Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices
    1.
    发明授权
    Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices 有权
    将无线网络入侵检测系统部署到资源受限设备的装置和方法

    公开(公告)号:US07966660B2

    公开(公告)日:2011-06-21

    申请号:US11900623

    申请日:2007-09-11

    IPC分类号: H04L29/14

    摘要: Wireless devices, such as field devices or repeater/relay nodes, detect the presence of anomalies in data packets that suggest intrusion. Upon detection of an anomaly, a wireless device sends a notification to a sentinel device, which determines if intrusion may be occurring. If so, the sentinel device downloads a spy routine to at least one of the wireless devices, which enables further investigation into and/or isolation of the intrusion. Since the spy routine is downloaded to the wireless devices, the spy routine can be used in conjunction with memory-constrained wireless devices. Memory-constrained wireless devices may lack adequate memory for storing both a main application executed during normal operation and the spy routine. The spy routine could overwrite one or more modules of the main application. Once executed, the spy routine could itself be overwritten by the one or more modules, allowing the wireless device to return to normal operation.

    摘要翻译: 无线设备,例如现场设备或中继器/中继节点,检测建议入侵的数据分组中存在异常。 在检测到异常时,无线设备向哨兵设备发送通知,该哨兵设备确定是否可能发生入侵。 如果是这样,则前哨设备将间谍程序下载到至少一个无线设备,这使得能够进一步调查和/或隔离入侵。 由于将间谍程序下载到无线设备,因此间谍程序可以与存储器受限的无线设备结合使用。 存储器受限的无线设备可能缺乏足够的存储器来存储在正常操作期间执行的主应用程序和间谍程序。 间谍程序可以覆盖主应用程序的一个或多个模块。 一旦执行,间谍程序本身可以被一个或多个模块覆盖,允许无线设备恢复正常操作。

    Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices
    3.
    发明申请
    Apparatus and method for deploying a wireless network intrusion detection system to resource-constrained devices 有权
    将无线网络入侵检测系统部署到资源受限设备的装置和方法

    公开(公告)号:US20080291017A1

    公开(公告)日:2008-11-27

    申请号:US11900623

    申请日:2007-09-11

    IPC分类号: G08B13/00

    摘要: Wireless devices, such as field devices or repeater/relay nodes, detect the presence of anomalies in data packets that suggest intrusion. Upon detection of an anomaly, a wireless device sends a notification to a sentinel device, which determines if intrusion may be occurring. If so, the sentinel device downloads a spy routine to at least one of the wireless devices, which enables further investigation into and/or isolation of the intrusion. Since the spy routine is downloaded to the wireless devices, the spy routine can be used in conjunction with memory-constrained wireless devices. Memory-constrained wireless devices may lack adequate memory for storing both a main application executed during normal operation and the spy routine. The spy routine could overwrite one or more modules of the main application. Once executed, the spy routine could itself be overwritten by the one or more modules, allowing the wireless device to return to normal operation.

    摘要翻译: 无线设备,例如现场设备或中继器/中继节点,检测建议入侵的数据分组中存在异常。 在检测到异常时,无线设备向哨兵设备发送通知,该哨兵设备确定是否可能发生入侵。 如果是这样,则前哨设备将间谍程序下载到至少一个无线设备,这使得能够进一步调查和/或隔离入侵。 由于将间谍程序下载到无线设备,因此间谍程序可以与存储器受限的无线设备结合使用。 存储器受限的无线设备可能缺乏足够的存储器来存储在正常操作期间执行的主应用程序和间谍程序。 间谍程序可以覆盖主应用程序的一个或多个模块。 一旦执行,间谍程序本身可以被一个或多个模块覆盖,允许无线设备恢复正常操作。