GB2389483A - Wireless monitoring for performance and security of network - Google Patents

Wireless monitoring for performance and security of network Download PDF

Info

Publication number
GB2389483A
GB2389483A GB0208353A GB0208353A GB2389483A GB 2389483 A GB2389483 A GB 2389483A GB 0208353 A GB0208353 A GB 0208353A GB 0208353 A GB0208353 A GB 0208353A GB 2389483 A GB2389483 A GB 2389483A
Authority
GB
United Kingdom
Prior art keywords
product
unique
lt
ability
thc
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0208353A
Other versions
GB0208353D0 (en
Inventor
Richard G Fleming
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
APOAPSIS Ltd
Original Assignee
APOAPSIS Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by APOAPSIS Ltd filed Critical APOAPSIS Ltd
Priority to GB0208353A priority Critical patent/GB2389483A/en
Publication of GB0208353D0 publication Critical patent/GB0208353D0/en
Publication of GB2389483A publication Critical patent/GB2389483A/en
Application status is Withdrawn legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/12Fraud detection or prevention
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance or administration or management of packet switching networks
    • H04L41/28Security in network management, e.g. restricting network management access
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing packet switching networks
    • H04L43/12Arrangements for monitoring or testing packet switching networks using dedicated network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

Monitoring transmissions in the vicinity of a wireless unit in order to provide fault protection, configuration management and tracking, auditing accounting and related functions, performance management and security monitoring. The system monitors broadcasts by other manufacturer's equipment such as Bluetooth, HomeRF and IEE802.11a, IEE802.11b or IEE802.11g standard transmissions. The system may be a software system that passively monitors transmissions to determine which are secure and which are insecure, as well as determining traffic metrics, and may be operated independently, in situ.

Description

Patent Application Product Description

For A Wireless Monitoring and Security Device Overview This document Will describe the c oncept and attributes of a wireless monitoring and security device for purposes of patent application The product Is intended to provide monitoring of a variety of wre!es s ncworks for fault, dent,ficat,on, configuration tracking, accour,+,ng Q auditing' performance management and security purposes Basic Description

The product will utlilse unique software written by Apoapsis Ltd to perform wireless network montonog functions of À Fault identity cation À Configuration management & tracking À Audbog, accounting and related functions À Performance management functions À Security monitoring functions The product will be a hardware based unit,nanufactured by a th', d party The patent applied for by Apoapsis Is for the software functions described above, offered on a hardware system.

addressr1g wireless networks The patent application concerns the unique cornbnaton of features offered In the unique format proposed Sepoe of Operation The product will monitor traffic In wireless networks by listening to nformatun broadcasted on the air by other manufacturers equipment The product is primarily focussed on current and emerging standards of wireless networks Including IEEE 802 11b, IEEE 802 11a, IEEE 802 11g, HomeF:F, HomeRF2 0, HperLan2, Bluetooth Basic Operation The product Is a hardware unit (we are not applying for patent on this unit), on which our unique software wrii be executed This, software we Wise wireless network hardware to receive radio information Our unique software will perform basic operation of recent packets from the air À decoding packets received scan through all available channels automatically (frequency scanning) À Identifying different stations communicabnq À identifying different conversations between stations À denlfyng different types of stations À identifying traffic volumes by venous methods À Identifying friendly and unfriendly stations À Identifying friendly and unfriendly traffic ty:>es (e g attack À Identifying secure and insecure access points À Identifying secure and nsecul-e stations À address the general montonog 'unctions outlined In Basic Descnptron above uniquely offer this mixture of,unctons using our proprietary software À uniquely offer this mixture of Functions on a dedicated hardware platform

while (more packets received) do if packet Is IEEE 802 11 beacon frame then decode-beacon-frame { /dendfy source stat/on (from frame decode) store in list of access poets If new then start timer for this record } else If packet Is IEEE &02 11 data frame ther7 decode-data-frame { Identify source stat/on (frorr7 frame decode) reentry destination.stahon (front frame decode) If frame-WEP-flag = 1 then update stat/on list record as a secure stat/on oputate access pout list as secure access point else Ipo.7te stat/or, list re:;o/d as /nse::u/e stat/on Mae direct, 2C!'?f!.. ?C!!!-e Brcecs 7!.t end/f } end/f end/t for each Stanton record //7 stators i/st do If new station and /'as insecure data then alarm - stat/on Is insecure end/f endtor for each st&7t/on m access point l/st do if new access pent and has insecure data then alarm - access point Is Insecure end/f endfor endwhile This unique algorithm decodes the on their traffic and Infers which stations are secure and Insecure completely passively The other methods of achieving this activity involve active attempts to utlse the network and Identify actively which Is secure or Insecure We believe our approach Is new, inventive. unique and vastly superior to other approaches

Unique Combination of Features We belcve our unique combination of monotony features, station dentfcabon, and security montonng and weakness detection Is worthy of a patent We believe that our product concept as a whole is unique in this respect Other products are available which offer security monitoring for different network types, and other analysis tools are available which analyse wireless and other network types Our product combines these monotone features In one unique software engine, analyzing all traffic continually and snaking Inferences about the security of that network and calculating Important traffic metrics across that network. I he system calculates a s,gn,fcant number of metrics on thtS trathc using a variety of statstc.al methods too long to publish In this document We do not wish to patent the calculations but the unique combination of functions addressing wireless networks Fully Autom_tc OrJerabon We believe another aspect of our product is the fully automatic operation of the unit Our product Is unique In concept In that it will monitor wireless networks n-situ and does not require a human to continually control it (as do other products). This unique feature Is due to the intelligence we build into our product to enable it to monitor traffic continually without filling up" a buffer and to make continual assessment of security and packet contents The product Is also engineered to enable 24 hour' 7 day a week operation uninterrupted This enables deployment of the product in a building and hands-off fully automatic operation We believe this Is a untrue way of monitoring wireless networks without human intervention For c,s;ort We are applyr-g for a patent for our products unique combination of features, unique,nethod of use, and unique security dentfcaton alronthm described above We believe this Is untufted as our product is À New - we do not know of any other product which performs this func.ton À Inventive Step - unique method of use and features, and unique alyonthm À Industrial Application - this product has wide commercial application.

À Not Excluded - the product!s not excluded from patent cover .4Je are app!yng for a pa!ent or the product as a whc!e and believe that the combratron of features and Inventive steps In total more than Justify this application Further nfornnaton Is available upon request at the above address

The dentfcaton of secure and Insecure access points requires some further explanation as this is a primary unique feature of our product Our product analyses traffic using a unique aigonthrn to identify the traffic flows between those wireless access points and client devices which is secure and that which is not We believe our product is unique in this respect as it performs the chcc's cornpiu=iy passveiy By irstemng to traffic broadcast on the air and analysin3 it to r,,ake this udgemer,t usir,g Our unique aigont,im An access point is a ferns, u' cornmuncatons device which enables wireless networks and may be configured securely or insecurely A primary feature of our product is to identify these Furthermore. this identification is done continually using dedicated hardware such that any Occurrence is found rapidly unlike any other product we are aware of Uniquspe_ f Product We wish to patent our unique combination of hardware and software and the way of use of the product Other products exist wl,cL; perform interactive human haven analysis running on laotops, but even these do not perform our unique functions fully Other products are designed to be earned by a human user and used on an ad-hoc basis rather like a portable measuring device 1 A primary unique feature of our product is to offer a broad range of monitoring functions On dedicated hardware (not laptop) which will remain n-stu and continually monitor wireless broadcasts in it's immediate vcmty We believe this is a unique product addressing a,,ew market and we wish to protect our intellectual property by patent 2 We also consider our combination of montonng features is unique, having a broad array of wonton nnnabltes combined with em irity n,u,toy capooi'tes.

3 We also consider the hands-off fully automatic operator of our product to be a unique feature We believe there are no other products offering this fully automate n-

situ monionng function for wireless networks 4 We also believe our software feature which Denies secure and insecure access points and stations passively and continually to be a unique feature

a) _etalled Descrloton Our product offers the features described above on a dedicated hardware platform which Is designed to remain n-situ and provide long-term continuous mon!tonn3 of wireless networks We believe this Is unique!r ^.rc!cs,,etvior,,,ontonug as we are aware of no other product which!S designed to work in this way This Is a unique feature of our product and an cnt!ca!!y Important factor In enabling the other functions that we offer We believe this feature uniquely differentiates this offering from other laptop based "carry-around" solutions which we consider similar to analytical lest metres rather than our long-term montonng tool Our product is designed to be placed In buildings utls!ng wireless networks of the types described above In.Cir:ope of (operation These networks are comprised of access points, bridges or repeaters and stations The stations may be desktop PGs or laptops or servers or other computer systems of almost any type These stations communicate with eachother directly (point to point) or with a Wireless Access Point device (access point) Access points Join the wireless network with a oLys!cal terrestrial network (often Ethernet but other types possible) The purpose of wireless networks Is to allow access to information on a terrestrial network without needing a physical cable attached to the station concerned The operation of these networks Is fac!irtated by standards created by the IEEE and others as defined under Scope of Operation above The wireless networks operate over variable physical distances affected by the strength of tl,e radio signal being used This means that a large buidng will often have many wireless networks Installed - roqured to provide wireless access throughout the building This also means that wireless networks can be accessed from outside a building as radro waves do not stop at the walls This In turn mea!ls that drve-by-hackng (illegal use of computer systems) Is possible as someone outside a building could access a wireless network inside a building To add!css this issue an:] otiler monitoring requirements, we have Invented our product. This product Is a hardware device which!S places within the area of operation of a wireless network (so it can receive the radio signals and will then listen for and Identify what Is !,appenng on the wireless network This device Will also perform a unique security weakness dentfcaton procedure using our unique algorithm Unique Algorithm Using our knowledge of wireless networks we have devised a unique algorithm which we will rise In our product to Identify potent,a!!y insecure access por,ts Access points can be configured using a feature of the IEEE standard called WEP (Wired Equivalent Pnvacy) This encrypts wre!ess trsf!c between stations so that an unauthor!sed station (e 9. a drive by hacker) cannot utl!se the network However, it Is often the case that access Joints which have this WEP capability do not have it configured It is also possible that direct staton-to-

stat!on communication will! not use WEP security This means that hackers can easily see the Information flowing between stations and "snoop" on confidential Information. To prevent this most com,oan,zs us,n3 w,reiess netvcrs enforce the use of 'vAv'EF' security, but us tints requires human Intervention to configure, it is often not done, leaving Insecure access points and stations In the network Our unique algorithm decodes the wireless data traffic flowing between stations and access points and passively identifies secure and insecure access points and stations Operation of Unique Algorithm The unique algorithm asters for wireless data packets using!EEE 802 11 standard framing.

These frames are decoded and the access points and stations Identified, and the secure and Insecure conversations identified By combining these sources of Information we can identify Insecure and secure access points (by reference) This IS all performed completely passively using our unique decode algorithm The section of pseudocode below describes the operation of this algorithm

Claims (1)

  1. Patent Application (claims Document For A NYir Bless l\lonitorinn anti
    Sec''rit!)eN-icc introduction
    This clocumet 11 describe the Claris for patent application nut:ibCr 02() Si353.3 - WIRELESS MONlTORL4\iCr & SECLKITY DEVTC'L Claire pro. I
    A pnn?arv ul?tuc feature of cur Product is to offer a led rape of nOnttOrin functions on cicclcted hardware (not a laptop) wilicl will remain iD-SitZ} and continually monitor IN ireless lr-o.?clcast:s no it's innate vicinity. we bCliCN C this is a nqrc product addrcssnr a flew nartct and NN'e wish to protect our intellecttral property by patent.
    ( ID al No.2 We also consder our connation of nonitorin, featrres s uniqUe7 h,LNYI]1(r a broafl array of niorlitorl capbilitics conbne<? \vth. security niontori' = capahi ltcs.
    C laiin l\;v 3 N'Ve ils i lis!de! tile ?l.ltll c!f '.,!ly ciiitCIiAttiG Vi'w.!Oil 01 Oiii}3rt)tillCi lt) tc ulilquc fctule 'c C1;CN.,rC: i.C i, <, tl,i l,fvcriits, lt i-iii_:iiS fii'l iit,i,,.i.i. iii-siii;i,oi;iic,;-iii iiiiictioi fji wircless nCtNNiorks.
    C 1 No 4 NA c also believe otr sofiNN:are feattT-c W11!C11 icicnt LIGS secure aDCi insCclire access points ad stalons passiN cly anc1 cotilua]ly to bc a unique feature C laim 1Vo 5 I lc alility of our pro:lLEct to '1rack: xtations' is a UTlit;C feature Our pTocluct can idenliiy the l, cation nf ireJess de\!ces hrotl!l slg!lc!l stnrigtl1 nio!ltorinV and st!1. latc 1h,sc ai loc 1'iol In an area rl hs s a uriquc f. ature o' r 1lrocluct ClaiTI- 1<o.6 he bi.Tity of ou.-,rod.,ct to, a;;tori.at,cally iistiriguisl1 nci clas::ilry tlic dilrrcrericc bctvec,, t>cs >f wireless sL-ltion trarismitting on-tlle-air IS.a unque icaturc. Our product can dentfy thc dffercncc letwcen laptops, access pOii1ts, virtua] nult-cast addresses a1d otl1er transmtt1Y devices ad automatically classfy tlesc types oi device.
    Clam No.7 l he ability of oir product to identify secure or insccurc wrelcss clevccs is unque. T],is s done ly dstnusl1ing automatcally betNrcen the stations USilg WEP or not. It is also achieved by dctcctng N7PN products uSing LPSec. Our product can tiereforc unquely dfferentate hctwecn di l [Lrcnt types of w ircicss secunty i USC and alert users when neither arc in use. This is a unique Icaturc.
    ? Claim No Tle ability of our product to atitomatically detect Cisco s LEAP and standard FAP autllcntcations is unique. Phe abilty of our prodct to dcrti fy the Csco l.l NT' srr nnc.for aa T,]iN'i3; sNreless dewcc automatica11y s UTLQUC.
    Clan1 No.9 Tl1e ab1ity of Oi.iT- prodfuct lo ictect Instanccs of wireless hrilgTng and send a1 a]arm messagie wllcn fou,,d s unque. Fl1s is Llc deiecton of unusual aceess-poit to acCcss-point traf:fic patterls.
    Claim No.10 l: he ablity of our procluct to cletcct pee--to-peer h affic and send a alarn W]ICTl fourd s uqe.
    This is thc detceton of rnu.iual or not pemitted traft^ic patLels hetween subodinate v!rcless devees. Clain ?\'o. I lhc abiLty of OWT pTodilCt to idientfy Roamingr rsers and distinguish autonatically betwccn those users wth w?reless cleviCos mo\nU tlro;g1out a butdin, and those sJtically locatUL1 is a unique [eattrc. iDc product will uilqucly dc;tly thcsc clevicc lc],av?ours a??d 3ei?erate an alam1 wlc!? fotiltl. (lairl No.l: ilC i?llC111"1t COl]VC\O?- e?"ilie Cll?t'Ct!!e of r,'!r,'ct;;.;I.ci.;e lia\ r=, pposo ticsi=rlc.1 <tis irill?-i-caclcd l,I\rcis e?le Tlis is ''lJI''e!ld c,lsta!l!!,!ly d!ff r!lt f!-or,!ly other ';1alyz.cr as it ?S dcs,ncd lor uattccled CO.?lt?nUOtIS 94]lOUrS a dDy Ope?dtiO;l.
    (la?l N<. 13 Thc _ene?-c wrclcss sccrrity aomaly Ictcction enTinc built ?nlo otr product s U1JiQUC. rl'hiS c?=r?;?e autonatica11y dlercntiates bOt\\ ecil norma17 w?relcss trallic ilell.lVEou?s and 'alonnal' Tls SoftiNOtC CO?llpO??C?]t ol OU? product colTtains unique l;?lou!letiac aTId olters u?Ique capahilitis to dc?cct wirclcss attacks of many types. lt can detect dcal o6Servicc attaclks, security inLns?o?s, attO??1pteCi SOCUTity ??lt?iTSiOUS. it C1 also detect devicc conf'='uration enors or oti?er;faulty' traltc pattO?llS aUtOTl]3L?Ccilly TlliS gC?lCliC WiTCIeSS SCCUTity cUTO?1111y dCteCtioT] CTIt'ille iS dTiere?lt IlOlT1 !]y OlIlC! teclluolowy O? ptO']UCt 011 t}le ?lkTT kCt.
    Clai1 No. 1 d, 1 11C ahlty of our p?oduct lo JULO?1t?C111N'cletcCt UT1ISU<11 tafrc kel?ovio!s i!1 tle uu!-->less R09.1 1 protocol SUTtC of ma?Ta,e?TTCT?t.ssocirtc a?lcl!laTIage?lct disTssociatc l} TI1CS jS Un;C] Ue.
    Claim No 15 The ablit\ of 'OU?- producL to automatically detect unusual traffc hchaNiours in the wre]css 809.] 1 protocol sUltc of:klagcllclt lutilenticatc a?1 n?aT1agCT?]e?lt dCaUt]TC?liTCtitC ficUlTCS TS U?lTyUC.
    Clain1.?\lo. 1 G T]e abilTty of OU? product to auto?llaticalllr, detect unusTal traffic behavours in thc wn-clcss S02. 1 1 protocol suTtc of maTideinCnt p?Obe ?CqUC'St a?T] rnanaement probe reply fra?nes is unique
    ( late N-o.17 The ability oLour product to identify wireless cleNiccs through automatic analysts and Inference Is ul]lque Ut roduct can find st; tors 1 deat ryi= onl: c,i,c lialf ol tlc ccnvc rsation patr anrt thus xte, c= St.it}'.,! titSCO\ 7''. le\.7061 lor! r 'l<Te tlr!T}l I?r-, 'ce of t!e cte co';. rs.to partner. This s a unlue vvncless analyss (caturc.
    Clain No.1 flc ability of our product to automatcally track wireless dCvice coNvetsttolls tS a unique feature.
    The prc,iiict can auton.aticall;y- iecord ail aily-e relatonslips lc:twecn traisn-'litg 802.1 l vrcl css dc ices (lai Nio. 19 The iilty of our lrorluct io aralyze S()2. 1 Ib ttat.iiC contnuously for sccurty a1d pctformalce ald audit infonnatjo s Utll9UC.
    (: lain lVo O Tle ability ol o'r prodict to analyle;'() 1'a traffic c<'ulinuously for scccrty and pcrtonnancc and audit nfonnation s tn7quc.
    ('lctill] 'o I TIIC a6\lily of OU! product to a:al:/e S()9 1 1, traftic contiirosly for sccrrty anCl pCrfoi-lanCc ad aridit \fo!!ato! s '!!,i/'e Clalll o. ? thc ability of our product to araly/c S(??.1 I traltc contiuously for security an1 perfonacc an1 audt nnation is unique.
    (:lairn No.3 Lhc ability of our prodrct to a.alvz.c 8()?.1 1 i traffic contnuously for secn ity and 1erfonnancc and audt nfornatioZ is unquc.
    Cl litl1 No.?4 lle alilty of orr 1'roduc' to aalyze mu!,?l: types o f S(!?. 1 I traffic j1 a sin!e p!lyscal tat coitinously is a unique fcclturc.
    (. NT..,
    v. I tTiIII I t1,.. _/ l he ahlty of our product to detect <my mantlacturcr-dciault SSIO n use on" lle-ar is a untue feature ol our product.
    Clan No 2(j Thc ability of OUr procluct to autoTnatically dctcct a W{ ANJack wTrcluss attack type TS UTliqUC.
    I jETTII N0 27 Thc ability of o:r product to autornatTcally dCtCCt a ESSI1)-.1ack WTT Bless;ttack tc TS tnique.
    (laTIl1 l\io.S lle abi!ty OT OUi protiuct to autoTTiatcally detect a MOFTIGY JaOI: Nxreless attack type is uTique
    (lain!xTo 29 Tlle ablty of OtI? product to automatically iletcct a l\lanin-the-141iddlc wireless attack tNpC 1.s unque. lam No.30 The ablty of our procluet to automatically detect a lake Aeecss Point Floocl uireless atLael; tyle s iquc. Tlls is also sonctmes refcrrecl to as the BlaelAlehen1y l aleAP attael<.
    Claim No 31 flc abilty of our procluct to autorlatieally cieteet a NetSttmbicr seen or,tt.acl< is unique.
    C'laitn No.32 fic abilty of our procitiet to dst,guish betwccn a iNctSttniicr attacker aZd a NctSttunller N Ictim is a u3clue feature.
    C laim No.33 IIZe abilty of ou'- product to artomatically dctcCt a DStUmblC-r attack is uiquc Claim 140.34 I-'llc allIlity of our procluet to automatiealiv detect Wcilenreiter attack is unique.
    C'lai: No.3: 11 niiri!7 ot our proluct to ilcntfy nac-ac-k-css-spoofin.,. s uiclue FIis is ckr_ by ntel=c,t aralysis f t affic secluencirc pattem.s.
    C'lairn 'o 3(.) l llc ahlity ot our procitct to difIcrcntiatc arton, Jtccally Lctwocn actiN7c wIrcicss sc.anninr!-,y a haclcr anl rcncral back rroundi traffic or mscoifiguration is ucc.
    (ilam No 37 f!e atility of o,r 'rocifct to autonlatical], ClOnl'fy lult y stations USi'1'g.1tc!!u,cn"Bless o-tIc ar a:Llysis s in4ue. This s done tlrou rl itelLgont analysis of S()7 I L ilotiy trainc leliaviours.
    ('lain No.3cY ri he ability of or procluct to,automatically dcrtfy perforn1ancc problems on any wreless dcvicc (aCCCSS POI1]1, Stat jOn Or any other type) LIsin:,;lialysis of siual strength, nosc strength and tra. slit speecl s unique.
    C lam No.39 Thc ability of our proluct to automatically i:lentf: any perioml.uice falts arsi Iron sIow (: ONTICC transinit.spCcd or range ssucs is unquc.
    C'lain 1''o.4() 11e ablity of our product to automatcally ident fy any con'ested physical a-cas due to cxcessve vu Bless activity (hot spot detccton) s nnqe.
    TO ClaTT11 No 41 lhc ability of our product to idcnti fy any performance faults tltrouh automatic Van ireless traffic Iccl mo'toriU s unquc.
    C!aim No 49 I lc ability of our pTod!ct to control alaml N olrmc tlronul atolatic alann \;olume suppre.sson is uniqtic Il1 a \Y reless devcc Claitl No.43 Tl,e Scntry-lCP prot.,col used IJY our -proltict is unique. fI,is protocol is used tv con,rlunicate sectrely and rel!ably bctwec, ary. C;crt > dc!icc;nd tlZc co;sole procluct. Tle protocol c peration echanisn an<1 self-descrbin7 data fo-nat rs unque Claim Nio 44 llc ntell:,ct eclge device and iow lladwdtl protocol (Seitry-TC,) s a unclue des',' fcatrrc of OUf proGuct.
    C lar NTo 45 Thc statclirl atdTt capabil!ty of our procln,Gt is tiniqUC. Lach Sc!try can 'eme!nber7 foud devices !i7cl utollatically clisti'Z,ursl lc twc e1 tlZcse (!11 cs dcvces Z07lattc7 W1CT c it s OT iS InoVCd to.
    C laim No 4(, l:lic atil]7ty of O!!r t!orit!Ct i O; IGC LiiitC'i-..c TCIlZOiC CouiloiiCtl acket capture IS uI7iquc. L.IC}l U.i-j 'c-;cc cii 1; liiSii;iC;3 usi-. - lC7itiy- vl i,iC,i.,CC;i to cc,uin,ciicc Of CG.iS p.C. Kt CcijJitfC;.
    C la {Z1 0 4 7 I lc ability vf OU! product to nrovide Acal-tine ?aclcet ca?ture strca!li7l is unique. this featu!-e allows ou product to calture data on-tllc-a7r ir1 real tine anc3 stream up to rOmotc server n real t'nc. Othcr.UlLA1YSIS pAodcts o:c-ate on,i stoAc-]cl-107Id 171CCIlaTliSIZl OT O!] a calturc-lalyze cycle. ur poluct is uni4Lc i rllat t pcrfonns rcal-t77le ca}tu7e Cmd strcaTnmg.
    (:lain No.48 fhc al:7!Tt y cf our proUtct to pcrforlT tl1C COT]] billOtiO!1 of arT or all oi au7'tnlr, falT]t-finding' perfomance nanageme!,t, pacl<et capture, i:truson detccton and anomaly cletccton for wreLess net\Noris lS unique. Other poclucts uay provide oe aspect of tlls only, Nve claim that our proclt!ct is un!qtc n ts ahlty to pcrf->rm any or all of rlcse funclios simultaneousily.
    C laim 1\'o.49 lhe abilty of our procluct to ploN'iLlO dual inl!-mation clclverv lehavours is unI4ue. Tllis Is the delverv of alarn data to alan11 nlana'cmGnt systems a!:l tabular audt data into clatahasc systems.
    l hs ablty arscs from autolJatc clual-mode analyss.
    Clain No.S() The abihty of our techlology to prc:,vide clual-node analysis oLwircless infornaton s unique. Tlc collectou of nformation ancl automatic analysis into alarm' type infonnation and 'audit/h!storc' t!/pc: information is unqtic. The atlty ol our product to automatically and simultaneously identify ancl deliver boll types of nformation iltO both types Of end-systeni is unque in any wrcless management or sccurty device.
    Claim No.51 file ability of our product to auto?llatcally smooth performance data using mOV?ng-aNrCraG srnootugc analysis Is un,uc,1-iis inshore ensu? es coniniLous steaLly-statc analysis of traffic and ala?ln ?fonnarioil. Oincr ranagcmenZ or analysis systems rchcve lilts bcne]It through llost Gaptu?c analysis or tertiary syslCms. Tlle unique aspect of our product Is that tills is done at source in rcal-til1lc co?ltinuously. We ciain1 that tins IS a unique feature.
GB0208353A 2002-04-11 2002-04-11 Wireless monitoring for performance and security of network Withdrawn GB2389483A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0208353A GB2389483A (en) 2002-04-11 2002-04-11 Wireless monitoring for performance and security of network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0208353A GB2389483A (en) 2002-04-11 2002-04-11 Wireless monitoring for performance and security of network

Publications (2)

Publication Number Publication Date
GB0208353D0 GB0208353D0 (en) 2002-05-22
GB2389483A true GB2389483A (en) 2003-12-10

Family

ID=9934665

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0208353A Withdrawn GB2389483A (en) 2002-04-11 2002-04-11 Wireless monitoring for performance and security of network

Country Status (1)

Country Link
GB (1) GB2389483A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7154874B2 (en) 2003-12-08 2006-12-26 Airtight Networks, Inc. Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US7406320B1 (en) 2003-12-08 2008-07-29 Airtight Networks, Inc. Method and system for location estimation in wireless networks
US7440434B2 (en) 2004-02-11 2008-10-21 Airtight Networks, Inc. Method and system for detecting wireless access devices operably coupled to computer local area networks and related methods
US7536723B1 (en) 2004-02-11 2009-05-19 Airtight Networks, Inc. Automated method and system for monitoring local area computer networks for unauthorized wireless access
US7710933B1 (en) 2005-12-08 2010-05-04 Airtight Networks, Inc. Method and system for classification of wireless devices in local area computer networks
US7856209B1 (en) 2003-12-08 2010-12-21 Airtight Networks, Inc. Method and system for location estimation in wireless networks
US7970894B1 (en) 2007-11-15 2011-06-28 Airtight Networks, Inc. Method and system for monitoring of wireless devices in local area computer networks

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002001832A1 (en) * 2000-06-26 2002-01-03 Nokia Corporation Device and methods for screening access to a computer network in a telecommunication system
EP1317112A2 (en) * 2001-11-29 2003-06-04 Stonesoft Corporation Handling connections moving between firewalls

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002001832A1 (en) * 2000-06-26 2002-01-03 Nokia Corporation Device and methods for screening access to a computer network in a telecommunication system
EP1317112A2 (en) * 2001-11-29 2003-06-04 Stonesoft Corporation Handling connections moving between firewalls

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"www.mazunetworks.com/white_papers/Mazu_Perimeter_Whitepaper.pdf" Mazu networks, white paper on Powersecure (TM) wireless perimeter security *
US2002/032854 A1 *
US2003/084321 A1 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7154874B2 (en) 2003-12-08 2006-12-26 Airtight Networks, Inc. Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US7406320B1 (en) 2003-12-08 2008-07-29 Airtight Networks, Inc. Method and system for location estimation in wireless networks
US7804808B2 (en) 2003-12-08 2010-09-28 Airtight Networks, Inc. Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US7856209B1 (en) 2003-12-08 2010-12-21 Airtight Networks, Inc. Method and system for location estimation in wireless networks
US7440434B2 (en) 2004-02-11 2008-10-21 Airtight Networks, Inc. Method and system for detecting wireless access devices operably coupled to computer local area networks and related methods
US7536723B1 (en) 2004-02-11 2009-05-19 Airtight Networks, Inc. Automated method and system for monitoring local area computer networks for unauthorized wireless access
US8789191B2 (en) 2004-02-11 2014-07-22 Airtight Networks, Inc. Automated sniffer apparatus and method for monitoring computer systems for unauthorized access
US9003527B2 (en) 2004-02-11 2015-04-07 Airtight Networks, Inc. Automated method and system for monitoring local area computer networks for unauthorized wireless access
US7710933B1 (en) 2005-12-08 2010-05-04 Airtight Networks, Inc. Method and system for classification of wireless devices in local area computer networks
US7970894B1 (en) 2007-11-15 2011-06-28 Airtight Networks, Inc. Method and system for monitoring of wireless devices in local area computer networks

Also Published As

Publication number Publication date
GB0208353D0 (en) 2002-05-22

Similar Documents

Publication Publication Date Title
Abbas et al. Mobile edge computing: A survey
CN1316400C (en) Detecting an unauthorized station in a wireless local area network
KR101357713B1 (en) System and method for network management
US6697337B1 (en) Method and apparatus for capture, analysis and display of packet information sent in an IEEE 802.11 wireless network
US8086227B2 (en) Collaboratively locating disconnected clients and rogue access points in a wireless network
US9003527B2 (en) Automated method and system for monitoring local area computer networks for unauthorized wireless access
KR101237303B1 (en) Wireless Local Area Network (WLAN) method and system for presence detection and location finding
JP4515451B2 (en) Wireless local area network system with self-configuration and self-optimization
JP4485176B2 (en) Proprietary WI-FI architecture for 802.11 networks
US7340247B1 (en) Wireless network infrastructure including wireless discovery and communication mechanism
ES2389651T3 (en) Automatic detection of wireless network type
CN101019444B (en) Method and system for improved WLAN location
JP2004046666A (en) Method for controlling information network system, information network system, and mobile communication terminal
US7489661B2 (en) Dynamic transmit power configuration system for wireless network environments
US7647048B2 (en) Selecting a hidden network to connect a user to a wireless local area network
Coleman et al. Cwna: certified wireless network administrator official study guide: exam Pw0-105
US7961645B2 (en) Method and system for classifying devices in a wireless network
CN100479364C (en) Network service information providing system, device and method and terminal
EP2561708B1 (en) Method and apparatus for determining access point service capabilities
JP5568650B2 (en) System and method for evaluating multiple connectivity options
US8559927B2 (en) Dummy information for location privacy in location based services
US20110307621A1 (en) Method for implementing a convergent wireless local area network (wlan) authentication and privacy infrastructure (wapi) network architecture in a local mac mode
US20110293090A1 (en) Av data receiving device, av data receiving method, and av data transmission and receiving system
US8548506B2 (en) Wireless station location detection
US7346338B1 (en) Wireless network system including integrated rogue access point detection

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)