Network attack detection using multi-path verification

    公开(公告)号:US10447717B2

    公开(公告)日:2019-10-15

    申请号:US15418693

    申请日:2017-01-28

    Abstract: Various embodiments provide methods, devices, and non-transitory processor-readable storage media enabling rogue access point detection with a communications device by sending multiple probes via different network connections to a remote server and receiving probe replies. Various embodiments may include a communication device transmitting a first probe addressed to a server via a first network connection and a second probe addressed to the server via a second network connection. Upon receiving a first probe reply from the server via the first network connection and a second probe reply from the server via the second network connection server, the communications device may analyze the received probe replies to determine whether an access point of either the first network or the second network is a rogue access point.

    Method To Detect A Summoning Attack By A Rogue WiFi Access Point

    公开(公告)号:US20190230103A1

    公开(公告)日:2019-07-25

    申请号:US15878074

    申请日:2018-01-23

    Abstract: Various methods for detecting a summoning attack by a malicious access point (AP) may include generating a random service set identifier (SSID), transmitting a probe request including the random SSID, determining whether a probe response including the random SSID is received, identifying an AP as a rogue AP in response to receiving a probe response including the random SSID, and in response to not receiving a probe response including the random SSID: generating a second SSID comprising a random selection of a plurality of words; transmitting a second probe request including the second SSID; determining whether a probe response including the second SSID is received; identifying an AP as a rogue AP in response to determining that a probe response including the second SSID is received; and determining that no rogue AP is present in response to determining that a probe response including the second SSID is not received.

    Wake lock aware system wide job scheduling for energy efficiency on mobile devices

    公开(公告)号:US10095305B2

    公开(公告)日:2018-10-09

    申请号:US15186444

    申请日:2016-06-18

    Abstract: Embodiments include computing devices, apparatus, and methods implemented by the apparatus for implementing wake lock aware scheduling. The apparatus may receive a wake lock request by a wake lock profiler and acquire wake lock information of a wake lock event associated with the wake lock request. The wake lock information may include a wake lock time parameter. The apparatus may send a hint having the wake lock time parameter. The apparatus may receive the hint, determine whether ready jobs can execute during the wake lock event, and send a request for permission to schedule the ready jobs for execution during the wake lock event in response to determining that the ready jobs can execute during the wake lock event.

    Detecting media access control (MAC) address spoofing in a wi-fi network using channel correlation

    公开(公告)号:US10979906B2

    公开(公告)日:2021-04-13

    申请号:US15484356

    申请日:2017-04-11

    Abstract: Various embodiments include systems and methods of determining whether media access control (MAC) address spoofing is present in a network by a wireless communication device. A processor of the wireless communication device may determine an anticipated coherence interval based on a beacon frame received from an access point. The processor may schedule an active scan request and may determine whether a response frame corresponding to the scheduled active request is received within the anticipated coherence interval. The processor may calculate a first correlation coefficient in response to the response frame being received within the anticipated coherence interval and may determine that MAC address spoofing is not present in the network when the first correlation coefficient is greater than a first predetermined threshold.

    Detecting Media Access Control (MAC) Address Spoofing in a Wi-Fi Network Using Channel Correlation

    公开(公告)号:US20180295519A1

    公开(公告)日:2018-10-11

    申请号:US15484356

    申请日:2017-04-11

    Abstract: Various embodiments include systems and methods of determining whether media access control (MAC) address spoofing is present in a network by a wireless communication device. A processor of the wireless communication device may determine an anticipated coherence interval based on a beacon frame received from an access point. The processor may schedule an active scan request and may determine whether a response frame corresponding to the scheduled active request is received within the anticipated coherence interval. The processor may calculate a first correlation coefficient in response to the response frame being received within the anticipated coherence interval and may determine that MAC address spoofing is not present in the network when the first correlation coefficient is greater than a first predetermined threshold.

    Network Attack Detection Using Multi-Path Verification

    公开(公告)号:US20180219885A1

    公开(公告)日:2018-08-02

    申请号:US15418693

    申请日:2017-01-28

    Abstract: Various embodiments provide methods, devices, and non-transitory processor-readable storage media enabling rogue access point detection with a communications device by sending multiple probes via different network connections to a remote server and receiving probe replies. Various embodiments may include a communication device transmitting a first probe addressed to a server via a first network connection and a second probe addressed to the server via a second network connection. Upon receiving a first probe reply from the server via the first network connection and a second probe reply from the server via the second network connection server, the communications device may analyze the received probe replies to determine whether an access point of either the first network or the second network is a rogue access point.

Patent Agency Ranking