The present invention relates generally to computer networking techniques. More particularly, the invention provides a system and method of unauthorized wireless access detection.
Wireless networking devices namely those utilizing the Ethernet 802.11 protocol for connection share common industry standard. This standard dictate discovery, connection setup, maintenance, and finally connecting teardown.
It is an object of the present invention to provide a system and method for improved unauthorized wireless access device detection.
In accordance with a preferred embodiment of the present invention, a method for detecting and remediating unauthorized wireless access devices on local area computer networks comprises detecting, using a wireless network interface all relevant wireless devices and their device metadata within the geographic region, detecting, using any appropriate network interface any relevant network devices to perform detection of unauthorized access wireless devices, extracting, device metadata and or network heuristics data, cataloging all relevant device data as detected, cataloging all relevant network heuristics data as detected, identifying, devices based on network heuristics' and or device metadata, comparing, identified devices against known heuristics and or device properties to determine remediation action, and remediating identified devices to remove or limit their access.
In another embodiment of the present invention, a system for detecting and remediating unauthorized wireless access devices comprises a processor, a network communication interface, and a memory coupled to the processor, wherein the processor is configured to detect wireless devices and their metadata properties within transmission, as well as the detection of network heuristics for proposes of detecting and identifying rouge wireless device and performing remediation actions as appropriate.
Other objects and advantages will become apparent from the following descriptions, taken in connection with the accompanying drawings, wherein, by way of illustration and example, embodiments of the present invention are disclosed.
The novel features believed to be characteristic of the invention are set forth in the appended claims and claims yet to be filed. However, the invention itself, as well as preferred modes of use and further objectives and advantages thereof, will best be understood by reference to the following detailed description when read in conjunction with the accompanying Figures wherein:
Detailed descriptions of the preferred embodiments are provided herein. It is to be understood, however, that the present invention may be embodied in various forms. Therefore, specific details disclosed herein are not to be interpreted as limiting, but rather as a basis for the claims and as a representative basis for teaching one skilled in the art to employ the present invention in virtually any appropriately detailed system, structure or manner
Turning to the Figures, the unauthorized wireless access detector utilizes these protocols along with additional intelligence and process steps to automate detection, and neutralization of rouge access point devices attempting to perform intercept attacks also known as man in the middle attacks where by on wireless networks rouge devices emulate the legitimate access points, see
A rogue access point, 202, 203, 204, is a wireless access point that has been installed on network without explicit authorization from a local network administrator, whether added by a well-meaning employee or by a malicious attacker. These networks may be a private network such as is seen within a corporate workspace or a public network provided by an organization for patrons.
This has resulted in information security concerns for people using Wi-Fi in internet cafes and other public Wi-Fi congregation spots where there is an ever-growing prevalence of rouge access points and exploitation of patrons with the explicit intent of illegally intercepting sessions and capturing sensitive user data. This can be seen in
As envisioned the unauthorized wireless access detector can be installed permanently in a cafe, corporate office, or even carried as a personal protection device but in a physical for or as software on their device.
The unauthorized wireless access detector looks to provide an automatable solution that enables both the detection and neutralization of these rouge devices through any single technique or any combination of industry standard protocols, Machine Learning, Network Infrastructure insights and other detection techniques. The solution can be operated as a software solution on an individual user end point, or as a software solution added to an existing access point or as a standalone solution with as little as a single Wi-Fi interface.
In the preferred embodiment the unauthorized wireless access detector looks to first understanding the environment
In another instance of the unauthorized wireless access detector a local database of SSIDs and good authorized Access Point mac addresses is stored on the unauthorized wireless access detector through use programming either directly through a user interface such as a webpage, an app.
In yet another instantiation of the solution the unauthorized wireless access detector installed as software on the access point directly in this method the unauthorized wireless access detector software would operate as above in detecting rouge access points through but may also self-protect through network heuristics and metadata. This self-protect technique is similar to a traditional firewall or intrusion detection system today but operating on network heuristics and metadata.
In yet another instantiation of the solution the unauthorized wireless access detector is programed through an external system, this may include a protocol delivery of data, a pull of data and or a programmatic connection to a wireless access point(s) and or wireless controller.
In yet another instance the unit may self-program using machine learning to see what access points are legitimate versus rouge. This learning may use a combination of fully unique fields, semi-unique fields, Geo information, time and or any other types of meta and session data available. In addition, any number of external data sources may be called upon to support machine learning and decision engine.
In addition, the unauthorized wireless access detector may build a shared configuration database, shared peer to peer and or, hosted on a local server and or on the cloud. This configuration database will synchronize as needed or on a schedule.
Once configured the unauthorized wireless access detector may be gathering information about Rouge access points and/or devices that have been diverted to them. When a rouge device is detected actions are executed based on a ruleset. These actions will include issuance of a De-Author similar session disruption technique to any devices attempting to communicate with the rouge access point and or any number of additional system alerts.
The unauthorized wireless access detector will collect its needed information based on its instantiation. In a software only mode, the unauthorized wireless access detector may be added to an existing hardware platform with capabilities of capturing Wi-Fi data as part of its native functions. An example of this may be a next generation access point with unauthorized wireless access detector as a feature.
The most basic instantiation of the unauthorized wireless access detector is a computing device with a single network interface shared by all functions. This manifestation will have varying capabilities and may gather information about rouge access points based on third party network nodes such as another vendor's access point. This instantiation may also utilize the third party devices to relay traffic on its behalf. Or it may perform these actions on its own.
In a software implemented embodiment, see
While the invention has been described in connection with preferred embodiments, it is not intended to limit the scope of the invention to the particular forms set forth, but on the contrary, it is intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims, and claims that may issue.
This application claims the benefit of U.S. Provisional Application No. 62/672,630, filed May 17, 2018, incorporated herein by reference.
| Number | Date | Country | |
|---|---|---|---|
| 62672630 | May 2018 | US |