摘要 |
Technologies for providing electronic security to a first network are disclosed. The system may include a user equipment, a gateway device configured to mediate communication between a first network and a second network for the user equipment, and an electronic security device communicatively coupled to the gateway device. The electronic security device may include a gateway interface module configured to assume an identity associated with the gateway device, a network interface module configured to present the identity to the second network, and a traffic inspection module configured to monitor traffic without substantially affecting a topology of the first network, wherein the electronic security device is configured to identify undesirable traffic; and implement a security policy. |
主权项 |
1. An electronic security device for providing electronic security to a first network, the electronic security device comprising:
a processor; a gateway interface module comprising instructions, when loaded and executed by the processor, configured to assume an identity of a gateway device communicatively coupled to the electronic security device and configured to mediate communication between the first network and a second network, wherein assuming the identity of the gateway device is performed by altering an Address Resolution Protocol; a network interface module comprising instructions, when loaded and executed by the processor, configured to present the identity to the second network; a traffic inspection module comprising instructions, when loaded and executed by the processor, configured to:
monitor traffic from the first network to the second network without substantially affecting a topology of the first network, wherein the electronic security device is configured to identify undesirable traffic; andimplement a security policy, the security policy comprising instructions for handling the undesirable traffic; wherein the electronic security device is:
communicatively coupled to the first network and to the second network through the gateway device;resident in the first network with the gateway device; andconfigured to, through the gateway device, present the identity to the second network, monitor traffic from the first network to the second network, and implement the security policy. |