011-02-22 Raytheon Company Dynamic rule generation for an enterprise intrusion detection system
US7355996B2 (en) * 2004-02-06 2008-04-08 Airdefense, Inc. Systems and methods for adaptive monitoring with bandwidth constraints
US8108916B2 (en) * 2003-05-21 2012-01-31 Wayport, Inc. User fraud detection and prevention of access to a distributed network communication system
US8068441B1 (en) 2003-06-05 2011-11-29 Mcafee, Inc. Automated discovery of access points in wireless computer networks
US8606885B2 (en) * 2003-06-05 2013-12-10 Ipass Inc. Method and system of providing access point data associated with a network access point
US7398310B1 (en) * 2003-06-19 2008-07-08 Cisco Technology Inc. Method and system for tracking entities in a computer network
US20040267551A1 (en) * 2003-06-26 2004-12-30 Satyendra Yadav System and method of restricting access to wireless local area network based on client location
US7565690B2 (en) * 2003-08-04 2009-07-21 At&T Intellectual Property I, L.P. Intrusion detection
US7295831B2 (en) * 2003-08-12 2007-11-13 3E Technologies International, Inc. Method and system for wireless intrusion detection prevention and security management
WO2005024598A2 (en) * 2003-09-09 2005-03-17 Oto Software, Inc Method and system for securing and monitoring a wireless network
US8161528B2 (en) * 2003-10-07 2012-04-17 Xr Communications, Llc Detecting wireless interlopers
US7558960B2 (en) * 2003-10-16 2009-07-07 Cisco Technology, Inc. Network infrastructure validation of network management frames
JP4543657B2 (en) * 2003-10-31 2010-09-15 ソニー株式会社 Information processing apparatus and method, and program
US7406320B1 (en) 2003-12-08 2008-07-29 Airtight Networks, Inc. Method and system for location estimation in wireless networks
US7002943B2 (en) * 2003-12-08 2006-02-21 Airtight Networks, Inc. Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US7856209B1 (en) 2003-12-08 2010-12-21 Airtight Networks, Inc. Method and system for location estimation in wireless networks
US7409715B2 (en) * 2003-12-10 2008-08-05 Alcatel Lucent Mechanism for detection of attacks based on impersonation in a wireless network
US7536723B1 (en) * 2004-02-11 2009-05-19 Airtight Networks, Inc. Automated method and system for monitoring local area computer networks for unauthorized wireless access
US7440434B2 (en) * 2004-02-11 2008-10-21 Airtight Networks, Inc. Method and system for detecting wireless access devices operably coupled to computer local area networks and related methods
US7216365B2 (en) * 2004-02-11 2007-05-08 Airtight Networks, Inc. Automated sniffer apparatus and method for wireless local area network security
US7496094B2 (en) * 2004-04-06 2009-02-24 Airtight Networks, Inc. Method and system for allowing and preventing wireless devices to transmit wireless signals
US20060165073A1 (en) * 2004-04-06 2006-07-27 Airtight Networks, Inc., (F/K/A Wibhu Technologies, Inc.) Method and a system for regulating, disrupting and preventing access to the wireless medium
JP4592342B2 (en) * 2004-07-01 2010-12-01 株式会社バッファロー COMMUNICATION DEVICE AND COMMUNICATION DEVICE SETTING METHOD
US7343411B2 (en) * 2004-08-18 2008-03-11 Broadcom Corporation Method and system for secure management and communication utilizing configuration network setup in a WLAN
US7930737B2 (en) * 2004-08-18 2011-04-19 Broadcom Corporation Method and system for improved communication network setup utilizing extended terminals
US7760654B2 (en) * 2004-09-24 2010-07-20 Microsoft Corporation Using a connected wireless computer as a conduit for a disconnected wireless computer
US7603460B2 (en) * 2004-09-24 2009-10-13 Microsoft Corporation Detecting and diagnosing performance problems in a wireless network through neighbor collaboration
US7317914B2 (en) 2004-09-24 2008-01-08 Microsoft Corporation Collaboratively locating disconnected clients and rogue access points in a wireless network
US8196199B2 (en) * 2004-10-19 2012-06-05 Airdefense, Inc. Personal wireless monitoring agent
US8367105B2 (en) * 2004-11-10 2013-02-05 Teva Pharmaceutical Industries, Ltd. Compressed solid dosage form manufacturing process well-suited for use with drugs of low aqueous solubility and compressed solid dosage forms made thereby
KR100628325B1 (en) * 2004-12-20 2006-09-27 한국전자통신연구원 Intrusion detection sensor detecting attacks against wireless network and system and method for detecting wireless network intrusion
US7428747B2 (en) * 2005-01-25 2008-09-23 Sony Corporation Secure channel reservation
US7937755B1 (en) 2005-01-27 2011-05-03 Juniper Networks, Inc. Identification of network policy violations
US7809826B1 (en) 2005-01-27 2010-10-05 Juniper Networks, Inc. Remote aggregation of network traffic profiling data
US7769851B1 (en) 2005-01-27 2010-08-03 Juniper Networks, Inc. Application-layer monitoring and profiling network traffic
US7810151B1 (en) * 2005-01-27 2010-10-05 Juniper Networks, Inc. Automated change detection within a network environment
US7797411B1 (en) 2005-02-02 2010-09-14 Juniper Networks, Inc. Detection and prevention of encapsulated network attacks using an intermediate device
US7627123B2 (en) * 2005-02-07 2009-12-01 Juniper Networks, Inc. Wireless network having multiple security interfaces
US20060197702A1 (en) * 2005-03-01 2006-09-07 Alcatel Wireless host intrusion detection system
US7616594B2 (en) * 2005-04-22 2009-11-10 Microsoft Corporation Wireless device discovery and configuration
JP4774823B2 (en) * 2005-06-16 2011-09-14 ソニー株式会社 Wireless communication system, wireless communication setting method, wireless communication apparatus, wireless communication setting program, and wireless communication setting program storage medium
US7912017B2 (en) * 2005-06-29 2011-03-22 Sony Corporation Wireless connection system and wireless connection method
US8572733B1 (en) 2005-07-06 2013-10-29 Raytheon Company System and method for active data collection in a network security system
US7724717B2 (en) * 2005-07-22 2010-05-25 Sri International Method and apparatus for wireless network security
US8249028B2 (en) * 2005-07-22 2012-08-21 Sri International Method and apparatus for identifying wireless transmitters
ATE525843T1 (en) * 2005-08-04 2011-10-15 T mobile int ag METHOD FOR CONNECTING INTERNET-BASED FORUMS AND WEBLOGS TO A PUSH TO TALK PLATFORM
US7950058B1 (en) * 2005-09-01 2011-05-24 Raytheon Company System and method for collaborative information security correlation in low bandwidth environments
US8224761B1 (en) 2005-09-01 2012-07-17 Raytheon Company System and method for interactive correlation rule design in a network security system
US9015090B2 (en) 2005-09-06 2015-04-21 Daniel Chien Evaluating a questionable network communication
US9674145B2 (en) 2005-09-06 2017-06-06 Daniel Chien Evaluating a questionable network communication
US8621604B2 (en) * 2005-09-06 2013-12-31 Daniel Chien Evaluating a questionable network communication
US9912677B2 (en) 2005-09-06 2018-03-06 Daniel Chien Evaluating a questionable network communication
KR100678905B1 (en) * 2005-09-27 2007-02-06 삼성전자주식회사 Wireless usb host, wireless usb device, method for providing function of drd host and functioning as a drd host
US7710933B1 (en) * 2005-12-08 2010-05-04 Airtight Networks, Inc. Method and system for classification of wireless devices in local area computer networks
US8478300B2 (en) 2005-12-20 2013-07-02 Microsoft Corporation Proximity service discovery in wireless networks
US7849185B1 (en) 2006-01-10 2010-12-07 Raytheon Company System and method for attacker attribution in a network security system
US7715800B2 (en) 2006-01-13 2010-05-11 Airdefense, Inc. Systems and methods for wireless intrusion detection using spectral analysis
US9130993B2 (en) * 2006-02-09 2015-09-08 Sony Corporation Wireless connection system and wireless connection method
US8214899B2 (en) * 2006-03-15 2012-07-03 Daniel Chien Identifying unauthorized access to a network resource
US7971251B2 (en) 2006-03-17 2011-06-28 Airdefense, Inc. Systems and methods for wireless security using distributed collaboration of wireless clients
US7925765B2 (en) * 2006-04-07 2011-04-12 Microsoft Corporation Cooperative diagnosis in a wireless LAN
US10681151B2 (en) 2006-05-15 2020-06-09 Microsoft Technology Licensing, Llc Notification framework for wireless networks
US20090094111A1 (en) * 2007-10-09 2009-04-09 Microsoft Corporation Advertising framework for wireless networks
US7970013B2 (en) 2006-06-16 2011-06-28 Airdefense, Inc. Systems and methods for wireless network content filtering
KR100834758B1 (en) * 2006-07-05 2008-06-05 삼성전자주식회사 Security apparatus for computer system and method for the same
US8230505B1 (en) 2006-08-11 2012-07-24 Avaya Inc. Method for cooperative intrusion prevention through collaborative inference
US8281392B2 (en) 2006-08-11 2012-10-02 Airdefense, Inc. Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
US7672283B1 (en) * 2006-09-28 2010-03-02 Trend Micro Incorporated Detecting unauthorized wireless devices in a network
US9069957B2 (en) * 2006-10-06 2015-06-30 Juniper Networks, Inc. System and method of reporting and visualizing malware on mobile networks
CA2701689C (en) * 2006-10-06 2016-09-06 Smobile Systems, Inc. System and method of malware sample collection on mobile networks
US8069483B1 (en) 2006-10-19 2011-11-29 The United States States of America as represented by the Director of the National Security Agency Device for and method of wireless intrusion detection
US8433312B2 (en) * 2006-10-23 2013-04-30 Research In Motion Limited Methods and apparatus for scanning radio frequency bands in wireless local area networks
US8811156B1 (en) 2006-11-14 2014-08-19 Raytheon Company Compressing n-dimensional data
US8087085B2 (en) * 2006-11-27 2011-12-27 Juniper Networks, Inc. Wireless intrusion prevention system and method
US8190755B1 (en) * 2006-12-27 2012-05-29 Symantec Corporation Method and apparatus for host authentication in a network implementing network access control
US8000276B2 (en) * 2007-02-05 2011-08-16 Wefi, Inc. Providing easy access to radio networks
US20080196104A1 (en) * 2007-02-09 2008-08-14 George Tuvell Off-line mms malware scanning system and method
US20080250500A1 (en) * 2007-04-05 2008-10-09 Cisco Technology, Inc. Man-In-The-Middle Attack Detection in Wireless Networks
US7966660B2 (en) * 2007-05-23 2011-06-21 Honeywell International Inc. Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices
US20080295171A1 (en) * 2007-05-23 2008-11-27 Honeywell International Inc. Intrusion Detection System For Wireless Networks
US9109903B2 (en) 2007-10-09 2015-08-18 Microsoft Technology Licensing, Llc Transmitting location data in wireless networks
US8032939B2 (en) * 2007-11-06 2011-10-04 Airtight Networks, Inc. Method and system for providing wireless vulnerability management for local area computer networks
US7970894B1 (en) 2007-11-15 2011-06-28 Airtight Networks, Inc. Method and system for monitoring of wireless devices in local area computer networks
US9105031B2 (en) 2008-02-22 2015-08-11 Microsoft Technology Licensing, Llc Authentication mechanisms for wireless networks
US8812701B2 (en) * 2008-05-21 2014-08-19 Uniloc Luxembourg, S.A. Device and method for secured communication
US8856926B2 (en) * 2008-06-27 2014-10-07 Juniper Networks, Inc. Dynamic policy provisioning within network security devices
US8238834B1 (en) * 2008-09-11 2012-08-07 Meru Networks Diagnostic structure for wireless networks
US20100281159A1 (en) * 2009-03-31 2010-11-04 Christopher Boscolo Manipulation of dhcp packets to enforce network health policies
WO2010114937A1 (en) * 2009-03-31 2010-10-07 Napera Networks Manipulation of dhcp packets to enforce network health policies
US8694624B2 (en) * 2009-05-19 2014-04-08 Symbol Technologies, Inc. Systems and methods for concurrent wireless local area network access and sensing
US20100325720A1 (en) * 2009-06-23 2010-12-23 Craig Stephen Etchegoyen System and Method for Monitoring Attempted Network Intrusions
US8736462B2 (en) * 2009-06-23 2014-05-27 Uniloc Luxembourg, S.A. System and method for traffic information delivery
US8903653B2 (en) * 2009-06-23 2014-12-02 Uniloc Luxembourg S.A. System and method for locating network nodes
US20100321207A1 (en) * 2009-06-23 2010-12-23 Craig Stephen Etchegoyen System and Method for Communicating with Traffic Signals and Toll Stations
US20100325703A1 (en) * 2009-06-23 2010-12-23 Craig Stephen Etchegoyen System and Method for Secured Communications by Embedded Platforms
US8644188B1 (en) * 2009-06-25 2014-02-04 Amazon Technologies, Inc. Providing virtual networking functionality for managed computer networks
US9141489B2 (en) * 2009-07-09 2015-09-22 Uniloc Luxembourg S.A. Failover procedure for server system
US9456356B2 (en) * 2009-10-15 2016-09-27 Apple Inc. Methods for synchronizing data in a network
US8584228B1 (en) * 2009-12-29 2013-11-12 Amazon Technologies, Inc. Packet authentication and encryption in virtual networks
US20110191827A1 (en) * 2010-01-29 2011-08-04 Rajini Balay Detecting Unauthorized Router Access Points or Rogue APs in the Wired Network
US8515072B2 (en) * 2010-03-10 2013-08-20 Lockheed Martin Corporation Method and apparatus for providing secure communications for mobile communication devices
US9202049B1 (en) 2010-06-21 2015-12-01 Pulse Secure, Llc Detecting malware on mobile devices
US8615686B2 (en) 2010-07-02 2013-12-24 At&T Intellectual Property I, L.P. Method and system to prevent chronic network impairments
US20120170559A1 (en) * 2011-01-05 2012-07-05 Feinberg Eugene M Method and system for out-of-band delivery of wireless network credentials
US20120198541A1 (en) * 2011-02-02 2012-08-02 Reeves Randall E Methods and apparatus for preventing network intrusion
WO2013016514A1 (en) * 2011-07-26 2013-01-31 Mine Safety Appliances Company Incident management and monitoring systems and methods
US8769688B2 (en) * 2011-09-23 2014-07-01 Universidad Politécnica de P.R. Simultaneous determination of a computer location and user identification
US9100324B2 (en) 2011-10-18 2015-08-04 Secure Crossing Research & Development, Inc. Network protocol analyzer apparatus and method
AU2012100463B4 (en) 2012-02-21 2012-11-08 Uniloc Usa, Inc. Renewable resource distribution management system
US9166732B2 (en) * 2012-04-19 2015-10-20 At&T Mobility Ii Llc Facilitation of security employing a femto cell access point
US9594911B1 (en) * 2012-09-14 2017-03-14 EMC IP Holding Company LLC Methods and apparatus for multi-factor authentication risk detection using beacon images
US10084791B2 (en) 2013-08-14 2018-09-25 Daniel Chien Evaluating a questionable network communication
FR3015851B1 (en) * 2013-12-23 2017-05-19 Thales Sa MINIATURIZED SYSTEM FOR DETECTION AND CONFINED LOCALOSATION
US20150334652A1 (en) * 2014-05-16 2015-11-19 Cisco Technology, Inc. Selectively powering inline devices of a network device based on client device presence
US10402557B2 (en) 2014-09-10 2019-09-03 Uniloc 2017 Llc Verification that an authenticated user is in physical possession of a client device
US10111094B2 (en) 2014-09-25 2018-10-23 United States Of America, As Represented By The Secretary Of The Air Force Wireless intrusion detection and device fingerprinting through preamble manipulation
US10469477B2 (en) * 2015-03-31 2019-11-05 Amazon Technologies, Inc. Key export techniques
NL1041509B1 (en) * 2015-10-08 2017-04-26 Assumite Gladium Spiritus B V Activation procedure for low radiation wireless networks.
FR3046310B1 (en) * 2015-12-29 2018-01-05 Thales METHOD OF UNIVALENT AND UNIVOQUE ASSOCIATION BETWEEN EMITTERS AND TRANSMISSION RECEIVERS FROM THE PROPAGATION CHANNEL
US10419458B2 (en) 2016-01-21 2019-09-17 Cyiot Ltd Distributed techniques for detecting atypical or malicious wireless communications activity
US10360742B1 (en) * 2016-04-22 2019-07-23 State Farm Mutual Automobile Insurance Company System and method for generating vehicle crash data
US10542006B2 (en) 2016-11-22 2020-01-21 Daniel Chien Network security based on redirection of questionable network access
US10382436B2 (en) 2016-11-22 2019-08-13 Daniel Chien Network security based on device identifiers and network addresses
CN107509200A (en) * 2017-09-30 2017-12-22 北京奇虎科技有限公司 Equipment localization method and device based on wireless network invasion
US11188622B2 (en) 2018-09-28 2021-11-30 Daniel Chien Systems and methods for computer security
US10979896B2 (en) * 2018-11-20 2021-04-13 International Business Machines Corporation Managing dynamic lockouts on mobile computing devices
US10848489B2 (en) 2018-12-14 2020-11-24 Daniel Chien Timestamp-based authentication with redirection
US10826912B2 (en) 2018-12-14 2020-11-03 Daniel Chien Timestamp-based authentication
RU2716871C1 (en) * 2019-03-19 2020-03-17 Дмитрий Михайлович Михайлов System and method of protecting electronic control systems of vehicles from unauthorized intrusion
US11677754B2 (en) 2019-12-09 2023-06-13 Daniel Chien Access control systems and methods
US11509463B2 (en) 2020-05-31 2022-11-22 Daniel Chien Timestamp-based shared key generation
US11438145B2 (en) 2020-05-31 2022-09-06 Daniel Chien Shared key generation based on dual clocks
TWI742704B (en) * 2020-06-01 2021-10-11 台眾電腦股份有限公司 Network connection management system for information device
US11233860B1 (en) * 2020-11-20 2022-01-25 Grand Dunes Entry Systems, LLC Microcontroller device for secure communication

Family Cites Families (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4792946A (en) 1987-04-07 1988-12-20 Spectrum Electronics, Inc. Wireless local area network for use in neighborhoods
US4951029A (en) 1988-02-16 1990-08-21 Interactive Technologies, Inc. Micro-programmable security system
US5325419A (en) 1993-01-04 1994-06-28 Ameritech Corporation Wireless digital personal communications system having voice/data/image two-way calling and intercell hand-off
US5586266A (en) 1993-10-15 1996-12-17 International Business Machines Corporation System and method for adaptive, active monitoring of a serial data stream having a characteristic pattern
US5555376A (en) 1993-12-03 1996-09-10 Xerox Corporation Method for granting a user request having locational and contextual attributes consistent with user policies for devices having locational attributes consistent with the user request
US5812865A (en) 1993-12-03 1998-09-22 Xerox Corporation Specifying and establishing communication data paths between particular media devices in multiple media device computing systems based on context of a user or users
EP0658021B1 (en) 1993-12-08 2001-03-28 International Business Machines Corporation A method and system for key distribution and authentication in a data communication network
US5854985A (en) 1993-12-15 1998-12-29 Spectrum Information Technologies, Inc. Adaptive omni-modal radio apparatus and methods
US6285318B1 (en) 1994-12-13 2001-09-04 Neil Charles Schoen Micro-miniature beacon transmit-only geo-location emergency system for personal security
US6028551A (en) 1994-12-13 2000-02-22 Schoen; Neil Charles Micro-miniature beacon transmit-only geo-location emergency system for personal security
US5796832A (en) 1995-11-13 1998-08-18 Transaction Technology, Inc. Wireless transaction and information system
US5737318A (en) 1995-12-27 1998-04-07 Philips Electronics North America Corporation Method for initializing a wireless, packet-hopping network
US5912882A (en) 1996-02-01 1999-06-15 Qualcomm Incorporated Method and apparatus for providing a private communication system in a public switched telephone network
US6014557A (en) 1996-03-14 2000-01-11 Bellsouth Intellectual Property Corporation Apparatus and methods for providing wireless system fraud and visibility data
US6088450A (en) 1996-04-17 2000-07-11 Intel Corporation Authentication system based on periodic challenge/response protocol
US5915226A (en) 1996-04-19 1999-06-22 Gemplus Card International Prepaid smart card in a GSM based wireless telephone network and method for operating prepaid cards
US5787154A (en) 1996-07-12 1998-07-28 At&T Corp Universal authentication device for use over telephone lines
US5815553A (en) 1996-10-02 1998-09-29 Mcdonnell Douglas Corporation Apparatus for voice communication over local area networks
US6009247A (en) 1996-10-29 1999-12-28 International Business Machines Corporation Portable computer network
US5953652A (en) * 1997-01-24 1999-09-14 At&T Wireless Services Inc. Detection of fraudulently registered mobile phones
US5892442A (en) 1997-01-29 1999-04-06 Ozery; Nissim Two-way pager alarm system
US6252883B1 (en) 1997-02-27 2001-06-26 Aloha Networks, Inc. Home and personal data services overlay communications system
US6028933A (en) 1997-04-17 2000-02-22 Lucent Technologies Inc. Encrypting method and apparatus enabling multiple access for multiple services and multiple transmission modes over a broadband communication network
US5959287A (en) 1997-04-23 1999-09-28 Lxe Inc. Apparatus and method for supporting a cradle
US6102284A (en) 1997-04-23 2000-08-15 Lxe Inc. Cradle for holding a device
US6298250B1 (en) 1997-06-19 2001-10-02 Kimberly Nanette Engen Wireless prepaid telephone system with extended capability
US6049710A (en) 1997-06-19 2000-04-11 Kimberley Nanette Engen Wireless prepaid telephone system with dispensable instruments
US6308053B1 (en) 1997-06-19 2001-10-23 Byard G. Nilsson Recyclable wireless telephone unit with a secured activation switch
US6230002B1 (en) 1997-11-19 2001-05-08 Telefonaktiebolaget L M Ericsson (Publ) Method, and associated apparatus, for selectively permitting access by a mobile terminal to a packet data network
FI108827B (en) 1998-01-08 2002-03-28 Nokia Corp A method for implementing connection security in a wireless network
US6088804A (en) 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US6317831B1 (en) 1998-09-21 2001-11-13 Openwave Systems Inc. Method and apparatus for establishing a secure connection over a one-way data path
US6195547B1 (en) 1998-09-24 2001-02-27 Telefonaktiebolaget Lm Ericsson (Publ) System and method for a previously activated mobile station to challenge network mobile station knowledge during over the air activation
US6327570B1 (en) 1998-11-06 2001-12-04 Dian Stevens Personal business service system and method
US6141544A (en) 1998-11-30 2000-10-31 Telefonaktiebolaget Lm Ericsson System and method for over the air activation in a wireless telecommunications network
US6014558A (en) 1998-12-28 2000-01-11 Northern Telecom Limited Variable rate optional security measures method and apparatus for wireless communications network
US6487666B1 (en) 1999-01-15 2002-11-26 Cisco Technology, Inc. Intrusion detection signature analysis using regular expressions and logical operators
US6104785A (en) 1999-01-20 2000-08-15 Tempa Communication Inc. Subscriber control unit for united home security system
US6300902B1 (en) 1999-02-10 2001-10-09 At&T Corp Personalized locator method and apparatus
US6281790B1 (en) 1999-09-01 2001-08-28 Net Talon Security Systems, Inc. Method and apparatus for remotely monitoring a site
US6362736B1 (en) 2000-01-04 2002-03-26 Lucent Technologies Inc. Method and apparatus for automatic recovery of a stolen object
US6310549B1 (en) 2000-08-29 2001-10-30 Digitech International Wireless security system
US6947726B2 (en) * 2001-08-03 2005-09-20 The Boeing Company Network security architecture for a mobile network platform
US20030151513A1 (en) 2002-01-10 2003-08-14 Falk Herrmann Self-organizing hierarchical wireless network for surveillance and control
US20030188190A1 (en) 2002-03-26 2003-10-02 Aaron Jeffrey A. System and method of intrusion detection employing broad-scope monitoring
US7277404B2 (en) 2002-05-20 2007-10-02 Airdefense, Inc. System and method for sensing wireless LAN activity
US7383577B2 (en) 2002-05-20 2008-06-03 Airdefense, Inc. Method and system for encrypted network management and intrusion detection

Also Published As

Publication number Publication date
WO2003101023A2 (en) 2003-12-04
CA2484041C (en) 2012-09-11
AU2003237842A1 (en) 2003-12-12
AU2003237842A8 (en) 2003-12-12
WO2003101023A3 (en) 2004-04-01
US20030217289A1 (en) 2003-11-20
DE60334689D1 (en) 2010-12-09
EP1506637B1 (en) 2010-10-27
EP1506637A2 (en) 2005-02-16
EP1506637A4 (en) 2006-12-20
ATE486439T1 (en) 2010-11-15
US7778606B2 (en) 2010-08-17

Similar Documents

Publication Publication Date Title
CA2484041A1 (en) Method and system for wireless intrusion detection
US7039017B2 (en) System and method for detecting and locating interferers in a wireless communication system
EP1726151B1 (en) System and method for client-server-based wireless intrusion detection
US7339914B2 (en) Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US8254847B2 (en) Distributed wireless communications for tactical network dominance
WO2004023730A3 (en) System and method for remotely monitoring wirless networks
CN101136801B (en) Network fault detecting method
WO2007061167A1 (en) Wireless access point apparatus and a network traffic intrusion detection and prevention method using the same
CN103763695B (en) Method for evaluating safety of internet of things
CN105228143A (en) A kind of refuse messages discrimination method, device and terminal
CN113890645B (en) Signal receiving adjustable system based on data communication
EP1542406B1 (en) Mechanism for detection of attacks based on impersonation in a wireless network
CN106961693A (en) A kind of method for determining radio reception device working channel based on practical communication data cases
CN102833720A (en) Roaming system selecting access points through wireless access control device and method thereof
CN102711099A (en) Safety routing method and system capable of resisting interference attacks
AU2021100084A4 (en) IOT-Enable Wireless Sensor Networks for controlled And Safe Routing
CN110316229B (en) Wireless attack detection method for CBTC system vehicle-ground wireless network
KR102624374B1 (en) Communication system supporting wireless communication and terminal sensing through a plurality of frequency bands
CN111479271B (en) Wireless security detection and protection method and system based on asset attribute marking grouping
CN106851645A (en) A kind of power system APN private network defence methods attacked towards pseudo-base station
Harrington et al. Concepts and applications of wireless security systems for tactical, portable, and fixed sites
CN117896751A (en) Network state determining method, related equipment and medium
CN107371180A (en) Wireless self-networking link detection method and system
Sugantha et al. Anomaly detection of the NAV attack in MAC layer under non-time and time-constrained environment
CN116056032A (en) Wireless sensing detection communication control system with high safety performance

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20220301

MKLA Lapsed

Effective date: 20200831