Browse Prior Art Database

Access Points with Integrated Intrusion Alert

IP.com Disclosure Number: IPCOM000015276D
Original Publication Date: 2001-Nov-02
Included in the Prior Art Database: 2003-Jun-20
Document File: 1 page(s) / 39K

Publishing Venue

IBM

Abstract

*Main Idea

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 52% of the total text.

Page 1 of 1

Access Points with Integrated Intrusion Alert

*Main Idea

A major shift is occurring with respect to how to protect access to internal corporate networks. Typically access is protected by a Firewall for external access via WAN and by limiting access to buildings (badge access, security guard). Users need to physical access to building or access through firewall to gain access. Firewalls and security checkpoints have the ability to provide notification of potential hacking of network.

Security is changing due to explosion in wireless networking technologies. The airwaves are not subject to badge doors and firewalls (assuming you do not work in EMC chamber). It is easy to gain access to network form outside the physical building, if you are in range to an access point.

Currently there several ways to protect access to networks

- Access Control List - Wired Equivalency Protocol (WEP)

The access control list is the most popular, given the simplicity in deploying and maintaining but is very unsecure. WEP which uses key pair is not widely used due to traditional deployment/support issues with managing pairs.

Both of these methods limit access to network, but does not provide any indication of potential hacking of network. This publication describes a method to identify that when the network is under attack for provide notification. Identification of potential hacking of the network is a combination of monitoring circuits and alert generation. This solution provides notification to a remote server when illegal access to access...