Illustrative embodiments disclosed herein may use a combination of learning technologies and knowledge of IP-based (IPv4, IPv6, and successors) networking to determine if a network packet stream has been surreptitiously redirected. Furthermore, the technology needs to operate without interfering with existing IP-based technologies and have the ability to take specific defined actions when a network packet stream is suspected of having been redirected.
FIG. 1 shows an example IP based network (1000) suitable for use with embodiments disclosed herein, or within which embodiments disclosed herein may be implemented. An illustrative network structure includes an end-user device (100a), wirelessly connected to a wireless access point (AP) (110), which is in turn operably connected to an edge router (e.g. 120a) that provides connection to and between local systems (often having unroutable IP addresses), which is in turn operably connected to the IP-based network “cloud” (800) such as the Internet, which is in turn operably connected to an IP-based network server (900) (e.g. such as a webserver or other Internet-based server), or directly or indirectly to other end user devices (e.g. 100a, 100b, 100c, 100d). Each of the operable connections is made using routers, switches, telecommunications circuits, and similar networking equipment as will be known to and readily understood by one skilled in the art.