摘要 |
The invention described herein provides a method and system for the detectio n and location of unauthorized or otherwise targeted network devices on a network. According t o aspects of the invention, the method disclosed herein consists of gathering a logical mappi ng of the devices on a computer network (which can be faked, spoofed or easily hidden) by mining data from the routers and switches on the network, and matching the logical mapping of the devices to the physical reality of the network environment which can't be easily hidden or spoofed. Based on the physical information acquired about the devices on the network, it is possible to identify devices that are either unauthorized or are otherwise targeted.
|