WO2006091944A3 - Location-based enhancements for wireless intrusion detection - Google Patents

Location-based enhancements for wireless intrusion detection Download PDF

Info

Publication number
WO2006091944A3
WO2006091944A3 PCT/US2006/006923 US2006006923W WO2006091944A3 WO 2006091944 A3 WO2006091944 A3 WO 2006091944A3 US 2006006923 W US2006006923 W US 2006006923W WO 2006091944 A3 WO2006091944 A3 WO 2006091944A3
Authority
WO
WIPO (PCT)
Prior art keywords
location
intrusion detection
wireless intrusion
based enhancements
sent
Prior art date
Application number
PCT/US2006/006923
Other languages
French (fr)
Other versions
WO2006091944A2 (en
Inventor
Nancy Cam Winget
Mark Krischer
Timothy S Olson
Sheausong Yang
Original Assignee
Cisco Tech Inc
Nancy Cam Winget
Mark Krischer
Timothy S Olson
Sheausong Yang
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cisco Tech Inc, Nancy Cam Winget, Mark Krischer, Timothy S Olson, Sheausong Yang filed Critical Cisco Tech Inc
Priority to CN200680001657.3A priority Critical patent/CN101189858B/en
Priority to EP06736279.8A priority patent/EP1851981B1/en
Publication of WO2006091944A2 publication Critical patent/WO2006091944A2/en
Publication of WO2006091944A3 publication Critical patent/WO2006091944A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0492Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload by using a location-limited connection, e.g. near-field communication or limited proximity of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W40/00Communication routing or communication path finding
    • H04W40/24Connectivity information management, e.g. connectivity discovery or connectivity update
    • H04W40/246Connectivity information discovery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/18Self-organising networks, e.g. ad-hoc networks or sensor networks

Abstract

In a wireless local area network, a method for detecting the presence of an unauthorized device comprises: detecting the presence of neighboring devices from which management frames can be sent; saving a representation of each neighboring device present; receiving a management frame purporting to be from one of the detected device; determining that the received management frame was sent by an unauthorized device; and indicating the presence of the unauthorized device.
PCT/US2006/006923 2005-02-25 2006-02-27 Location-based enhancements for wireless intrusion detection WO2006091944A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN200680001657.3A CN101189858B (en) 2005-02-25 2006-02-27 In a wireless local area network for detecting the method for the existence of unwarranted equipment
EP06736279.8A EP1851981B1 (en) 2005-02-25 2006-02-27 Location-based enhancements for wireless intrusion detection

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/066,009 2005-02-25
US11/066,009 US20060193299A1 (en) 2005-02-25 2005-02-25 Location-based enhancements for wireless intrusion detection

Publications (2)

Publication Number Publication Date
WO2006091944A2 WO2006091944A2 (en) 2006-08-31
WO2006091944A3 true WO2006091944A3 (en) 2008-01-17

Family

ID=36928116

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2006/006923 WO2006091944A2 (en) 2005-02-25 2006-02-27 Location-based enhancements for wireless intrusion detection

Country Status (4)

Country Link
US (2) US20060193299A1 (en)
EP (1) EP1851981B1 (en)
CN (2) CN100490569C (en)
WO (1) WO2006091944A2 (en)

Families Citing this family (106)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7477913B2 (en) * 2005-04-04 2009-01-13 Research In Motion Limited Determining a target transmit power of a wireless transmission according to security requirements
US20070066308A1 (en) * 2005-09-06 2007-03-22 Oleg Andric Method and apparatus for removing phantom children in an ad-hoc communication system
TWI272795B (en) * 2005-09-09 2007-02-01 Hon Hai Prec Ind Co Ltd Method and system for detecting a rogue access point and device for determing the rogue access point
TW200721861A (en) * 2005-09-09 2007-06-01 Nokia Corp Use of measurement pilot for radio measurement in a wireless network
US20070081503A1 (en) * 2005-10-07 2007-04-12 Carl Mower System and method for evaluating operation of a wireless device in a wireless network
US20070091858A1 (en) * 2005-10-24 2007-04-26 Xiaohua Wu Method and apparatus for tracking unauthorized nodes within a network
US7577424B2 (en) * 2005-12-19 2009-08-18 Airdefense, Inc. Systems and methods for wireless vulnerability analysis
US7570625B1 (en) * 2006-01-10 2009-08-04 Tw Acquisition, Inc. Detection of wireless devices
KR20090017701A (en) * 2006-04-25 2009-02-18 인터디지탈 테크날러지 코포레이션 High-throughput channel operation in a mesh wireless local area network
US8081996B2 (en) * 2006-05-16 2011-12-20 Honeywell International Inc. Integrated infrastructure for coexistence of WI-FI networks with other networks
US8023959B2 (en) * 2006-06-28 2011-09-20 Motorola Mobility, Inc. Method and system for personal area networks
CN101150839B (en) * 2006-09-20 2011-04-06 西门子(中国)有限公司 Scanning method and system in WLAN
US8774140B2 (en) * 2006-10-19 2014-07-08 Intel Corporation Method and apparatus to provide hidden node protection
US8069483B1 (en) 2006-10-19 2011-11-29 The United States States of America as represented by the Director of the National Security Agency Device for and method of wireless intrusion detection
GB2480192A (en) * 2007-02-02 2011-11-09 Ubiquisys Ltd Determining the location of a base station
US8000276B2 (en) * 2007-02-05 2011-08-16 Wefi, Inc. Providing easy access to radio networks
KR101421569B1 (en) * 2007-02-13 2014-07-24 에스케이텔레콤 주식회사 Method for Allocating a Beacon Slot Using a Beacon Table in Wireless Personal Area Network(WPAN) and WPAN Device
US8316427B2 (en) 2007-03-09 2012-11-20 International Business Machines Corporation Enhanced personal firewall for dynamic computing environments
US20100102926A1 (en) * 2007-03-13 2010-04-29 Syngenta Crop Protection, Inc. Methods and systems for ad hoc sensor network
US8695081B2 (en) * 2007-04-10 2014-04-08 International Business Machines Corporation Method to apply network encryption to firewall decisions
US8009587B2 (en) * 2007-05-01 2011-08-30 Broadcom Corporation System and method of discovery of wireless control device
US20090016529A1 (en) * 2007-07-11 2009-01-15 Airtight Networks, Inc. Method and system for prevention of unauthorized communication over 802.11w and related wireless protocols
US8799648B1 (en) * 2007-08-15 2014-08-05 Meru Networks Wireless network controller certification authority
US8989764B2 (en) * 2007-09-05 2015-03-24 The University Of Utah Research Foundation Robust location distinction using temporal link signatures
US20090088132A1 (en) * 2007-09-28 2009-04-02 Politowicz Timothy J Detecting unauthorized wireless access points
EP2048829A1 (en) * 2007-10-01 2009-04-15 Alcatel Lucent Beacon and mobile terminal synchronization and method thereof
EP2051445A1 (en) * 2007-10-18 2009-04-22 British Telecmmunications public limited campany Wireless access system
US20090160696A1 (en) * 2007-12-21 2009-06-25 Ralink Technology Corporation Configurable radar detection and avoidance system for wireless ofdm tranceivers
JOP20190083A1 (en) * 2008-06-04 2017-06-16 Amgen Inc Fgf21 mutant fusion polypeptides and uses thereof
US8503673B2 (en) 2008-09-11 2013-08-06 University Of Utah Research Foundation Method and system for secret key exchange using wireless link characteristics and random device movement
US8515061B2 (en) * 2008-09-11 2013-08-20 The University Of Utah Research Foundation Method and system for high rate uncorrelated shared secret bit extraction from wireless link characteristics
WO2010030956A2 (en) 2008-09-12 2010-03-18 University Of Utah Research Foundation Method and system for tracking objects using radio tomographic imaging
WO2010030950A2 (en) * 2008-09-12 2010-03-18 University Of Utah Research Foundation Method and system for detecting unauthorized wireless access points using clock skews
US8081615B2 (en) * 2008-10-10 2011-12-20 Mediatek Inc. Method and apparatus to allow coexistence between wireless devices
US20100110877A1 (en) * 2008-10-30 2010-05-06 Symbol Technologies, Inc. System and method for failover of mobile units in a wireless network
SE534349C2 (en) * 2009-05-20 2011-07-19 Bitsec Ab Wireless intrusion detection
US8750265B2 (en) * 2009-07-20 2014-06-10 Wefi, Inc. System and method of automatically connecting a mobile communication device to a network using a communications resource database
CN101707795B (en) * 2009-07-31 2012-05-23 重庆重邮信科通信技术有限公司 Method for eliminating interference between self-organized network base station nodes
US8958401B2 (en) * 2010-05-03 2015-02-17 Nokia Corporation Method and apparatus for assisted network discovery
US8818288B2 (en) 2010-07-09 2014-08-26 University Of Utah Research Foundation Statistical inversion method and system for device-free localization in RF sensor networks
US20120026887A1 (en) * 2010-07-30 2012-02-02 Ramprasad Vempati Detecting Rogue Access Points
CN102137413B (en) * 2011-01-30 2013-08-07 华为技术有限公司 Method and device for detecting basic service set identify (BSSID) conflict
US20120249300A1 (en) * 2011-03-30 2012-10-04 Avital Shlomo Determination of location using rssi and transmit power
US9026099B2 (en) * 2011-12-08 2015-05-05 Apple Inc. Mechanisms to improve mobile device roaming in wireless networks
US9642169B2 (en) * 2012-01-11 2017-05-02 Saguna Networks Ltd. Methods, circuits, devices, systems and associated computer executable code for facilitating access to a content source through a wireless mobile network
CN103220788B (en) 2012-01-19 2016-08-24 华为技术有限公司 Method, node and the access point that node is grouped
KR101614901B1 (en) 2012-02-07 2016-04-22 애플 인크. Network assisted fraud detection apparatus and methods
WO2013156860A1 (en) * 2012-04-17 2013-10-24 Econais Ae Systems and methods of wi-fi enabled device configuration
US9503463B2 (en) * 2012-05-14 2016-11-22 Zimperium, Inc. Detection of threats to networks, based on geographic location
KR101561113B1 (en) * 2012-06-07 2015-10-16 주식회사 케이티 Method of active scanning and connecting based on configuration information
CN103686702A (en) * 2012-08-31 2014-03-26 华为技术有限公司 Data transmission method, access point and site
US9781137B2 (en) * 2012-10-11 2017-10-03 Nokia Solutions And Networks Oy Fake base station detection with core network support
CN103118387B (en) * 2012-12-17 2019-02-22 上海寰创通信科技股份有限公司 A kind of thin AP redundancy connection control method of active-standby mode
US9179336B2 (en) 2013-02-19 2015-11-03 Mimosa Networks, Inc. WiFi management interface for microwave radio and reset to factory defaults
CN103997481B (en) * 2013-02-19 2017-07-07 华为终端有限公司 Ensure method, device and the network system of positioning validity
KR20150129843A (en) 2013-03-15 2015-11-20 러커스 와이어리스, 인크. Improving distribution of clients across a network
CN103139778B (en) * 2013-03-25 2017-02-08 北京奇虎科技有限公司 wireless local area network access system and method
US9178896B2 (en) 2013-05-09 2015-11-03 Avaya Inc. Rogue AP detection
GB2516105B (en) * 2013-07-12 2020-01-15 Cisco Tech Inc Classification of a basestation
EP3022967B1 (en) * 2013-07-15 2020-04-08 Greenpeak Technologies N.V. Radio channel allocation for wireless interface using ultra low power nodes
US10015176B2 (en) * 2013-07-15 2018-07-03 Cyberseal Ltd. Network protection
GB2516848B8 (en) * 2013-08-01 2020-11-18 Here Global Bv Assigning location information to wireless local area network access points
US9755943B2 (en) 2013-08-08 2017-09-05 Cisco Technology, Inc. Location based technique for detecting devices employing multiple addresses
US9763225B2 (en) * 2013-10-07 2017-09-12 Qualcomm Incorporated LTE-U clear channel assessment operations
GB2516131B (en) 2014-01-28 2017-03-01 Imagination Tech Ltd Proximity detection
US9998246B2 (en) 2014-03-13 2018-06-12 Mimosa Networks, Inc. Simultaneous transmission on shared channel
US9357458B2 (en) * 2014-04-30 2016-05-31 Aruba Networks, Inc. Distributed method for client optimization
US10019703B2 (en) * 2014-05-13 2018-07-10 Google Llc Verifying a secure connection between a network beacon and a user computing device
US9485243B2 (en) * 2014-05-23 2016-11-01 Google Inc. Securing a wireless mesh network via a chain of trust
US9730094B2 (en) 2014-07-29 2017-08-08 Qualcomm Incorporated Bursty-interference-aware interference management
US20160037363A1 (en) * 2014-07-29 2016-02-04 Qualcomm Incorporated Interference management in a bursty-interference environment
CN104270366B (en) * 2014-09-30 2017-09-29 北京金山安全软件有限公司 method and device for detecting karma attack
WO2016065527A1 (en) * 2014-10-28 2016-05-06 华为技术有限公司 Data transmission method and device
US9485660B2 (en) * 2015-01-21 2016-11-01 Ciena Corporation Systems and methods to detect and characterize fake cell towers
CN104618923B (en) * 2015-01-22 2018-10-09 新华三技术有限公司 Search the method and device of wireless access point
US9913201B1 (en) 2015-01-29 2018-03-06 Symantec Corporation Systems and methods for detecting potentially illegitimate wireless access points
US10148688B1 (en) 2015-02-09 2018-12-04 Symantec Corporation Systems and methods for detecting illegitimate devices on wireless networks
US9730075B1 (en) 2015-02-09 2017-08-08 Symantec Corporation Systems and methods for detecting illegitimate devices on wireless networks
US9781604B1 (en) 2015-02-09 2017-10-03 Symantec Corporation Systems and methods for detecting illegitimate devices on wireless networks
US9882931B1 (en) * 2015-02-18 2018-01-30 Symantec Corporation Systems and methods for detecting potentially illegitimate wireless access points
US10244438B2 (en) 2015-04-28 2019-03-26 Time Warner Cable Enterprises Llc Neighbor list management and connection control in a network environment
US9781601B1 (en) 2015-06-08 2017-10-03 Symantec Corporation Systems and methods for detecting potentially illegitimate wireless access points
CN106559786A (en) * 2015-09-30 2017-04-05 中兴通讯股份有限公司 The method for building up and device of Wireless Fidelity WIFI network
US9823333B2 (en) * 2015-10-15 2017-11-21 International Business Machines Corporation Power and network independent locating of a lost device
US9918224B1 (en) 2015-11-24 2018-03-13 Symantec Corporation Systems and methods for preventing computing devices from sending wireless probe packets
GB2545697B (en) 2015-12-22 2020-01-08 Airties Kablosuz Iletism Sanayi Ve Disticaret As Dynamic channel selection and DFS re-entry
CA3012402A1 (en) 2016-01-25 2017-08-03 Telefonaktiebolaget Lm Ericsson (Publ) Explicit spatial replay protection
EP3409039B1 (en) * 2016-01-25 2022-10-12 Telefonaktiebolaget LM Ericsson (PUBL) Implicit spatial replay protection
US10068456B2 (en) 2016-06-22 2018-09-04 International Business Machines Corporation Locating a lost device
US10348755B1 (en) 2016-06-30 2019-07-09 Symantec Corporation Systems and methods for detecting network security deficiencies on endpoint devices
CN107659982B (en) * 2016-07-26 2020-08-14 腾讯科技(深圳)有限公司 Wireless network access point classification method and device
CN106792804B (en) * 2016-12-05 2020-07-28 成都福立盟环保大数据有限公司 Multicast WIFI frame detection mechanism capable of monitoring and responding as required
US10791510B2 (en) * 2017-02-27 2020-09-29 Hewlett Packard Enterprise Development Lp Classification of access points
CN106851653A (en) * 2017-03-27 2017-06-13 珠海网博信息科技股份有限公司 A kind of automatic identification forges the method and system of wireless access points
US10764755B2 (en) 2017-09-07 2020-09-01 802 Secure, Inc. Systems and methods for providing wireless access security by interrogation
US10911956B2 (en) * 2017-11-10 2021-02-02 Comcast Cable Communications, Llc Methods and systems to detect rogue hotspots
US10700956B2 (en) 2018-01-19 2020-06-30 Cisco Technology, Inc. AP tracking sniffer aware Wi-Fi network
CN108430063B (en) * 2018-04-13 2021-11-19 上海尚往网络科技有限公司 Method and equipment for monitoring ARP spoofing in wireless local area network
US11057773B2 (en) * 2018-11-20 2021-07-06 Cisco Technology, Inc. Systems and methods for detecting access point impersonators
US10966277B1 (en) * 2019-06-20 2021-03-30 Amazon Technologies, Inc. Preventing insider attack in wireless networks
US11412384B1 (en) * 2019-10-03 2022-08-09 Rapid7, Inc. Incident detection and response using wireless access point data
CN110809309B (en) * 2019-11-15 2022-02-22 北京三快在线科技有限公司 Access point identification method, device and storage medium
US11540199B2 (en) * 2020-06-30 2022-12-27 Arris Enterprises Llc Discovery of a network topology from a client perspective
US11696137B2 (en) * 2020-07-31 2023-07-04 T-Mobile Usa, Inc. Detecting malicious small cells based on a connectivity schedule
CN113438736B (en) * 2021-07-02 2022-06-24 杭州云深科技有限公司 WiFi position information determining method and device, computer equipment and storage medium
US11716622B2 (en) 2021-07-20 2023-08-01 Bank Of America Corporation System for identification of secure wireless network access points using cryptographic pre-shared keys

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040137915A1 (en) * 2002-11-27 2004-07-15 Diener Neil R. Server and multiple sensor system for monitoring activity in a shared radio frequency band
US20040218602A1 (en) * 2003-04-21 2004-11-04 Hrastar Scott E. Systems and methods for dynamic sensor discovery and selection

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6333690B1 (en) * 1995-03-29 2001-12-25 Medical Tracking Systems Wide area multipurpose tracking system
US7025209B2 (en) * 1998-05-29 2006-04-11 Palmsource, Inc. Method and apparatus for wireless internet access
US6754488B1 (en) * 2002-03-01 2004-06-22 Networks Associates Technologies, Inc. System and method for detecting and locating access points in a wireless network
US7382756B2 (en) * 2002-05-04 2008-06-03 Broadcom Corporation Integrated user and radio management in a wireless network environment
US6965674B2 (en) 2002-05-21 2005-11-15 Wavelink Corporation System and method for providing WLAN security through synchronized update and rotation of WEP keys
US7068999B2 (en) * 2002-08-02 2006-06-27 Symbol Technologies, Inc. System and method for detection of a rogue wireless access point in a wireless communication network
US7272128B2 (en) 2002-08-30 2007-09-18 Motorola, Inc. Frame selection and distribution unit (SDU) and method for dynamically managing wireless call settings
US8122136B2 (en) 2002-12-18 2012-02-21 Cisco Technology, Inc. Methods and apparatus for providing security to a computerized device
US7295524B1 (en) * 2003-02-18 2007-11-13 Airwave Wireless, Inc Methods, apparatuses and systems facilitating management of airspace in wireless computer network environments
US6978023B2 (en) * 2003-03-25 2005-12-20 Sony Corporation Apparatus and method for location based wireless client authentication
CA2464788A1 (en) * 2003-04-16 2004-10-16 Wms Gaming Inc. A gaming software distribution network in a gaming system environment
US7355996B2 (en) * 2004-02-06 2008-04-08 Airdefense, Inc. Systems and methods for adaptive monitoring with bandwidth constraints
US7286515B2 (en) * 2003-07-28 2007-10-23 Cisco Technology, Inc. Method, apparatus, and software product for detecting rogue access points in a wireless network
US6990428B1 (en) * 2003-07-28 2006-01-24 Cisco Technology, Inc. Radiolocation using path loss data
US20050073980A1 (en) * 2003-09-17 2005-04-07 Trapeze Networks, Inc. Wireless LAN management
US7110756B2 (en) * 2003-10-03 2006-09-19 Cognio, Inc. Automated real-time site survey in a shared frequency band environment
US7002943B2 (en) * 2003-12-08 2006-02-21 Airtight Networks, Inc. Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
US7536723B1 (en) * 2004-02-11 2009-05-19 Airtight Networks, Inc. Automated method and system for monitoring local area computer networks for unauthorized wireless access
US7116988B2 (en) * 2004-03-16 2006-10-03 Airespace, Inc. Location of wireless nodes using signal strength weighting metric
US7317914B2 (en) * 2004-09-24 2008-01-08 Microsoft Corporation Collaboratively locating disconnected clients and rogue access points in a wireless network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040137915A1 (en) * 2002-11-27 2004-07-15 Diener Neil R. Server and multiple sensor system for monitoring activity in a shared radio frequency band
US20040218602A1 (en) * 2003-04-21 2004-11-04 Hrastar Scott E. Systems and methods for dynamic sensor discovery and selection

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1851981A4 *

Also Published As

Publication number Publication date
CN101099134A (en) 2008-01-02
US20060193299A1 (en) 2006-08-31
US7676216B2 (en) 2010-03-09
EP1851981A4 (en) 2011-01-19
EP1851981B1 (en) 2013-04-10
CN101189858A (en) 2008-05-28
EP1851981A2 (en) 2007-11-07
US20060193284A1 (en) 2006-08-31
CN100490569C (en) 2009-05-20
CN101189858B (en) 2015-09-09
WO2006091944A2 (en) 2006-08-31

Similar Documents

Publication Publication Date Title
WO2006091944A3 (en) Location-based enhancements for wireless intrusion detection
WO2006073642A3 (en) Network infrastructure validation of network management frames
JP2011040832A5 (en)
WO2012015688A3 (en) An intrusion detection and tracking system
GB2441691A (en) Advanced triggers for location based service applications in a wireless location system
NO20052403D0 (en) System and method for intrusion detection.
ATE557571T1 (en) DETECTING A HIDDEN NODE IN A WIRELESS LOCAL NETWORK
BRPI0513988A (en) apparatus and method for operating a communication device on two networks
WO2005101766A3 (en) Method for wireless lan intrusion detection based on protocol anomaly analysis
WO2012106050A3 (en) System and method for identification of mobile device users in an area of a wireless access point
WO2011019479A3 (en) Device, system and method of scanning a wireless communication frequency band
WO2007050244A3 (en) Method and system for detecting and responding to attacking networks
MX2010001899A (en) Ad hoc service provider's ability to provide service for a wireless network.
TW200601740A (en) Method for wireless network establishment between devices and apparatus thereof
EP1806888A4 (en) Denial-of-service attack detecting system, and denial-of-service attack detecting method
GB2410818B (en) Program tamper detecting apparatus, method for program tamper detection, and program for program tamper detection
WO2014043582A3 (en) Ue-assisted network optimization methods
EP1854005A4 (en) Method and apparatus for locating rogue access point switch ports in a wireless network
WO2004077688A3 (en) Repeater oscillation prevention
WO2008012792A3 (en) A method and system for detection of nat devices in a network
WO2007050818A3 (en) A method and apparatus for processing connectionopenresponse message in wireless communication systems
AU2003279071A1 (en) System and method for wireless local area network monitoring and intrusion detection
TW200943759A (en) Method and apparatus for processing radio signals to identify an active system in a coexisting radio network
EP1335505A4 (en) An apparatus and method for load monitoring and prediction
GB2422041B (en) Detection system and method for determining an alarm condition therein

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200680001657.3

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 2006736279

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 4542/DELNP/2007

Country of ref document: IN

NENP Non-entry into the national phase

Ref country code: DE