IDENTIFYING ROGUE WIRELESS DEVICES USING MAC ADDRESS ROTATION TECHNIQUES

    公开(公告)号:US20230354034A1

    公开(公告)日:2023-11-02

    申请号:US17731689

    申请日:2022-04-28

    CPC classification number: H04W12/122 H04W12/73 H04W12/106

    Abstract: A method is provided that is performed in a wireless network to detect a rogue wireless device. The method comprises detecting a suspect wireless device in the wireless network based on messages transmitted by the suspect wireless device using a first Media Access Control (MAC) address that is also used by a valid wireless device in the wireless network. When a suspect wireless device is detected, the method next includes sending to the valid wireless device in the wireless network a request configured to cause the valid wireless device to change its MAC address. After the valid wireless device has changed its MAC address, the method involves observing messages transmitted by the suspect wireless device in the wireless network. The method then includes determining that the suspect wireless device is a rogue device when the suspect wireless device continues to transmit messages using the first MAC address.

    PREVENTING ABUSE OF MEDIA ACCESS CONTROL ADDRESSES BY ROGUE DEVICES

    公开(公告)号:US20230262465A1

    公开(公告)日:2023-08-17

    申请号:US17674304

    申请日:2022-02-17

    CPC classification number: H04W12/122

    Abstract: Methods are provided to determine validity of a MAC address. The methods involve obtaining a media access control (MAC) address validity message that indicates a plurality of valid MAC addresses in the wireless network using a fully-exploded format or a probabilistic data structure and determining whether a MAC address is valid based on the MAC address validity message. Other methods involve obtaining a query regarding a validity of a media access control (MAC) address, determining whether the MAC address is a value included in a data set of expected values of a probabilistic data structure. The data set represents a list of MAC addresses. The other methods involve determining whether the MAC address is valid in the wireless network based on determining whether the MAC address is the value included in the data set and providing a response indicating whether the MAC address is valid.

    DHCP resource optimization for randomized and changing MAC address

    公开(公告)号:US11483283B1

    公开(公告)日:2022-10-25

    申请号:US17546902

    申请日:2021-12-09

    Abstract: A wireless infrastructure that communicates with a DHCP server and a wireless client that rotates its MAC address performs a method including: upon receiving, from the wireless client, a first request with a first MAC address, creating a session context including the first MAC address and a stable identifier, and relaying the first request to the DHCP server; relaying, from the DHCP server to the wireless client, a first DHCP reply that includes an Internet Protocol (IP) address bound to the stable identifier; upon receiving, from the wireless client, a second request with the IP address and a second MAC address, merging the second MAC address and the IP address into the session context, and relaying, to the DHCP server, the second request including the stable identifier; and relaying, from the DHCP server to the wireless client, a second DHCP reply including the IP address bound to the stable identifier.

    AUTOMATIC PROVISIONING OF NETWORK COMPONENTS
    59.
    发明申请

    公开(公告)号:US20200162328A1

    公开(公告)日:2020-05-21

    申请号:US16544690

    申请日:2019-08-19

    Abstract: The present disclosure is directed to systems and methods that enable automatic provisioning of access points within an enterprise network by a controller of the enterprise network. In one aspect, a method includes detecting, at a network controller, attachment of a first access point to a network; identifying, by the network controller, a profile of a second access point, the second access point having being replaced with the first access point, the profile including at least one of identification parameters and configuration parameters of the second access point; and provisioning, by the network controller, the first access point with the profile of the second access point.

    Network description mechanisms for anonymity between systems

    公开(公告)号:US09882806B2

    公开(公告)日:2018-01-30

    申请号:US14729810

    申请日:2015-06-03

    CPC classification number: H04L45/14 H04L45/02 H04L45/04 H04L63/00

    Abstract: Techniques are disclosed for exchanging anonymized information between autonomous systems. In one example, a method comprises accessing an eigenvalue, wherein the eigenvalue is based on topology data associated with the first autonomous system; encoding the eigenvalue into a message; and transmitting, by a network element located in the first autonomous system, the message to an external edge router located in the second autonomous system. A further method can comprise receiving, by a network component located in a first autonomous system, a message, wherein the message comprises an eigenvalue and the message is received from an external network element located in a second autonomous system; accessing another other eigenvalue, the another eigenvalue corresponding to an autonomous system different from the first autonomous system; analyzing the another eigenvalue and the eigenvalue; and executing, by the network element, an action based on the analyzing.

Patent Agency Ranking