Microsoft Corporation
ANOMALOUS ACCESS POINT DETECTION
Last updated:
Abstract:
Disclosed in some examples are methods, systems, devices, and machine-readable mediums that detect evil twin and other anomalous access points in an IT infrastructure by detecting access points that are not in their expected locations based upon an analysis of access point reports from one or more computing devices.
Status:
Application
Type:
Utility
Filling date:
10 Sep 2021
Issue date:
3 Mar 2022