首页>
外国专利>
PROTECTING WIRELESS COMMUNICATIONS NETWORKS FROM MALICIOUS ATTACK
PROTECTING WIRELESS COMMUNICATIONS NETWORKS FROM MALICIOUS ATTACK
展开▼
机译:从恶意攻击中保护无线通信网络
展开▼
页面导航
摘要
著录项
相似文献
摘要
In a wireless communications network such as a mobile adhoc network or WLAN, a suspect node is identified. A sub-network of the network is formed in response to identifying the suspect node, wherein the suspect node is not a member of the sub-network. After formation of the subÂnetwork, first communications between the suspect node and a device of the network are routed to or through at least one of the members of the sub-network. The sub-Ânetwork is configured to enable second communications between members of the subÂ-network, where the second communications are communicated in a manner that is secured against access by the suspect node. Thus the suspect node is allowed to continue to communicate in a controlled fashion without realizing it has been excluded. Traffic in the secure sub-network is obscured from the suspect node by traffic masking processes including encryption, packet padding, fragmentation and dummy packets. Members of the sub-network may instantiate a virtual machine that acts as a honey pot or honey network to simulate a network resource in order to gain knowledge of the malicious activities and techniques used by the suspect node.
展开▼