System and method for exposing malicious sources using mobile IP messages
Originating portfolio: ALU
Estimated expiration: 2031-Aug-17
Potentially relevant companies (4): AirWatch LLC, Blackberry Limited, Dell Inc., McAfee Enterprises, Inc.
Products & technologies (2): Network:Security, Wireless:Network
Malicious sources within networks are identified using bait traffic, including mobile IP messages, transmitted between a collaborating network device and a collaborating mobile client that has a fixed connection to the network. The bait traffic entices a malicious source to transmit malicious packets towards the collaborating mobile client and/or the network device. Upon receiving a malicious packet, the collaborating mobile client or the network device is able to identify the source of the packet as a malicious source and report the presence of the malicious source within the network.
1. A collaborating network device within a network, comprising:
a network interface operable to transmit and receive bait traffic to and from a collaborating mobile client mimicking an end-user mobile communication device, the collaborating mobile client having a fixed connection to the network, the bait traffic including mobile Internet Protocol (IP) messages, the network interface being configured to communicate with only the collaborating mobile client such that normal traffic other than broadcast traffic is not received from legitimate, non-collaborating sources, the network interface being further operable to receive an IP packet from a source other than the collaborating mobile client; and
a processor coupled to receive the IP packet and operable to determine whether the IP packet is a malicious packet, and if so, to identify the source as a malicious source.
Interested in licensing a slice of this patent? Contact us to take the next step, or read about our method to understand the logistics.