US Patent Application 17735691. Detecting and Mitigating Drive-by Home Wi-Fi Hijack Attacks simplified abstract

From WikiPatents
Jump to navigation Jump to search

Detecting and Mitigating Drive-by Home Wi-Fi Hijack Attacks

Organization Name

AT&T Intellectual Property I, L.P.

Inventor(s)

Yaron Koral of Cherry Hill NJ (US)

Shraboni Jana of Danville CA (US)

Kaustubh Joshi of Short Hills NJ (US)

Detecting and Mitigating Drive-by Home Wi-Fi Hijack Attacks - A simplified explanation of the abstract

This abstract first appeared for US patent application 17735691 titled 'Detecting and Mitigating Drive-by Home Wi-Fi Hijack Attacks

Simplified Explanation

- The patent application is about detecting and preventing drive-by home Wi-Fi hijack attacks. - The system described in the patent application can receive a report from a home gateway system, which identifies a suspicious device trying to connect to the Wi-Fi network provided by the home gateway system. - The system can analyze the report to determine the route taken by the attacker using the suspicious device. - Based on this analysis, the system can send instructions to the home gateway system, specifying actions to be taken to mitigate the attack. - One example of a mitigation action is blacklisting the media access control address associated with the suspicious device. - The specific mitigation actions taken by the home gateway system can be determined based on predefined policies.


Original Abstract Submitted

The concepts and technologies disclosed herein are directed detecting and mitigating drive-by home WI-FI hijack attacks. According to one aspect, a war driving activity correlation system can obtain a report from a home gateway system. The report can identify a suspicious device attempting to connect to a WI-FI network provided, at least in part, by the home gateway system. The war driving activity correlation system can determine, based upon the report, a route of an attacker who uses the suspicious device. The war driving activity correlation system can send instructions to the home gateway system. The instructions can include the route and can specify one or more mitigation actions to be performed by the home gateway system, such as blacklisting a media access control address associated with the suspicious device. The mitigation action(s) can be based upon one or more policies.