Network Switch Port Access Control and Information Security

ABSTRACT

A system that includes a switch, a network authentication server (NAS), and a threat management server. The NAS sends a device identifier for an endpoint device to the threat management server in response to the endpoint device connecting to a port on the switch. The threat management server determines the endpoint device is present in a blacklist based on the device identifier in response to receiving the device identifier. The threat management server determines the endpoint device is blocked from one or more second ports on the switch. The threat management server blocks the endpoint device from accessing the network via the first port on the switch in response to determining the endpoint device is blocked from the one or more other ports on the switch.

TECHNICAL FIELD

The present disclosure relates generally to information security, andmore specifically to network access control.

BACKGROUND

Many enterprises have expansive networks that include a large number ofnetwork devices. These network environments allow data to be sharedamong the different network devices. One of the technical challengesthat occurs in a network environment is controlling data leakage andunauthorized access to data. For example, a bad actor (e.g. a hacker)may connect a network device to a network to extract data and/or toperform other malicious activities.

Identifying malicious network devices in a large network also posesseveral technical challenges. Conventional systems typically monitor thenetwork for suspicious activity after a malicious network device isconnected to the network. In these systems, since the malicious deviceis already connected to the network, the malicious network device isable to extract data and/or perform malicious activities before it isdetected. Conventional systems are unable to preemptively identifymalicious network device before they are connected to a network whichlimits their abilities to provide information security and to controland monitor data access within the network.

Without the ability to control or monitor data access and movement thesystem is vulnerable to having sensitive data leave the network and/orallowing malicious data (e.g. viruses and spyware) to enter the network.Thus, it is desirable to provide a solution that provides the ability tocontrol and monitor data access and movement within a network.

SUMMARY

One of the technical challenges that occurs in a network environment iscontrolling data leakage and unauthorized access to data. For example, abad actor may connect an unauthorized network device to a network toextract data and/or to perform other malicious activities. Identifyingunauthorized network devices in a large network also poses severaltechnical challenges. Conventional systems typically monitor the networkfor suspicious activity after an unauthorized network device hasconnected to the network. In these systems, since the unauthorizednetwork device is already connected to the network, the unauthorizednetwork device is able to extract data and/or perform maliciousactivities before it is detected. Conventional systems are unable topreemptively identify bad actors which limits their abilities to provideinformation security and to control and monitor data access within thenetwork. Without the ability to control or monitor data access andmovement the system is vulnerable to having sensitive data leave thenetwork and/or allowing malicious data to enter the network.

The system described in the present application provides a technicalsolution that enables the system to identify unauthorized network devicethat are attempting to connect to a network and to block or controltheir access to the access to the network. The ability to identify,block, and control access to the network, improves the operation of thesystem and the security of the network. For example, the system is ableto identify and block an unauthorized network device before the deviceis able to connect to the network and perform any malicious activities,for example, data exfiltration. Thus, the system provides anunconventional technical solution that allows the system to protectitself and the network from attacks by malicious devices.

In one embodiment, the system identifies and blocks untrusted networkdevices from accessing the network. When the system detects a networkdevice has connected to a port on a switch and is failingauthentication, the system uses stored historical information todetermine whether the network device has been previously identified asan untrusted device. The system blocks the network device from accessingthe network in response to determining that the network device haspreviously been identified as an untrusted device. The system provides atechnical advantage by preventing the untrusted network device fromaccessing the network to perform any malicious activities. This allowsthe system to protect itself and the network from untrusted networkdevices connecting to the network.

In another embodiment, the system identifies and blocks untrustednetwork devices from accessing the network that have been previouslybeen block from accessing the network. When the system detects a networkdevice has connected to a port on a switch and is failingauthentication, the system uses stored historical information todetermine whether the network device has been previously been blockedfrom accessing the network. The system blocks the network device fromaccessing the network in response to determining that the network devicehas previously been blocked from accessing the network. The systemprovides a technical advantage by preventing the untrusted networkdevice from reconnecting to the network after previously being blockedfrom the network. This allows the system to protect itself and thenetwork from a bad actor that tries reconnecting a malicious networkdevice to the network.

In another embodiment, the system identifies and blocks untrustednetwork devices from accessing the network that have been previouslybeen block from one or more ports on a switch. When the system detects anetwork device has connected to a port on a switch and is failingauthentication, the system uses stored historical information todetermine whether the network device has been previously been blockedfrom any other ports on the switch. The system blocks the network devicefrom accessing the network in response to determining that the networkdevice has previously been blocked from one or more ports on the switch.The system provides a technical advantage by preventing the untrustednetwork device from reconnecting to the network after previously beingblocked from the switch. This allows the system to protect itself andthe network from a bad actor that keeps trying to use different ports ona switch to connect a malicious network device to the network.

In another embodiment, the system identifies and isolates untrustednetwork devices within a safe zone in the network which allows theuntrusted network devices to be safely monitored without jeopardizingthe network. When the system detects a network device has connected to aport on a switch and is failing authentication, the system uses storedhistorical information to determine whether the network device has beenpreviously identified as an untrusted device. The system isolates thenetwork device within a safe zone in the network in response todetermining that the network device has previously been identified as anuntrusted device. The system provides a technical advantage by allowingthe untrusted network device to be monitored while preventing theuntrusted network device from performing any malicious activities to thenetwork. This allows the system to monitor and collect information aboutthe untrusted network device and its activity without putting thenetwork at risk.

Certain embodiments of the present disclosure may include some, all, ornone of these advantages. These advantages and other features will bemore clearly understood from the following detailed description taken inconjunction with the accompanying drawings and claims.

BRIEF DESCRIPTION OF THE DRAWINGS

For a more complete understanding of this disclosure, reference is nowmade to the following brief description, taken in connection with theaccompanying drawings and detailed description, wherein like referencenumerals represent like parts.

FIG. 1 is a schematic diagram of an embodiment of a system configured toimplement network access control;

FIG. 2 is a schematic diagram of an embodiment of a threat managementserver;

FIG. 3 is a flowchart of an embodiment of a device removal method;

FIG. 4 is a flowchart of an embodiment of a device removal method forrepeat offenders;

FIG. 5 is a flowchart of an embodiment of a device removal method forport switching devices; and

FIG. 6 is a flowchart of an embodiment of a device isolating method.

DETAILED DESCRIPTION

FIG. 1 is a schematic diagram of an embodiment of a system 100configured to implement network access control. System 100 is generallyconfigured to support a number of different operations, including butnot limited to, identifying unknown or undesirable devices (e.g.,non-compliant, rogue, or malicious devices), determining the location ofthe undesirable devices, collecting information from a switch connectedto the undesirable devices, and blocking the undesirable devices frombeing able to access the network and/or isolate the undesirable in asafe zone within the network. For example, the system 100 is configuredto detect when a bad actor connects a malicious device to port on aswitch. The system 100 is configured to identify the malicious deviceand to block the malicious device from accessing the network. In otherexamples, the system 100 is configured to isolate and monitor maliciousdevices. Isolating and monitoring malicious devices allows the system100 to collect information about malicious devices, which may be laterused to further improve the security of the system 100.

In some embodiments, the system 100 is configured to authenticate auser, to determine disconnection capabilities of switches coupled toundesirable devices, to facilitate disconnecting undesirable devices,and to monitor the network for subsequent connection attempts by theundesirable devices to reconnect to the network. For example, the system100 is configured to identify malicious devices that are attempting toconnect to the network and to block the malicious devices from accessingthe network. Detecting, removing, and blocking malicious devices fromthe network allow the system 100 to enhance network security byproviding improved data access control. In some embodiments, these tasksmay be performed by a particular device, such as a threat managementserver 112. In other implementations, these tasks may be performed in adistributed fashion using various components that interact with eachother over a network.

System 100 comprises switches 104, endpoint devices 106, a networkauthentication server (NAS) 108, a database 110, a threat managementserver 112, a wireless LAN controller 114, and an access point 116interconnected by one or more networks, represented by communicationsnetwork 102. System 100 may be configured as shown in FIG. 1 or in anyother suitable configuration as would be appreciated by one of ordinaryskill in the art upon viewing this disclosure.

The communications network 102 represents communication equipment,including hardware and any appropriate controlling logic, forinterconnecting elements and facilitating communication betweeninterconnected elements. The communications network 102 may includelocal area networks (LANs), metropolitan area networks (MANs), wide areanetworks (WANs), any other public or private network, local, regional,or global communication network such as the Internet, enterpriseintranet, other suitable wired or wireless communication link, or anycombination thereof. The communications network 102 may include anycombination of gateways, routers, hubs, switches, access points, basestations, and any other hardware, software, or a combination of thepreceding that may implement any suitable protocol. The communicationsnetwork 102 may include other types of networks, including wireless orwired networks.

The communications network 102 is configured to interconnect theswitches 104, the endpoint devices 106, the NAS 108, the database 110,the threat management server 112, the wireless LAN controller 114, andthe access point 116. The use of the communications network 102facilitates identifying, blocking, and/or monitoring of undesirabledevices regardless of the geographic location or communication protocolsemployed by network components or devices on the network. While only onecommunications network 102 has been illustrated, it should be understoodthat other embodiments may operate using multiple communicationsnetworks 102. In addition, other embodiments may employ one or morewired and wireless networks in communications networks 106.

System 100 comprises switches 104 a, 104 b, 104 c, and 104 d operablycoupled to the communications network 102. The switches 104 representcommunication equipment, including hardware and any appropriatecontrolling logic, for interconnecting and facilitating datacommunication to and from endpoint devices 106. Examples of switches 104include, but are not limited to, gateways, call managers, routers, hubs,switches, access points, base stations, cellular towers, radio networks,satellite telephone equipment implementing appropriate protocols forwireless telephony communications. While only a select number ofswitches 104 have been illustrated, it should be understood that otherembodiments may operate using any suitable number of switches 104. Inaddition, other embodiments may incorporate switches 104 in other wiredor wireless networks coupled to the communications network 102 of system100.

The access point 116 is any network hardware device (and accompanyingsoftware) that allows an endpoint device 106 to connect to thecommunications network 102. An example of the access point 116 includes,but is not limited to, a router. The access point 116 may allow for bothwireless connections and wired connections to the communications network102. For example, an endpoint device 106 may connect wirelessly to theaccess point 116 or may connect to the access point 116 via a wiredconnection (e.g. an Ethernet cable). The system 100 may comprise anysuitable number of access points 116.

The wireless LAN controller 114 is configured to control and manage theaccess points 116. For example, the wireless LAN controller 114 mayconfigure the access points 116 to connect to communications network102. In some embodiments, the wireless LAN controller 114 may screenwireless connection attempts to the communications network 102 and mayblock attempts that are deemed suspicious or compromised. For example,the wireless LAN controller 114 may maintain a blacklist that identifiesendpoint devices 106 that should be blocked from connecting wirelesslyto the communications network 102. The wireless LAN controller 114 canconnect to the access point 116 and vice versa to allow for end pointdevices 106 to connect to the communications network 102 via the accesspoint 116 and wireless LAN controller 114. In FIG. 1, the wireless LANcontroller 114 is shown operably coupled to a single access point 116.In other examples, the wireless LAN controller 114 may be configured tomanage and control any number of access points 116 of system 100.

System 100 comprises endpoint devices 106 a, 106 b, 106 c, 106 d, and106 e operably coupled to the communications network 102 throughswitches 104. The endpoint devices 106 represent any suitable hardware,including appropriate controlling logic and data, capable of connectingto and communicating data over a network. For example, endpoint devices106 may include wired or wireless devices including, but not limited to,workstations, laptops or notebook computer systems, printers, Voice overInternet Protocol (VoIP) telephones, Internet Protocol (IP) phones,mobile telephones, advanced phones (e.g. smartphones), personal digitalassistants (PDAs), wireless handsets, notebook computer systems, tabletcomputer systems, embedded devices, network sniffers, auxiliary devices,or the like. The endpoint devices 106 may be capable of transmitting andreceiving any forms of media including, but not limited to, audio,video, images, text messages, and other data formats, and documents andaccessing disparate network-based services.

The NAS 108 represents any appropriate combination of hardware,controlling logic, and data that facilitates user authentication,admission control and logging, policy enforcement, auditing, andsecurity associated with the communications network 102. In someembodiments, the NAS 108 may represent a networked server or collectionof networked servers. The NAS 108 may be directly or indirectly coupledto other systems such as the database 110 to store and retrieveinformation related to network access control and authentication. In oneembodiment, the NAS 108 is configured to track attempted and actualconnections by endpoint devices 106 to the communications network 102using switches 104. For example, the NAS 108 may monitor and track theMAC address and/or IP address associated with endpoint devices 106 oncommunications network 102 and the IP address and/or port of the switch104 coupled to those endpoint devices 106.

The NAS 108 is configured to authenticate endpoint devices 106 that areconnected to a port of a switch 104. The NAS 108 may authenticateendpoint device 106 using an 802.1X protocol, a MAC authenticationBypass (MAB) whitelist, or any other suitable protocol. For example, theNAS 108 may be configured to determine whether the MAC address of anendpoint device 106 is present in a MAB whitelist. The NAS 108 mayauthenticate the endpoint device 106 when the endpoint device 106 ispresent in the MAB whitelist. The NAS 108 may also be configured toautomatically fail authentication for endpoint devices 106 that arepresent in a blacklist. In one embodiment, the NAS 108 is configured tosend a device identifier identifying an endpoint device 106 in responseto the endpoint device 106 connecting to the switch 104. In anotherembodiment, the NAS 108 is configured to send a device identifieridentifying an endpoint device 106 in response to the endpoint device106 in response to the endpoint device 106 failing authentication.

In certain implementations, the NAS 108 may log appropriate informationabout each network access attempt by endpoint devices 106 bycommunicating with database 110 and/or the threat management server 112.For example, the NAS 108 may log information about endpoint devices 106that pass or fail authentication in a device log file. Additionalinformation about a device log file is described in FIG. 2. In oneembodiment, the functionality of the NAS 108 may be provided by athird-party data server. In particular embodiments, the activityrecorded at the NAS 108 may be accessed by a log server (not shown) andutilized as an intermediate data repository.

The database 110 comprises suitable hardware and software, includingmemory and control logic, for storing, accessing, retrieving, andcommunicating various types of information, for example, networkactivity data. The database 110 may include any suitable combination ofvolatile or non-volatile, local or remote devices suitable for storingand maintaining information. For example, the database 110 may includerandom access memory (RAM), read only memory (ROM), solid state storagedevices, magnetic storage devices, optical storage devices, or any othersuitable information storage device or a combination of such devices. Inone embodiment, the database 110 represents a relational database forstoring connection logs and network activity logs of endpoints 106 in aretrievable manner. The database 110 may represent a database serviceprovided by a third-party. In one embodiment, the database 110 mayrepresent a database for storing all connection details related toendpoint devices 106. For example, the database 110 may maintain networkactivity information such as IP addresses/MAC addresses associated withendpoint devices 106 and IP addresses of switches 104 coupled toparticular endpoint devices 106. The database 110 may also maintain portinformation (e.g. port addresses) for switches 104 or endpoint devices106. The database 110 may be directly or indirectly coupled to othersystems such as the NAS 108 and be capable of storing and retrievinginformation related to network access based on instructions from the NAS108. In particular embodiments, the storage and functionality ofdatabase 110 may be provided by a third party data server. In someembodiments, the database 110 may reside on an network authenticationserver, such as the NAS 108.

The threat management server 112 represents any appropriate combinationof hardware, controlling logic, and data for facilitating blockingendpoint devices 106 and/or active monitoring of endpoint devices 106.For example, the threat management server 112 may represent a networkedserver or collection of networked servers capable of communicating withother elements of the system 100 to monitor and prevent access to thenetwork based on appropriate control logic. Additional information aboutthe threat management server 112 is described in FIG. 2.

In particular embodiments, the threat management server 112 may comprisesuitable memory to store lists of trusted and untrusted devices. Forexample, the threat management server 112 may maintain one or morewhitelists that identify endpoint devices 106 which are known to betrustworthy. In addition, the threat management server 112 may maintainone or more blacklists that identify endpoint devices 106 which areknown to be untrustworthy. In particular embodiments, the blacklistsmaintained by the threat management server 112 may include endpointdevices 106 that have previously been disconnected from thecommunications network 102. Additional information about whitelists andblacklists are described in FIG. 2.

In FIG. 1, the threat management server 112 is operably coupled to thecommunications network 102 to facilitate communication with otherelements of the system 100. For example, the threat management server112 may retrieve information from the NAS 108, the database 110, and/orswitches 104 to prevent allowing network access to undesired endpointdevices 106. In particular embodiments, the functionality of the threatmanagement server 112 may be provided by a third party data server. Insome embodiments, the threat management server 112 may reside on anotherdata server or its functionality may be provided by another data server,such as the NAS 108.

In one embodiment, using an appropriate user interface, the threatmanagement server 112 may be accessed to initiate identifying, blocking,and/or isolating an endpoint device 106. As an example, the userinterface may be an interface accessible through a web browser or anapplication on an endpoint device 106. In one embodiments, the threatmanagement server 112 may access the NAS 108 and/or the database 110 todetermine the IP address of the switch 104 coupled to the endpointdevice 106 using its MAC address. In another embodiment, the threatmanagement server 112 may transform the MAC/IP address of an endpointdevice 106 into an IP address of the switch 104 coupled to the endpointdevice 106. For example, the threat management server 112 may use amapping function that transforms the MAC/IP address of the endpointdevice 106 to the IP address of the switch 104 connected to the endpointdevice 106. The threat management server 112 may employ any suitablemapping function or technique as would be appreciated by one of ordinaryskill in the art. In other embodiments, the threat management server 112may use any other technique to determine the IP address of the switch104 connected to an endpoint device 106.

The threat management server 112 may use the IP address of the switch104 to access the switch 104 to obtain information about the switch 104,for example port information and available features of the switch, andto issue commands to block the endpoint device 106, either logically orphysically, from accessing the communications network 102. The threatmanagement server 112 is configured to send one or more commands tologically and/or physically block or isolate the endpoint device 106from the communications network 102.

In one embodiment, logically disabling or blocking an endpoint device106 may involve blackholing the endpoint device 106. Blackholing refersto discarding or dropping frames associated with communications from aparticular endpoint device 106. An example of the threat managementserver 112 sending commands to blackhole an endpoint device 106 isdescribed in FIG. 3.

In another embodiment, disabling or blocking an endpoint device 106 mayinvolve physically disconnecting an endpoint device 106 from thecommunications network 102. For example, the threat management server112 is configured to send one or more disable commands that triggers aswitch 104 to shut off electrical power to the port of the switch 104that is connected to the endpoint device 106. In one embodiment, thisprocess involves transforming the port from an active (e.g. ON) state toan inactive (e.g. OFF) state. Depending on the network architecture andthe type of other endpoint devices 106 that are connected to the sameport on the switch 104, physically disconnecting the port may be aviable option to disconnect an undesirable endpoint device 106 fromaccessing the communications network 102. An example of the threatmanagement server 112 sending commands to disable an endpoint 106 deviceis described in FIG. 3.

In another embodiment, logically disabling or blocking an endpointdevice 106 may involve rerouting data traffic associated with theendpoint device 106 to a safe zone. A safe zone refers to a networklocation that is deemed to be safe to receive traffic from an untrusteddevice. For example, a safe zone may represent an empty port or a porton a switch 104 that is connected to devices with acceptable levels ofrisk, such as a VoIP phone, a printer, or a display. Rerouting trafficassociated with an endpoint device 106 to a safe zone mitigates theimpact of malicious activity. In one embodiment, a safe zone may also bea network traffic monitoring server that enables live monitoring,recording, and/or forensic analysis of data traffic associated with anendpoint device 106. An example of the threat management server 112sending commands to reroute an endpoint device 106 is described in FIG.6.

In one embodiment, the threat management server 112 is configured tosend one or more commands that triggers a switch 104 to reduce or limitthe bandwidth or throughput of the port an endpoint device 106 isconnected to. Reducing the bandwidth or throughput of the port theendpoint device 106 is connected to allows the endpoint device 106 tostay engaged with the communications network 102 in a safe manner whichallows information to be collected about the endpoint device 106 and itsactivities. For example, the threat management server 112 may send acommand to a switch 104 to reduce the bandwidth of the port connected toan endpoint device 106 and to reroute traffic associated with theendpoint device 106 to a safe zone for recording and/or forensicanalysis. In this example, the endpoint device 106 has limited bandwidthwhich mitigates the impact of any malicious activities performed by theendpoint device 106 while data is collected about the endpoint device106.

FIG. 2 is a schematic diagram of an embodiment of a threat managementserver 112. The threat management server 112 comprises a processor 202,a memory 204, and a network interface 206. The threat management server112 may be configured as shown or in any other suitable configuration.

The processor 202 comprises one or more processors operably coupled tothe memory 204. The processor 202 is any electronic circuitry including,but not limited to, state machines, one or more central processing unit(CPU) chips, logic units, cores (e.g. a multi-core processor),field-programmable gate array (FPGAs), application specific integratedcircuits (ASICs), or digital signal processors (DSPs). The processor 202may be a programmable logic device, a microcontroller, a microprocessor,or any suitable combination of the preceding. The processor 202 iscommunicatively coupled to and in signal communication with the memory204. The one or more processors are configured to process data and maybe implemented in hardware or software. For example, the processor 202may be 8-bit, 16-bit, 32-bit, 64-bit or of any other suitablearchitecture. The processor 202 may include an arithmetic logic unit(ALU) for performing arithmetic and logic operations, processorregisters that supply operands to the ALU and store the results of ALUoperations, and a control unit that fetches instructions from memory andexecutes them by directing the coordinated operations of the ALU,registers and other components.

The one or more processors are configured to implement variousinstructions. For example, the one or more processors are configured toexecute instructions to implement a threat management engine 208. In anembodiment, the threat management engine 208 is implemented using logicunits, FPGAs, ASICs, DSPs, or any other suitable hardware.

In one embodiment, the threat management engine 208 is configured todetermine an undesirable endpoint device 106 is connected to a port of aswitch 104 and to block the endpoint device 106 from accessing thecommunications network 102. In this example, the threat managementengine 208 prevents undesirable devices from reconnecting to thecommunications network 102 which reduces the vulnerability of the system100 to malicious activity performed by the undesirable device andprovides improved network security. An example of the threat managementengine 208 operating in this configuration is described in FIG. 3.

In another embodiment, the threat management engine 208 is configured todetermine an undesirable endpoint device 106 that has previously beenblocked from the communications network 102 is connected to a port of aswitch 104 and to block the endpoint device 106 from accessing thecommunications network 102. In this example, the threat managementengine 208 detects undesirable devices that have been previously blockedand prevents them from reconnecting to the communications network 102.An example of the threat management engine 208 operating in thisconfiguration is described in FIG. 4.

In another embodiment, the threat management engine 208 is configured todetermine an undesirable endpoint device 106 that has previously beenblocked on a port of a switch 104 is connected to a different port ofthe switch 104 and to block the endpoint device 106 from accessing thecommunications network 102. In this example, the threat managementengine 208 detects undesirable devices that have been previously blockedfrom one or more ports on a switch 104 and prevents them fromreconnecting to the communications network 102 using a different port onthe switch 104. For example, a bad actor may try to connect a maliciousdevice to different ports of the switch 104 after the device has beenblocked from one or more other ports of the switch 104. An example ofthe threat management engine 208 operating in this configuration isdescribed in FIG. 5.

In another embodiment, the threat management engine 208 is configured todetermine an undesirable endpoint device 106 is connected to a port on aswitch 104 and to isolate the endpoint device 106 within a safe zone toallow the device to be monitored and tracked. In this example, thethreat management engine 208 reduces or limits the bandwidth of the porton the switch 104, collects information about the undesirable device,and/or monitors the traffic associated with the undesirable device. Anexample of the threat management engine 208 operating in thisconfiguration is described in FIG. 6.

The memory 204 comprises one or more disks, tape drives, or solid-statedrives, and may be used as an over-flow data storage device, to storeprograms when such programs are selected for execution, and to storeinstructions and data that are read during program execution. The memory204 may be volatile or non-volatile and may comprise ROM, RAM, ternarycontent-addressable memory (TCAM), dynamic random-access memory (DRAM),and static random-access memory (SRAM). The memory 204 is operable tostore threat management instructions 210, a whitelist 212, a blacklist214, a device log file 216, a port lease log file 218, and/or any otherdata or instructions. The threat management instructions 210 compriseany suitable set of instructions, logic, rules, or code operable toexecute the threat management engine 208.

The whitelist 212 identifies endpoint devices 106 which are known to betrustworthy and are allowed to access the communications network 102.The whitelist 121 may comprise information including, but not limitedto, endpoint device identifiers, MAC addresses, IP addresses, switchidentifiers, switch port addresses, time stamps, any other suitable typeof information, and/or combinations thereof. An example of a whitelist212 includes, but is not limited to, a MAB whitelist. In one embodiment,the system 100 (e.g. the NAS 108) is configured to automaticallyauthenticate an endpoint device 106 that is present on the whitelist212.

The blacklist 214 identifies endpoint devices 106 which are known to beuntrustworthy and are prohibited from accessing the communicationsnetwork 102. The blacklist 214 may comprise information including, butnot limited to, endpoint device identifiers, MAC addresses, IPaddresses, switch identifiers, switch port addresses, time stamps, anyother suitable type of information, and/or combinations thereof. Forexample, the blacklist 214 may identify endpoint devices 106 blockedfrom accessing the communications network 102. The blacklist 214 mayalso identify ports on a switch 104 that an endpoint device 106 has beenblocked from. In one embodiment, the system 100 (e.g. the NAS 108) isconfigured to automatically fail authentication for an endpoint device106 that is present on the blacklist 214.

In one embodiment, the black list 214 identifies block timeout periodslinked with device identifiers for endpoint device 106 that have beenblock from one or more ports on a switch 104. A block timeout period mayindicate an amount of time an endpoint device 106 is blocked from a portand/or the switch 104. For example, a block timeout period may identifya time when the block timeout period expires. As another example, ablock timeout period may identify an amount of time remaining until theblock timeout period expires. In other examples, the block timeoutperiod may use any other technique for indicating how long an endpointdevice 106 is blocked from a port on the switch 104.

In one embodiment, the threat management engine 208 may set the blocktimeout period based on the number of times an endpoint device 106 hasbeen blocked from a port and/or a switch 104. The block timeout periodmay increase each time an endpoint device 106 is blocked from a portand/or switch 104. For example, the block timeout period may be set toblock the endpoint device 106 from connecting to a port for 15 minutesthe first time the endpoint device 106 is blocked from the port. Theblock timeout period may be increased to block the endpoint device 106from connecting to the port for 30 minutes the next time the endpointdevice 106 is blocked from the port, and so on.

The device log file 216 identifies endpoint devices 106 that have eitherpassed or failed authentication with the NAS 108. The device log file216 may comprise information including, but not limited to, endpointdevice identifiers, MAC addresses, IP addresses, switch port addresses,time stamps, any other suitable type of information, and/or combinationsthereof. In one embodiment, an endpoint device identifier may be usedwith the device log file 216 to look-up and determine whether anendpoint device 106 linked with the device identifier has previouslybeen authenticated or has previously failed authentication with the NAS108.

The port lease log file 218 identifies endpoint devices 106 with a leaseon a port of a switch 104. A port lease allows access to thecommunications network 102 via a particular port of a switch 104 forsome period of time. A port lease may be set for thirty minutes, onehour, six hours, twenty four hours, or any other suitable period oftime. The port lease log file 218 may comprise information including,but not limited to, endpoint device identifiers, MAC addresses, IPaddresses, switch identifiers, switch port addresses, port leaseperiods, time stamps, any other suitable type of information, and/orcombinations thereof. For example, an endpoint device identifier may beused with the port lease log file 218 may be used to look-up anddetermine whether an endpoint device 106 linked with the identifier hasan active port lease. The port lease log file 218 may also identify theswitch 104 and the port where the port lease is active.

The network interface 206 is configured to enable wired and/or wirelesscommunications. The network interface 206 is configured to communicatedata through the system 100, the communications network 102, and/or anyother system or domain. For example, the network interface 206 may beconfigured for communication with a modem, a switch, a router, a bridge,a server, or a client. The processor 202 is configured to send andreceive data using the network interface 206 from the communicationsnetwork 102.

FIG. 3 is a flowchart of an embodiment of a device removal method 300.Method 300 is implemented by the threat management server 112 toidentify endpoint devices 106 that connect to a switch 104 in thecommunications network 102 and to block endpoint devices 106 that areidentified as untrusted devices from accessing the communicationsnetwork 102.

In a conventional system, when a malicious endpoint device 106 isconnected to a port of the switch 104, the endpoint device 106 is ableto download and access information from the communications network 102.Conventional systems are unable to identify the endpoint device 106 andto establish an uplink connection with the endpoint device 106 when theendpoint device 106 fails authentication. In contrast, system 100provides a mechanism for identifying and blocking the malicious endpointdevice 106 from accessing the communications network 102.

A non-limiting example is provided to illustrate how the threatmanagement server 112 implements method 300 to identify endpoint devices106 and to block untrusted or malicious endpoint devices 106 fromaccessing the communications network 102. As an example, a user connectsan endpoint device 106 to a port on a switch 104. The NAS 108 attemptsto authenticate the endpoint device 106, but the endpoint device 106fails authentication with the NAS 108. The threat management server 112is used to identify the endpoint device 106 and to block the endpointdevice 106 if the device is identified as an untrusted or maliciousdevice.

At step 302, the threat management server 112 receives a deviceidentifier for the endpoint device 106 in response to the deviceconnecting to a port on a switch 104. In one embodiment, the NAS 108collects information from the switch 104 about the endpoint device 106to generate a device identifier for the endpoint device 106. Examples ofdevice identifiers may include, but are not limited to, a MAC address ofthe endpoint device 106, an IP address of the endpoint device 106, adevice type, a vendor, a port address for the switch, any other suitableinformation, or combinations thereof. The NAS 108 sends the deviceidentifier for the endpoint device 106 to the threat management server112. For example, the device identifier for the endpoint device 106 maycomprise the MAC address for the endpoint device 106. In anotherembodiment, the threat management server 112 may request informationabout the endpoint device 106 from the NAS 108 and/or the database 110.

At step 304, the threat management server 112 determines whether theendpoint device 106 is present in a device log file 216. For example,the threat management server 112 may use the device identifier (e.g. MACaddress) to look-up whether the endpoint device 106 is present in thedevice log file 216. The presence of the endpoint device 106 in thedevice log file 216 indicates that historical information about whetherthe endpoint device 106 has previously failed or passed authenticationwith the NAS 108 is available. The threat management server 112 proceedsto step 306 when the threat management server 112 determines that theendpoint device 106 is present in the device log file 216. The absenceof the endpoint device 106 in the device log file 216 indicates thathistorical information about whether the endpoint device 106 haspreviously failed or passed authentication with the NAS 108 may not beavailable. The threat management server 112 terminates method 300 whenthe threat management server 112 determines that the endpoint device 106is not present in the device log file 216.

At step 306, the threat management server 112 determines the number oftimes the endpoint device 106 has failed authentication with the NAS 108within a first time period using the device log file 216. For example,the threat management server 112 may count the number of times theendpoint device 106 appears in the device log file 216 as failingauthentication with the NAS 108 within the first time period. The firsttime period may be any predetermined amount of time. For example, thefirst time period may be fifteen minutes, thirty minutes, one hour, orany other amount of time. The first time period may be in seconds,minutes, hours, days, or in any other suitable time unit.

At step 308, the threat management server 112 determines whether thenumber of times the endpoint device 106 has failed authenticationexceeds a first threshold value within the first time period. Forexample, the threat management server 112 may determine whether theendpoint device 106 has failed authentication at least ten times withinthe past 15 minutes. The threat management server 112 compares thenumber of times the endpoint device 106 has failed authentication withinthe first time period (e.g. 15 minutes) to the first threshold value(e.g. 10). In other examples, the threat management server 112 may useany other suitable value for the first threshold value. The threatmanagement server 112 proceeds to step 310 when the number of times theendpoint device 106 has failed authentication exceeds the firstthreshold value. The threat management server 112 terminates method 300when the number of times the endpoint device 106 has failedauthentication does not exceed the first threshold value.

At step 310, the threat management server 112 determines the number oftimes the endpoint device 106 has passed authentication with the NAS 108within a second time period using the device log file 216. For example,the threat management server 112 may count the number of times theendpoint device 106 appears in the device log file 216 as passingauthentication with the NAS 108 within the second time period. Thesecond time period may be any predetermined amount of time. In oneembodiment, the second time period is a greater period of time than thefirst time period. For example, the first time period may be one hourand the second time period may be twenty four hours.

At step 312, the threat management server 112 determines whether thenumber of times the endpoint device 106 has passed authentication isless than a second threshold value within the second time period. Forexample, the threat management server 112 may determine whether theendpoint device 106 has passed authentication at least twice within thepast 24 hours. The threat management server 112 compares the number oftimes the endpoint device 106 has passed authentication within thesecond time period to the second threshold value. In other examples, thethreat management server 112 may use any other suitable value for thesecond threshold value. The threat management server 112 proceeds tostep 314 when the number of times the endpoint device 106 has passedauthentication is less than the second threshold value. The threatmanagement server 112 terminates method 300 when the number of times theendpoint device 106 has passed authentication is at least the secondthreshold value.

At step 314, the threat management server 112 determines whether theendpoint device 106 has a lease for the port on the switch 104. Forexample, the threat management server 112 may use the device identifier(e.g. MAC address) with the port lease log file 218 to look-up anddetermine whether the endpoint device 106 has a lease for the port onthe switch 104. The threat management server 112 proceeds to step 316when the threat management server 112 determines that the endpointdevice 106 does not have a lease on the port of the switch 104. Thethreat management server 112 terminates method 300 when the threatmanagement server 112 determines that the endpoint device 106 has alease on the port of the switch 104.

At step 316, the threat management server 112 blocks the endpoint device106 from accessing the communications network 102 via the port of theswitch 104. In one embodiment, the threat management server 112 sends ablackhole command identifying the endpoint device 106 to the switch 104.For example, the blackhole command may comprise the device identifierfor the endpoint device 106. The switch 104 is configured to transformthe destination traffic associated with the endpoint device 106 to anull destination in response to receiving the blackhole command. Inanother embodiment, the switch 104 is configured to discard trafficassociated with the endpoint device 106 in response to receiving theblackhole command.

In another embodiment, the threat management server 112 sends a disablecommand identifying the endpoint device 106 to the switch 104. Theswitch 104 is configured to disable the port on the switch 104 that theendpoint device 106 is connected to in response to receiving the disablecommand. For example, the switch 104 may logically disable the port ortransition the port to an inactive state. In another embodiment, theswitch 104 is configured to disconnect electrical power to the port onthe switch 104 that the endpoint device 106 is connected to in responseto receiving the disable command. For example, the switch 104 mayactuate an electronic switch to disconnection electrical power to theport. In other examples, the switch 104 may disable the port using anyother suitable technique as would be appreciated by one of ordinaryskill in the art.

In other embodiments, the threat management server 112 may block theendpoint device 106 from accessing the communications network 102 usingany other suitable technique as would be appreciated by one of ordinaryskill in the art.

In one embodiment, the threat management server 112 adds the endpointdevice 106 to a blacklist 214 in response to blocking the endpointdevice 106 from accessing the communications network 102. In someembodiments, adding the endpoint device 106 to the blacklist 214triggers the NAS 108 to automatically fail authentication for theendpoint device 106 the next time the endpoint device 106 connects tothe switch 104.

In one embodiment, the threat management server 112 sends an alertidentifying the endpoint device 106 in response to blocking the endpointdevice 106 from accessing the communications network 102. In oneembodiment, a user can request to receive alerts based on user definedrules or criteria. For example, a user may request to receive an alertwhen an endpoint device 106 with a MAC address within a particular rangeof MAC addresses is blocked from accessing the communications network102. User defined rules may include, but are not limited to, deviceidentifiers, MAC addresses, IP address, port addresses, devicemanufactures, vendors, any other suitable criteria, and/or combinationsof criteria. The user may also provided delivery preferences that definehow the alert should be sent. For example, a user may request alerts viaemail, text, or any other suitable delivery technique. The threatmanagement server 112 sends the alert to the user in accordance with theuser defined rules and delivery preferences.

FIG. 4 is a flowchart of an embodiment of a device removal method 400for repeat offenders. Method 400 is implemented by the threat managementserver 112 to identify and block malicious or undesirable endpointdevices 106 that attempt to reconnect to the communications network 102.

Similar to the example described in FIG. 3, conventional systems areunable to identify and block endpoint devices 106 that do not passauthentication. In contrast, system 100 provides a mechanism foridentifying and blocking the malicious endpoint device 106 fromaccessing the communications network 102 using knowledge that theendpoint device 106 has previously been blocked from the communicationsnetwork 102.

A non-limiting example is provided to illustrate how the threatmanagement server 112 implements method 400 to identify and block anendpoint device 106 from accessing the communications network 102. As anexample, a bad actor reconnects an endpoint device 106 that has beenpreviously blocked from the communications network 102 to a port on aswitch 104. In this example, the NAS 108 attempts to authenticate theendpoint device 106, but the endpoint device 106 fails authenticationwith the NAS.

At step 402, the threat management server 112 receives a deviceidentifier for an endpoint device 106 indicating the endpoint device 106is failing authentication on a port of a switch 104. Receiving thedevice identifier for the endpoint device 106 may be performed using aprocess similar to the process describe in step 302 of FIG. 3. In oneembodiment, the NAS 108 sends a device identifier for the endpointdevice 106 to the threat management server 112 in response to theendpoint device 106 failing authentication. For example, the deviceidentifier for the endpoint device 106 may comprise the MAC address forthe endpoint device 106. In another embodiment, the threat managementserver 112 may request information about the endpoint device 112 fromthe NAS 108 and/or the database 110.

At step 404, the threat management server 112 determines the number oftimes the endpoint device 106 has failed authentication with the NAS 108within a first time period. Determining the number of times the endpointdevice 106 has failed authentication within the first time period may beperformed using a process similar to the process describe in step 306 ofFIG. 3. For example, the threat management server 112 may count thenumber of times the endpoint device 106 appears in the device log file216 as failing authentication with the NAS 108 within the first timeperiod. The first time period may be any predetermined amount of time.

At step 406, the threat management server 112 determines whether thenumber of times the endpoint device 106 has failed authenticationexceeds a first threshold value within the first time period.Determining the whether the number of times the endpoint device 106 hasfailed authentication exceeds the first threshold value within the firsttime period may be performed using a process similar to the processdescribe in step 308 of FIG. 3. For example, the threat managementserver 112 may determine whether the endpoint device 106 has failedauthentication at least once times within the past hour. The threatmanagement server 112 compares the number of times the endpoint device106 has failed authentication within the first time period (e.g. 1 hour)to the first threshold value (e.g. one). In other examples, the threatmanagement server 112 may use any other suitable value for the firstthreshold value. The threat management server 112 proceeds to step 408when the threat management server 112 determines that the number oftimes the endpoint device 106 has failed authentication exceeds thefirst threshold value within the first time period. The threatmanagement server 112 terminates method 400 when the threat managementserver 112 determines that the number of times the endpoint device 106has failed authentication does not exceed the first threshold valuewithin the first time period.

At step 408, the threat management server 112 blocks the endpoint device106 from accessing the communications network 102 via the port of theswitch 104. The threat management server 112 may block the endpointdevice 106 using a process similar to the process described in step 316of FIG. 3.

FIG. 5 is a flowchart of an embodiment of a device removal method 500for port switching devices. Method 500 is implemented by a threatmanagement server 112 to identify and block malicious or undesirableendpoint devices 106 that attempt to switch ports on a switch 104 toreconnect to the communications network 102.

A non-limiting example is provided to illustrate how the threatmanagement server 112 implements method 500 to identify and block anendpoint device 106 from accessing the communications network 102 byswitching ports on a switch 104 after the endpoint device 106 haspreviously been blocked from another port of the switch 104. As anexample, a bad actor reconnects an endpoint device 106 that has beenpreviously blocked from one of the ports of a switch 104 to another porton the switch 104. In this example, the bad actor may attempt toreconnect an endpoint device 106 to different ports on a switch 104after being be blocked from one or more other ports on the switch 104.Similar to the example described in FIG. 3, conventional systems areunable to identify and block endpoint device 106 that do not passauthentication. In addition, conventional systems are also unable totrack endpoint devices 106 that switch ports on a switch 104. Incontrast, system 100 provides a mechanism for tracking and blocking themalicious endpoint device 106 from accessing the communications network102 even if the endpoint device 106 keeps switching ports on a switch104.

At step 502, the threat management server 112 receives a deviceidentifier for an endpoint device 106 in response to the endpoint device106 connecting to a port on a switch 104. Receiving the deviceidentifier for the endpoint device 106 may be performed using a processsimilar to the process describe in step 302 of FIG. 3. In oneembodiment, the NAS 108 sends a device identifier for the endpointdevice 106 to the threat management server 112 in response to theendpoint device 106 connecting to a port on the switch. For example, thedevice identifier for the endpoint device 106 may comprise the MACaddress for the endpoint device 106. In another embodiment, the threatmanagement server 112 may request information about the endpoint device112 from the NAS 108 and/or database 110.

At step 504, the threat management server 112 determines whether theendpoint device 106 is present in a blacklist 214. For example, thethreat management server 112 may use the device identifier (e.g. MACaddress) to look-up whether the endpoint device 106 is present in theblacklist 214. The threat management system 112 determines that theendpoint device 106 has previously been blocked from accessing thecommunications network 102 when the endpoint device 106 is present inthe blacklist 214. The threat management engine 112 proceeds to step 506when the endpoint device 106 is present in the blacklist 214. The threatmanagement system 112 determines that the endpoint device 106 has notbeen previously blocked from accessing the communications network 102when the endpoint device 106 is not present in the blacklist 214. Thethreat management engine 112 terminates method 500 when the endpointdevice 106 is not present in the blacklist 214.

At step 506, the threat management server 112 determines whether theendpoint device 106 is blocked from one or more other ports on theswitch 104. The blacklist 214 comprises information indicating ports ona switch 104 that the endpoint device 106 has been blocked from. Thethreat management server 112 uses information from the blacklist 214 todetermine whether the endpoint device 106 has previously been blockedfrom one or more other ports on the switch 104. In one embodiment, thethreat management server 112 determines whether the endpoint device 106has been blocked from one or more other ports on the switch 104 within apredetermined time period, for example, the past 24 hours. The threatmanagement server 112 proceeds to step 508 when the endpoint device 106is blocked from one or more other ports on the switch 104. The threatmanagement engine 112 proceeds to step 510 when the endpoint device 106is not blocked from any other ports on the switch 104.

At step 508, the threat management server 112 blocks the endpoint device106 from accessing the communications network 102 via the first port ofthe switch 104. The threat management server 112 may block the endpointdevice 106 using a process similar to the process described in step 316of FIG. 3.

FIG. 6 is a flowchart of an embodiment of a device isolating method 600.Method 600 is implemented by the threat management server 112 toidentify and track malicious or undesirable endpoint devices 106 thatare connected to a switch 104 in the communications network 102 and toisolate these endpoint devices 106 within a safe zone in thecommunications network 102.

A non-limiting example is provided to illustrate how the threatmanagement server 112 implements method 600 to identify and isolate anendpoint device 106 within a safe zone in the communications network102. As an example, a bad actor connects a malicious endpoint device 106to a port on a switch 104. Similar to the example described in FIG. 3,conventional systems are unable to identify and communicate withendpoint device 106 that do not pass authentication. In addition,conventional systems are also unable to isolate or monitor an endpointdevice 106 without exposing the communications network 102 to maliciousactivities such as data exfiltration. In contrast, system 100 provides amechanism for identifying, isolating, and monitoring the maliciousendpoint device 106 within a safe zone in the communications network102. In this example, system 100 safely keeps the malicious endpointdevice 106 engaged while collecting information about the maliciousendpoint device 106 and/or its activity.

At step 602, the threat management server 112 receives a deviceidentifier for an endpoint device 106 in response to the endpoint device106 connecting to a port on a switch 104. Receiving the deviceidentifier for the endpoint device 106 may be performed using a processsimilar to the process describe in step 302 of FIG. 3. In oneembodiment, the NAS 108 sends a device identifier for the endpointdevice 106 to the threat management server 112 in response to theendpoint device 106 connecting to the port on the switch 104. Forexample, the device identifier for the endpoint device 106 may comprisethe MAC address for the endpoint device 106. In another embodiment, thethreat management server 112 may request information about the endpointdevice 112 from the NAS 108 and/or database 110.

At step 604, the threat management server 112 determines whether theendpoint device 106 is present in a device log file 216. For example,the threat management server 112 may use the device identifier (e.g. MACaddress) to look-up whether the endpoint device 106 is present in thedevice log file 216. The presence of the endpoint device 106 in thedevice log file 216 indicates that historical information about whetherthe endpoint device 106 has previously failed or passed authenticationwith the NAS 108 is available. The threat management server 112 proceedsto step 606 when the threat management server 112 determines that theendpoint device 106 is present in the device log file 216. The absenceof the endpoint device 106 in the device log file 216 indicates thathistorical information about whether the endpoint device 106 haspreviously failed or passed authentication with the NAS 108 may not beavailable. The threat management server 112 terminates method 600 whenthe threat management server 112 determines that the endpoint device 106is not present in the device log file 216.

At step 606, the threat management server 112 determines the number oftimes the endpoint device 106 has failed authentication with the NAS 108within a first time period using the device log file 216. Determine thenumber of times the endpoint device 106 has failed authentication withthe NAS 108 may be performed using a process similar to the processdescribe in step 306 of FIG. 3. For example, the threat managementserver 112 may count the number of times the endpoint device 106 appearsin the device log file 216 as failing authentication with the NAS 108within the first time period. The first time period may be anypredetermined amount of time.

At step 608, the threat management server 112 determines whether thenumber of times the endpoint device 106 has failed authenticationexceeds a first threshold value within the first time period.Determining whether the number of times the endpoint device 106 hasfailed authentication exceeds the first threshold within the first timeperiod may be performed using a process similar to the process describein step 308 of FIG. 3. For example, the threat management server 112 maydetermine whether the endpoint device 106 has failed authentication atleast ten times within the past 15 minutes. The threat management server112 compares the number of times the endpoint device 106 has failedauthentication within the first time period (e.g. 15 minutes) to thefirst threshold value (e.g. 10). In other examples, the threatmanagement server 112 may use any other suitable value for the firstthreshold value. The threat management server 112 proceeds to step 610when the number of times the endpoint device 106 has failedauthentication exceeds the first threshold value. The threat managementserver 112 terminates method 600 when the number of times the endpointdevice 106 has failed authentication does not exceed the first thresholdvalue.

At step 610, the threat management server 112 determines the number oftimes the endpoint device 106 has passed authentication with the NAS 108within a second time period using the device log file 216. Determiningthe number of time the endpoint device 106 has passed authenticationwith the NAS 108 may be performed using a process similar to the processdescribe in step 310 of FIG. 3. For example, the threat managementserver 112 may count the number of times the endpoint device 106 appearsin the device log file 216 as passing authentication with the NAS 108within the second time period. The second time period may be anypredetermined amount of time. In one embodiment, the second time periodis a greater period of time than the first time period. For example, thefirst time period may be one hour and the second time period may betwenty four hours.

At step 612, the threat management server 112 determines whether thenumber of times the endpoint device 106 has passed authentication isless than a second threshold value within the second time period.Determining whether the number of times the endpoint device 106 haspassed authentication is less than the second threshold value within thesecond time period may be performed using a process similar to theprocess describe in step 312 of FIG. 3. For example, the threatmanagement server 112 may determine whether the endpoint device 106 haspassed authentication at least twice within the past 24 hours. Thethreat management server 112 compares the number of times the endpointdevice 106 has passed authentication within the second time period tothe second threshold value. In other examples, the threat managementserver 112 may use any other suitable value for the second thresholdvalue. The threat management server 112 proceeds to step 614 when thenumber of times the endpoint device 106 has passed authentication isless than the second threshold value. The threat management server 112terminates method 600 when the number of times the endpoint device 106has passed authentication is at least the second threshold value.

At step 614, the threat management server 112 determines whether theendpoint device 106 has a lease for the port on the switch 104.Determining whether the endpoint device has a lease for the port on theswitch 104 may be performed using a process similar to the processdescribe in step 314 of FIG. 3. For example, the threat managementserver 112 may use the device identifier (e.g. MAC address) with theport lease log file 218 to look-up and determine whether the endpointdevice 106 has a lease for the port on the switch 104. The threatmanagement server 112 proceeds to step 616 when the threat managementserver 112 determines that the endpoint device 106 does not have a leaseon the port of the switch 104. The threat management server 112terminates method 600 when the threat management server 112 determinesthat the endpoint device 106 has a lease on the port of the switch 104.

At step 616, the threat management server 112 isolates the endpointdevice 106 within a safe zone in the communications network 102. In oneembodiment, the threat management server 112 sends a reroute commandidentifying the endpoint device 106 to the switch 104. For example, thereroute command may comprise the device identifier for the endpointdevice 106. The switch 104 is configured to transform the destination oftraffic associated with the endpoint device 106 to a safe zone inresponse to receiving the reroute command. Transferring the trafficassociated with the endpoint device 106 to the safe zone allows theendpoint device 106 to be monitored and recorded in a low-riskenvironment without jeopardizing the system 100 and communicationsnetwork 102.

In one embodiment, the safe zone is an empty port on the switch 104. Forexample, the switch 104 may reconnect the endpoint device 106 to a portthat is not connected to any other devices. In another embodiment, thesafe zone is a port on the switch 104 that is connected to devices witha threat level below a threat level threshold. The switch 104 maydetermine a threat level for a device based on its vulnerability tomalicious attacks. Devices that are more vulnerable to an attack have ahigher threat level than devices that are less vulnerable to an attack.For instance, a database or memory is more vulnerable and has a higherthreat level than an IP phone or printer. The switch 104 may use anysuitable technique for determining and assigning threat levels fordevices.

In one embodiment, the switch 104 is configured to reduce or limit thebandwidth and/or throughput of the port on the switch 104 connected tothe endpoint device 106. For example, the switch 104 may issue one ormore commands to reduce or limit the speed of the port. The switch 104may set the port speed to a particular value (e.g. 10 Mbps or 56 Kbps)or may set the port speed to a percentage of the maximum speed of theport (e.g. 10%) of the maximum bandwidth). As another example, theswitch 104 may issues one or more commands to limit the amount of datathat can communicated by the port. For instance, the switch 104 may seta limit (e.g. 100 MB) for how much data can be communicated by the portwithin a predetermined time interval (e.g. one hour). In other examples,the switch 104 may limit both the bandwidth and throughput of the port.

In one embodiment, data traffic for the endpoint device 106 is recordedand/or monitored in the safe zone. Traffic for the endpoint device 106may be identified and monitored based on its MAC address, IP address, orany other suitable information. The threat management server 112performs a forensic analysis on the recorded traffic associated with theendpoint device 106 to identify activity, behavior, and/or patterns bythe endpoint device 106 that may be used to increase the security of thesystem 100. For example, a forensic analysis may identify activity thatcan be used by the system (e.g. threat management server 112) toidentify other potentially malicious endpoint devices 106.

In one embodiment, the threat management server 112 adds the endpointdevice 106 to a blacklist 214 in response to blocking the endpointdevice 106 from accessing the communications network 102. In someembodiments, adding the endpoint device 106 to the blacklist 214triggers the NAS 108 to automatically fail authentication for theendpoint device 106 the next time the endpoint device 106 connects tothe switch 104.

While several embodiments have been provided in the present disclosure,it should be understood that the disclosed systems and methods might beembodied in many other specific forms without departing from the spiritor scope of the present disclosure. The present examples are to beconsidered as illustrative and not restrictive, and the intention is notto be limited to the details given herein. For example, the variouselements or components may be combined or integrated in another systemor certain features may be omitted, or not implemented.

In addition, techniques, systems, subsystems, and methods described andillustrated in the various embodiments as discrete or separate may becombined or integrated with other systems, modules, techniques, ormethods without departing from the scope of the present disclosure.Other items shown or discussed as coupled or directly coupled orcommunicating with each other may be indirectly coupled or communicatingthrough some interface, device, or intermediate component whetherelectrically, mechanically, or otherwise. Other examples of changes,substitutions, and alterations are ascertainable by one skilled in theart and could be made without departing from the spirit and scopedisclosed herein.

To aid the Patent Office, and any readers of any patent issued on thisapplication in interpreting the claims appended hereto, applicants notethat they do not intend any of the appended claims to invoke 35 U.S.C. §112(f) as it exists on the date of filing hereof unless the words “meansfor” or “step for” are explicitly used in the particular claim.

1. An information security system comprising: a switch configured toprovide network connectivity for one or more endpoint devices to anetwork; a network authentication server operably coupled to the switchand configured to: authenticate endpoint devices connected to theswitch; send a device identifier for an endpoint device to a threatmanagement server in response to the endpoint device connecting to afirst port on the switch; the threat management server operably coupledto the switch and the network authentication server comprising: a memoryconfigured to store: a blacklist identifying: one or more endpointdevices blocked from accessing the network; and ports on the switch eachof the one or more endpoint devices have been blocked from; a threatmanagement engine implemented by a processor configured to: determinethe endpoint device is present in the blacklist based on the deviceidentifier in response to receiving the device identifier; determine theendpoint device is blocked from one or more second ports on the switch;and block the endpoint device from accessing the network via the firstport on the switch in response to determining the endpoint device isblocked from the one or more second ports on the switch.
 2. The systemof claim 1, wherein: blocking the endpoint device from accessing thenetwork comprises sending a blackhole command to the switch identifyingthe endpoint device; and the switch is configured to transform thedestination of traffic associated with the endpoint device to a nulldestination in response to receiving the blackhole command.
 3. Thesystem of claim 1, wherein: blocking the endpoint device from accessingthe network comprises sending a blackhole command to the switchidentifying the endpoint device; and the switch is configured to discardtraffic associated with the endpoint device in response to receiving theblackhole command.
 4. The system of claim 1, wherein: blocking theendpoint device from accessing the network comprises sending a disablecommand to the switch identifying the endpoint device; and the switch isconfigured to disable the port the endpoint device is connected to inresponse to receiving the disable command.
 5. The system of claim 1,wherein the threat management engine is configured to send an alertidentifying the endpoint device in response to blocking the endpointdevice from accessing the network.
 6. The system of claim 1, wherein thethreat management engine is configured to capture device information forthe endpoint device in response to blocking the endpoint device fromaccessing the network.
 7. The system of claim 1, wherein determining theendpoint device is blocked from the one or more second ports on theswitch comprises determining that the endpoint device was blocked fromthe one or more second ports within a predetermined time period.
 8. Athreat management server comprising: a memory configured to store: ablacklist identifying: one or more endpoint devices blocked fromaccessing a network; and ports each of the one or more endpoint deviceshave been blocked from; a threat management engine implemented by aprocessor configured to: receive a device identifier for an endpointdevice in response to the endpoint device connecting to a first port ona switch; determine the endpoint device is present in the blacklistbased on the device identifier in response to receiving the deviceidentifier; determine the endpoint device is blocked from one or moresecond ports on the switch; and block the endpoint device from accessingthe network via the first port on the switch in response to determiningthe endpoint device is blocked from the one or more second ports on theswitch.
 9. The device of claim 8, wherein: blocking the endpoint devicefrom accessing the network comprises sending a blackhole command to theswitch identifying the endpoint device; and the blackhole commandtriggers the switch to transform the destination of traffic associatedwith the endpoint device to a null destination in response to receivingthe blackhole command.
 10. The device of claim 8, wherein: blocking theendpoint device from accessing the network comprises sending a blackholecommand to the switch identifying the endpoint device; and the blackholecommand triggers the switch to discard traffic associated with theendpoint device in response to receiving the blackhole command.
 11. Thedevice of claim 8, wherein: blocking the endpoint device from accessingthe network comprises sending a disable command to the switchidentifying the endpoint device; and the disable command triggers theswitch to disable the port the endpoint device is connected to inresponse to receiving the disable command.
 12. The device of claim 8,wherein the threat management engine is configured to send an alertidentifying the endpoint device in response to blocking the endpointdevice from accessing the network.
 13. The device of claim 8, whereinthe threat management engine is configured to capture device informationfor the endpoint device in response to blocking the endpoint device fromaccessing the network.
 14. The device of claim 8, wherein determiningthe endpoint device is blocked from the one or more second ports on theswitch comprises determining that the endpoint device was blocked fromthe one or more second ports within a predetermined time period.
 15. Aninformation security method comprising: receiving, by a threatmanagement server, a device identifier for an endpoint device inresponse to the endpoint device connecting to a first port on a switch;determining, by the threat management server, the endpoint device ispresent in a blacklist based on the device identifier in response toreceiving the endpoint device identifier, wherein the blacklistidentifies: one or more endpoint devices blocked from accessing anetwork; and ports on the switch each of the one or more endpointdevices have been blocked from; determining, by the threat managementserver, the endpoint device is blocked from one or more second ports onthe switch; and blocking, by the threat management server, the endpointdevice from accessing the network via the first port on the switch inresponse to determining the endpoint device is blocked from the one ormore second ports on the switch.
 16. The method of claim 15, wherein:blocking the endpoint device from accessing the network comprisessending a blackhole command to the switch identifying the endpointdevice; and the blackhole command triggers the switch to transform thedestination of traffic associated with the endpoint device to a nulldestination in response to receiving the blackhole command.
 17. Themethod of claim 15, wherein: blocking the endpoint device from accessingthe network comprises sending a blackhole command to the switchidentifying the endpoint device; and the blackhole command triggers theswitch to discard traffic associated with the endpoint device inresponse to receiving the blackhole command.
 18. The method of claim 15,wherein: blocking the endpoint device from accessing the networkcomprises sending a disable command to the switch identifying theendpoint device; and the disable command triggers the switch to disablethe port the endpoint device is connected to in response to receivingthe disable command.
 19. The method of claim 15, further comprisingsending, by the threat management server, an alert identifying theendpoint device in response to blocking the endpoint device fromaccessing the network.
 20. The method of claim 15, further comprisingcapturing, by the threat management server, device information for theendpoint device in response to blocking the endpoint device fromaccessing the network.