Systems and methods consistent with the principles of the present disclosure relate generally to cyber security, and more particularly, the present disclosure relates to systems and methods of creating network singularities for network connected devices deployed over a shared network.
Internet of Things (IoTs) may offer distinct advantages across multiple disciplines such as, but not limited to, entertainment systems, medical equipment, kiosks, electric charging stations, security and surveillance, collaboration systems, and building management. These IoTs may be network connected devices designed to perform designated tasks. Such IoTs and other network connected devices such as desktop computers, application servers, and laptops may represent cyber-security, data manipulation, and data theft risks when deployed over a shared network along with plurality of other network connected devices. Further, many of the network connected devices may not provide methods and procedures to install security agent software such as anti-virus agents for added protection. In addition, system anomalies or system vulnerabilities in one or more network connected devices may have the potential to impact the remainder of the network connected devices in a shared network deployment. Further, many of the network connected devices may not provide adequate protection against access to their default services such as web-servers. When deployed in a shared network topology, anyone with access to the same network may gain unauthorized access to such network connected device's services. Additionally, a vulnerable network connected device may be exploited by adversaries to use its resources for unlawful activities thereby impacting the reputation of the network owner. Further, in a shared network deployment, broadcast packets such as address resolution protocol (ARP) packets may be broadcasted affecting the performance of the connected devices as well as share broadcasting device's information. Additionally, in a shared network, it may be inefficient to apply network access policies for individual devices.
Accordingly, in order to reduce the associated risks and improve system efficiencies, it is desirable to employ systems and methods of creating network singularities for each of the network connected device. It is further desirable to detect unauthorized communication between network connected devices and generate appropriate system alerts when the presence unauthorized communication is detected. Additionally, it is desirable to have a mechanism to stop proliferation of unauthorized communication on the shared network. Further, it is desirable to have authentication and network access policy control for communication to and from the connection devices within each of the network singularities.
U.S. Pat. No. 9,210,192B1 entitled Setup of multiple IOT devices assigned to Belkin International Inc. describes a way to setup of multiple devices to a shared local area network. While the described techniques fail to provide protection against unauthorized communication between devices deployed over a shared network.
U.S. Pat. No. US20120284299A1 entitled Preventing leakage of information over a network by International Business Machines Corp. describes instructions for determining whether or not the information to be acquired by the original request is singular with respect to a request previously issued request as stored in a request log in which a history of search values is registered. Such techniques fail to provide protection against unauthorized communication between devices deployed over a shared network.
U.S. Pat. No. US20050246767A1 entitled Method and apparatus for network security based on device security status assigned to Avaya Inc. describes methods and apparatus for device's security update status to determine version level of one or more security features of the device. However, such techniques fail to provide protection against unauthorized communication between devices deployed over a shared network.
Conventional systems and methods do not provide adequate protection against unauthorized communication between network connected devices deployed over a shared network. In these respects, systems and methods of creating a network singularity for a network connected device deployed over a shared network and analyzing the network traffic for detecting unauthorized communication between network connected devices according to the present disclosure substantially departs from the conventional concepts and designs of the prior art, and in so doing provides methods and systems primarily developed for the said purpose.
In one aspect, the present disclosure provides systems and methods of creating a network singularity for a network connected device.
In another aspect, the present disclosure provides systems and methods of creating a network singularity for a network connected device deployed over a shared network and analyzing the network traffic for unauthorized communication.
In yet another aspect, the present disclosure provides systems and methods of creating a network singularity for a network connected device deployed over a shared network wherein the shared network may be a data link layer (L2) network or a network layer (L3) network or a combination thereof.
In yet another aspect, the present disclosure provides systems and methods of creating a network singularity for a network connected device deployed over a shared network, analyzing the network traffic to detect unauthorized communication, and providing a system alert indicating associated network singularity's involvement in unauthorized communication.
In yet another aspect, the present disclosure provides systems and methods of creating a network singularity for a network connected device deployed over a shared network, analyzing the shared network traffic to detect unauthorized communication, providing a system alert indicating unauthorized communication, and restricting network access for associated network singularity.
In yet another aspect, the present disclosure provides systems and methods of creating a network singularity for a network connected device deployed over a shared network and providing restricted network access to the associated network singularity.
In yet another aspect, the present disclosure provides systems and methods of creating a network singularity for a network connected device deployed over a shared network and the systems and methods comprising of one or multitude of default gateways and access control systems for the network singularity.
In yet another aspect, the present disclosure provides systems and methods of creating a network singularity for a network connected device deployed over a shared network and the systems and methods comprising of a security policy database comprising of network access control and security policies for the network singularity.
In yet another aspect, the present disclosure provides systems and methods of creating a network singularity for a network connected device deployed over a shared network and the systems and methods comprising of a security policy database providing application programming interface (API) for the network singularity's security policy updates.
In yet another aspect, the present disclosure provides systems and methods of creating a network singularity for a network connected device deployed over a shared network and the systems and methods comprising of interfaces and access to various functions necessary for the network connected device's expected operations.
In yet another aspect, the present disclosure provides systems and methods of creating a network singularity for a network connected device deployed over a shared network and the systems and methods comprising of an administrative portal to manage administrative functions further comprising of visualization of device traffic statistics, definition of network access control policies, definition of security policies, notification of system alerts, enumeration of network connected devices and the network singularities along with their respective attributes, definition of chaining additional network functions, and configuration of administrative settings such as account credentials, system settings, network preferences, alert preferences, and configuration settings for interfacing with external systems.
According to yet another aspect, the present disclosure relates to systems and methods of creating a network singularity for a network connected device deployed over a shared virtual local area network (VLAN). While a shared network such as VLAN allows for communication between the network connected devices, the proposed systems and the methods include assigning unique network subnets for the network connected devices and assigning a default gateways for each of the subnets. According to the exemplary aspect, each of the subnets comprises of four (4) Internet protocol (IP) addresses for the network connected device, broadcast traffic, the network singularity address, and a default gateway. Further, according to this exemplary aspect, such a subnet may be defined as network singularity. Additionally, since the network connected device may be the only network connected device within the network singularity, communication with applications or devices outside of the network singularity may be required to pass through the default gateway address of the network singularity. The default gateway may be responsible for forwarding traffic to other devices or applications. Further, a traffic inspection system may be deployed over the same VLAN to inspect broadcast traffic such as address resolution protocol (ARP) traffic. Since network singularity's communication may pass through the default gateway, attempts to bypass this method may be detected by the inspection system and the system may generate an unauthorized communication alert. Subsequently, the default gateway may restrict the network singularity from participating in further communication on the shared network. Further, according to this exemplary aspect, one or multitude of the default gateways may be hosted at a remote location and the communication between the network connected device and respective default gateway may be established over one or multitude of tunnel encapsulation protocol such as Virtual Extensible LAN (VXLAN) or L2 over Generic Routing Encapsulation (GRE) protocols.
According to yet another aspect, the present disclosure relates to systems and methods of creating a network singularity for multitude of network connected devices deployed over a shared VLAN wherein the network connected devices within the VLAN may have the authorization to communicate with each other without the need to pass through the default gateway of the network subnet. As per the exemplary aspect, such a subnet may be defined as network singularity. Communication with applications or devices outside of the network singularity may be required to pass through the default gateway. An unauthorized request to the network singularity may result in an unsolicited response towards the gateway for the associated network singularity. Further, the network singularity's gateway may be instructed to drop unsolicited responses thereby interrupting attempted unauthorized communication with the network singularity.
According to yet another aspect, the present disclosure relates to systems and methods of creating a network singularity for a network connected device deployed over a shared VLAN. The proposed systems and the methods include a centralized security policy database that may host security policy table for the network singularity. Traffic to and from the network singularity may be subjected to the associated security policy enforcement wherein the policies are derived from the database. Additionally, application programming interface (APIs) may be published for updating network singularity specific security policies.
According to yet another aspect, the present disclosure relates to systems and methods of creating a network singularity for a network connected device deployed over a shared VLAN. The proposed systems and the methods may include an out-of-band monitoring device to sit passive on the network without modifying or altering any of the network traffic. Additionally, the proposed out-of-band monitoring device may be of type Switch Port Analyzer (SPAN) or a Test Access Point (TAP). Such a monitoring device may detect presence of communication between IP address of any of the network connected device and an IP address not assigned as the default gateway of the network connected device. Additionally, the monitoring device, as per the proposed systems and methods may analyze IP traffic source and destination port numbers to detect presence of unsolicited communication. The proposed systems and methods may also generate an administrative alert indicating presence of such communication. Further, the proposed systems and methods may identify the network connected device using the IP traffic attributes.
According to yet another aspect, the present disclosure relates to systems and methods of creating a network singularity for a network connected device deployed over a shared. VLAN. The proposed systems and the methods may include an out-of-band monitoring device to sit passive on the network without modifying or altering any of the network traffic. Additionally, the proposed out-of-band monitoring device may be of type Switch Port Analyzer (SPAN) or a Test Access Point (TAP). Such a monitoring device may track bidirectional connection state for all communication and detect presence of multitude of default gateway IP addresses within the network. The proposed systems and methods may generate an administrative alert indicating presence of such communication. Further, the proposed systems and methods may identify the default gateway using the IP traffic attributes.
According to yet another aspect, the present disclosure relates to systems and methods of creating a network singularity for a network connected device deployed over a shared VLAN. The proposed systems and the methods may include one or multitude of out-of-band monitoring devices and inline unsolicited communication detection methods whereby one or more of the proposed systems and methods are integrated within the network appliances such as switches, routers, wireless access points, or network security appliances.
The present disclosure is illustrated and described herein with reference to the various drawings, in which like reference numbers are used to denote like system components/method steps, as appropriate in which:
Reference will now be made in detail to embodiments, examples of which are illustrated in the accompanying drawings. In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present aspect. However, it will be apparent to one of ordinary skill in the art that the present aspect may be practiced without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks have not been described in detail so as not to unnecessarily obscure aspects of the embodiments.
It will also be understood that, although the terms first, second, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another. For example, a first contact could be termed a second contact, and, similarly, a second contact could be termed a first contact, without departing from the scope of the present aspect. The first contact and the second contact are both contacts, but they are not the same contact.
The terminology used in the description of the present aspect herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the present disclosure. As used in the description of the present disclosure and the appended claims, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will also be understood that the term “and/or” as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
As used herein, the term “if” may be construed to mean “when” or “upon” or “in response to determining” or “in response to detecting,” depending on the context. Similarly, the phrase “if it is determined” or “if (a stated condition or event) is detected” may be construed to mean “upon determining” or “in response to determining” or “upon detecting (the stated condition or event)” or “in response to detecting (the stated condition or event),” depending on the context.
The foregoing description, for purpose of explanation, has been described with reference to specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the present disclosure to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described in order to best explain the principles of the present disclosure and its practical applications, to thereby enable others skilled in the art to best utilize various aspects of the present disclosure and various embodiments with various modifications as are suited to the particular use contemplated. The present disclosure should therefore not be limited by the above described embodiment, method, and examples, but by all embodiments and methods within the scope of the present disclosure and appended claims.
Further, as illustrated in
In further detail, still referring to
In further detail, still referring to
Similarly, in further detail, still referring to
In further detail, still referring to
In further detail, still referring to
As illustrated in
The IP Address Management 710 system illustrated in
In further detail, still referring to
Further, the network singularity system 80 may probe multiple databases using the contents of the DHCP packets in order to gather attributes of the network connected device. Additionally, the gathered attributes may be recorded in a database. The network singularity system 80 may continue to receive 802 and monitor 810 the packet stream. If the DHCP packets are not received 820, the network singularity system 80 may continue to receive 802 and monitor 810 the incoming packet stream.
The computer device 1000 may further include input/output (I/O) devices 1008 such as a microphone, sensors, display, keyboard, cursor control, remote control, gaming controller, image capture device, and so forth and communication interfaces 1010 (such as network interface cards, modems, infrared receivers, radio receivers (e.g., Bluetooth)), antennas, and so forth.
The communication interfaces 1010 may include communication chips (not shown) that may be configured to operate the computer device 1000 in accordance with a Global System for Mobile Communication (GSM), General Packet Radio Service (GPRS), Universal Mobile Telecommunications System (UMTS), High Speed Packet Access (HSPA), Evolved HSPA (E-HSPA), or LTE network. The communication chips may also be configured to operate in accordance with Enhanced Data for GSM Evolution (EDGE), GSM EDGE Radio Access Network (GERAN), Universal Terrestrial Radio Access Network (UTRAN), or Evolved UTRAN (E-UTRAN). The communication chips may be configured to operate in accordance with Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Digital Enhanced Cordless Telecommunications (DECT), Evolution-Data Optimized (EV-DO), derivatives thereof, as well as an other wireless protocols that are designated as 3G, 4G, 5G, and beyond. The communication interfaces 1010 may operate in accordance with other wireless protocols in other embodiments.
The above-described computer device 1000 elements may be coupled to each other via a system bus 1012, which may represent one or more buses. In the case of multiple buses, they may be bridged by one or more bus bridges (not shown). Each of these elements may perform its conventional functions known in the art. In particular, the system memory 1004 and the mass storage devices 1006 may be employed to store a working copy and a permanent copy of the programming instructions implementing the operations associated with the network topologies and processes described in reference to
In various aspects, one or more of the modules 1024 may be implemented in hardware integrated with, e.g., communication interface 1010. In other aspects, one or more of the modules 1024 (or some functions of the modules 1024) may be implemented in a hardware accelerator integrated with, e.g., the processor 1002, to accompany the central processing units (CPU) of the processor 1002 to execute the processes 400, 500, 800, 900 described herein in reference to
Referring again to
At least one of the processors 1002 may be packaged together with memory having the computational logic 1022 (or portion thereof) configured to practice aspects of embodiments described in reference to
In various implementations, the computer device 1000 may comprise a desktop computer, a server, a router, a switch, or a gateway. In further implementations, the computer device 1000 may be any other electronic device that processes data.
Although certain aspects have been illustrated and described herein for purposes of description, a wide variety of alternate and/or equivalent aspects or implementations calculated to achieve the same purposes may be substituted for the aspects shown and described without departing from the scope of the present disclosure. This application is intended to cover any adaptations or variations of the embodiments discussed herein.
Examples of the methods and/or systems of various aspects of the present disclosure are provided below. An aspect of the methods and/or systems may include any one or more than one, and any combination of, the examples described below.
Example 1 is a method including: creating a network singularity for a network connected device over a shared network; and analyzing network traffic across the shared network to detect unauthorized communication from the network connected device.
Example 2 may include the subject matter of Example 1, and further may include detecting an unsolicited response from the network connected device; and discarding unsolicited response packets.
Example 3 may include the subject matter of any one or more of Examples 1-2, and further may include detecting the unsolicited response from the network connected device via passively monitoring network traffic.
Example 4 may include the subject matter of any one or more of Examples 1-3, and further may include generating system alert events; and recording the system alert events in a database.
Example 5 may include the subject matter of any one or more of Examples 1-4, and further may include taking remedial action for the network connected device; and restricting network access for the network singularity.
Example 6 may include the subject matter of any one or more of Examples 1-5, and further may include leveraging traffic details to access a device information database; and updating device attributes in the device information database.
Example 7 may include the subject matter of any one or more of Examples 1-6, and further may include providing security and access control for the network singularity.
Example 8 may include the subject matter of any one or more of Examples 1-7, and further may include creating a network subnet, the network subnet including: a default gateway internet protocol (IP) address; and a network connected device IP address; instantiating the default gateway for the network singularity; and recording and managing IP addresses for the network singularity.
Example 9 may include the subject matter of any one or more of Examples 1-8, and further may include instantiating the default gateway for the network singularity at a remote location; and providing network connectivity to the default gateway via protocol tunneling.
Example 10 may include the subject matter of any one or more of Examples 1-9, and further may include detecting inactivity of the network connected device for a predetermined period of time; deconstructing an associated configuration of the default gateway; and deconstructing an associated subnet.
Example 11 may include the subject matter of any one or more of Examples 1-10, and further may include providing centralized security policy database hosting security and access control policies for the network singularity, the centralized security policy database further comprising an application programming interface for policy updates; updating policies using application programming interface; and enforcing security policies for the network singularity.
Example 12 may include the subject matter of any one or more of Examples 1-11, where the application programming interface further may include recording transactions using blockchain proof-of-work based methods.
Example 13 is a method including: creating a network singularity for a network connected device over a shared network; analyzing network traffic across the shared network to detect unauthorized communication from the network connected devices; detecting unsolicited response from the network connected device; discarding unsolicited response packets; detecting the unsolicited response from the network connected device via passively monitoring network traffic; generating a system alert event; recording the system alert event in a database; taking remedial action for the network connected device; restricting network access for the network singularity; leveraging traffic details to access a device information database; updating device attributes in the device information database; security and access control for the network singularity; creating a network subnet that further may include: a default gateway internet protocol (IP) address; and a network connected device IP address; instantiating the default gateway for the network singularity; recording and managing IP addresses for the network singularity; instantiating the default gateway for the network singularity at a remote location; providing network connectivity to the default gateway via protocol tunneling; detecting inactivity of the network connected device for a predetermined period of time; deconstructing an associated configuration of the default gateway; deconstructing an associated subnet; enforcing security policies for the network singularity; providing centralized security policy database hosting security and access control policies for the network singularity, the centralized security policy database further comprising an application programming interface for policy updates; updating policies using application programming interface; and recording transactions by using blockchain proof-of-work based methods.
Example 14 is a network singularity system for a network connected device over a shared network, the network singularity system including: a processor coupled to a memory, the processor configured to execute a plurality of instructions, wherein when executed by the processor cause the network singularity system to: analyze network traffic of the shared network to detect unauthorized communication from the network connected device; and generate an internet protocol (IP) subnet for the network singularity.
Example 15 may include the subject matter of Example 14, and further may include a plurality of instructions executed by the processor to cause the network singularity system to: detect an unsolicited response from the network connected device; and discard unsolicited response packets.
Example 16 may include the subject matter of any one or more of Examples 14-15, and further may include a plurality of instructions executed by the processor cause the network singularity system to: passively monitor the network traffic; and detect unsolicited response from the network connected device via passively monitored network traffic.
Example 17 may include the subject matter of any one or more of Examples 14-16, and further may include a plurality of instructions executed by the processor cause the network singularity system to: generate system alert events; and record the system alert events in a database.
Example 18 may include the subject matter of any one or more of Examples 14-17, and further may include a plurality of instructions executed by the processor cause the network singularity system to: take remedial action for the network connected device; and restrict network access for the network singularity.
Example 19 may include the subject matter of any one or more of Examples 14-18, and further may include a plurality of instructions executed by the processor cause the network singularity system to: leverage traffic details to access a device information database; and update device attributes in the device information database.
Example 20 may include the subject matter of any one or more of Examples 14-19, and further may include a security and access control system for the network singularity.
Example 21 may include the subject matter of any one or more of Examples 14-20, and further may include a plurality of instructions executed by the processor cause the network singularity system to: create a network subnet where the subnet further may include: a default gateway IP address; and a network connected device IP address; instantiate the default gateway for the network singularity; and record and manage IP addresses for network singularity.
Example 22 may include the subject matter of any one or more of Examples 14-21, and further may include a plurality of instructions executed by the processor cause the network singularity system to: instantiate the default gateway for the network singularity at a remote location; and a system for providing network connectivity to the default gateway via protocol tunneling.
Example 23 may include the subject matter of any one or more of Examples 14-22, and further may include a plurality of instructions executed by the processor cause the network singularity system to: detect the network connected device's inactivity for a certain period of time; deconstruct associated default gateway configuration; and deconstruct associated subnet.
Example 24 may include the subject matter of any one or more of Examples 14-23, and further may include a centralized security policy database system to host security and access control policies for the network singularity, the centralized security policy database system further may include: an application programming interface for the security policy updates; and a security policy enforcer for the network singularity.
Example 25 may include the subject matter of any one or more of Examples 14-24, and further may include: a plurality of instructions executed by the processor cause the network singularity system to record transactions using blockchain proof-of-work based systems.
Example 26 is a network singularity system for a network connected device over a shared network, the network singularity system including: a processor coupled to a memory, the processor configured to execute a plurality of instructions, wherein when executed by the processor cause the network singularity system to: analyze network traffic of the shared network to detect unauthorized communication from the network connected device; generate an internet protocol (IP) subnet for the network singularity; detect an unsolicited response from the network connected device; discard unsolicited response packets; passively monitor the network traffic; detect unsolicited response from the network connected device via passively monitored network traffic: generate system alert events; record the system alert events in a database; take remedial action for the network connected device; restrict network access for the network singularity; leverage traffic details to access a device information database; update device attributes in the device information database; create a network subnet wherein the subnet further may include: a default gateway IP address; and a network connected device IP address; instantiate the default gateway for the network singularity; record and manage IP addresses for network singularity; instantiate the default gateway for the network singularity at a remote location; a system for providing network connectivity to the default gateway via protocol tunneling; detect the network connected device's inactivity for a certain period of time; deconstruct associated default gateway configuration; and deconstruct associated subnet.
Example 27 may include the subject matter of Examples 26, and further may include a security and access control system for the network singularity.
Example 28 may include the subject matter of any one or more of Examples 26-27, and further may include: a centralized security policy database system to host security and access control policies for the network singularity, the centralized security policy database system further may include: an application programming interface for the security policy updates; and a security policy enforcer for the network singularity.
Example 29 may include the subject matter of any one or more of Examples 26-28, and further may include a plurality of instructions executed by the processor cause the network singularity system to record transactions using blockchain proof-of-work based systems.
Although certain aspects of the foregoing description, for purpose of explanation, have been described with reference to specific aspects, the illustrative discussions above are not intended to be exhaustive or to limit the various aspects of the present disclosure to the precise forms disclosed. Many modifications and variations are possible in view of the above teachings. The disclosed aspects were chosen and described in order to best explain the principles of the present disclosure and its practical applications, to thereby enable others skilled in the art to best utilize the various aspects of the present disclosure with various modifications as are suited to the particular use contemplated. Accordingly, a wide variety of alternate and/or equivalent aspects or implementations calculated to achieve the same purposes may be substituted for the aspects shown and described without departing from the scope of the present disclosure. This application is intended to cover any adaptations or variations of the aspects discussed herein.
This application claims priority under 35 U.S.C. § 119 to U.S. Provisional Patent Application No. 62/813,160, filed, Mar. 4, 2019, and titled SYSTEMS AND METHODS OF CREATING NETWORK SINGULARITIES and to U.S. Provisional Patent Application No, 62/897,373, filed, Sep. 8, 2019, and titled SYSTEMS AND METHODS OF CREATING NETWORK SINGULARITIES, each of which is hereby incorporated by reference herein in its entirety.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2020/020593 | 3/2/2020 | WO |
Number | Date | Country | |
---|---|---|---|
62813160 | Mar 2019 | US | |
62897373 | Sep 2019 | US |