Abstract: A system and method of detecting an unauthorized access, phish attempt, or ransomware attempt based on limiting network transmission of data packets within an authorized device range. The method includes establishing a router hop limit value to predetermine an authorized device range for data packets to be exchanged between communicating pair devices and limiting transmission of data packets to within the predetermined authorized device range by discarding data packets after reaching the predetermined authorized device range as a function of the established hop limit value, to exclude devices beyond the predetermined authorized device range. Analyzer, Explorer, Setter, Modifier and Monitor Modules interoperate to suppress spurious communications from remote intruders.
Abstract: A system and method of detecting an unauthorized access, phish attempt, or ransomware attempt based on limiting network transmission of data packets within an authorized device range. The method includes establishing a router hop limit value to predetermine an authorized device range for data packets to be exchanged between communicating pair devices and limiting transmission of data packets to within the predetermined authorized device range by discarding data packets after reaching the predetermined authorized device range as a function of the established hop limit value, to exclude devices beyond the predetermined authorized device range. Analyzer, Explorer, Setter, Modifier and Monitor Modules interoperate to suppress spurious communications from remote intruders.
Abstract: A system and method for analyzing and resetting Time-to-Live or HOP count on a device to limit communications within a designated HOP limit sphere to protect the device from unwanted communications outside a safe zone established by an administrator. Analyzer, Explorer, Setter, Modifier and Monitor Modules interoperate to suppress spurious communications from remote intruders by; analyzing connectivity needs and calculating an appropriate HOP value; setting the HOP value in the device or modifying the HOP value within the data packet as the packet passes through the Modifier; monitoring connections for ICMP discards; investigating anomalies or changes in the network topology and updating hop limit values accordingly.
Abstract: A system and method for analyzing and resetting Time-to-Live or HOP count on a device to limit communications within a designated HOP limit sphere to protect the device from unwanted communications outside a safe zone established by an administrator. Analyzer, Explorer, Setter, Modifier and Monitor Modules interoperate to suppress spurious communications from remote intruders by; analyzing connectivity needs and calculating an appropriate HOP value; setting the HOP value in the device or modifying the HOP value within the data packet as the packet passes through the Modifier; monitoring connections for ICMP discards; investigating anomalies or changes in the network topology and updating hop limit values accordingly.