ACTIVE NETWORK DEFENSE SYSTEM AND METHOD
PROBLEM TO BE SOLVED: To provide an active network defense system which monitors and blocks traffic automatically. SOLUTION: The system is set up in an in-line state with respect to a packet traffic data flow as a part of a network infrastructure. In the configuration, all passing packets are inspec...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | MCHALE JOHN SMITH BRIAN KOLBLY DONOVAN WILLEBEEK-LEMAIR MARC COX DENNIS CANTRELL CRAIG |
description | PROBLEM TO BE SOLVED: To provide an active network defense system which monitors and blocks traffic automatically. SOLUTION: The system is set up in an in-line state with respect to a packet traffic data flow as a part of a network infrastructure. In the configuration, all passing packets are inspected and processed. An algorithmic filter operation applies statistical threshold filtering to the data flow in order to identify a threat existing across many sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify a threat existing within each session. Threatening packet traffic is blocked and threatening session is terminated. Suspicious traffic is extracted from the data flow and receives more comprehensive content matching examination and asset risk analyzing examination further. COPYRIGHT: (C)2011,JPO&INPIT |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_JP2010268483A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>JP2010268483A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_JP2010268483A3</originalsourceid><addsrcrecordid>eNrjZNBwdA7xDHNV8HMNCfcP8lZwcXVz9Qt2VQiODA5x9VVw9HNR8HUN8fB34WFgTUvMKU7lhdLcDEpuriHOHrqpBfnxqcUFicmpeakl8V4BRgaGBkZmFiYWxo7GRCkCAEwpJIA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ACTIVE NETWORK DEFENSE SYSTEM AND METHOD</title><source>esp@cenet</source><creator>MCHALE JOHN ; SMITH BRIAN ; KOLBLY DONOVAN ; WILLEBEEK-LEMAIR MARC ; COX DENNIS ; CANTRELL CRAIG</creator><creatorcontrib>MCHALE JOHN ; SMITH BRIAN ; KOLBLY DONOVAN ; WILLEBEEK-LEMAIR MARC ; COX DENNIS ; CANTRELL CRAIG</creatorcontrib><description>PROBLEM TO BE SOLVED: To provide an active network defense system which monitors and blocks traffic automatically. SOLUTION: The system is set up in an in-line state with respect to a packet traffic data flow as a part of a network infrastructure. In the configuration, all passing packets are inspected and processed. An algorithmic filter operation applies statistical threshold filtering to the data flow in order to identify a threat existing across many sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify a threat existing within each session. Threatening packet traffic is blocked and threatening session is terminated. Suspicious traffic is extracted from the data flow and receives more comprehensive content matching examination and asset risk analyzing examination further. COPYRIGHT: (C)2011,JPO&INPIT</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2010</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20101125&DB=EPODOC&CC=JP&NR=2010268483A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20101125&DB=EPODOC&CC=JP&NR=2010268483A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>MCHALE JOHN</creatorcontrib><creatorcontrib>SMITH BRIAN</creatorcontrib><creatorcontrib>KOLBLY DONOVAN</creatorcontrib><creatorcontrib>WILLEBEEK-LEMAIR MARC</creatorcontrib><creatorcontrib>COX DENNIS</creatorcontrib><creatorcontrib>CANTRELL CRAIG</creatorcontrib><title>ACTIVE NETWORK DEFENSE SYSTEM AND METHOD</title><description>PROBLEM TO BE SOLVED: To provide an active network defense system which monitors and blocks traffic automatically. SOLUTION: The system is set up in an in-line state with respect to a packet traffic data flow as a part of a network infrastructure. In the configuration, all passing packets are inspected and processed. An algorithmic filter operation applies statistical threshold filtering to the data flow in order to identify a threat existing across many sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify a threat existing within each session. Threatening packet traffic is blocked and threatening session is terminated. Suspicious traffic is extracted from the data flow and receives more comprehensive content matching examination and asset risk analyzing examination further. COPYRIGHT: (C)2011,JPO&INPIT</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2010</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZNBwdA7xDHNV8HMNCfcP8lZwcXVz9Qt2VQiODA5x9VVw9HNR8HUN8fB34WFgTUvMKU7lhdLcDEpuriHOHrqpBfnxqcUFicmpeakl8V4BRgaGBkZmFiYWxo7GRCkCAEwpJIA</recordid><startdate>20101125</startdate><enddate>20101125</enddate><creator>MCHALE JOHN</creator><creator>SMITH BRIAN</creator><creator>KOLBLY DONOVAN</creator><creator>WILLEBEEK-LEMAIR MARC</creator><creator>COX DENNIS</creator><creator>CANTRELL CRAIG</creator><scope>EVB</scope></search><sort><creationdate>20101125</creationdate><title>ACTIVE NETWORK DEFENSE SYSTEM AND METHOD</title><author>MCHALE JOHN ; SMITH BRIAN ; KOLBLY DONOVAN ; WILLEBEEK-LEMAIR MARC ; COX DENNIS ; CANTRELL CRAIG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_JP2010268483A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2010</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>MCHALE JOHN</creatorcontrib><creatorcontrib>SMITH BRIAN</creatorcontrib><creatorcontrib>KOLBLY DONOVAN</creatorcontrib><creatorcontrib>WILLEBEEK-LEMAIR MARC</creatorcontrib><creatorcontrib>COX DENNIS</creatorcontrib><creatorcontrib>CANTRELL CRAIG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>MCHALE JOHN</au><au>SMITH BRIAN</au><au>KOLBLY DONOVAN</au><au>WILLEBEEK-LEMAIR MARC</au><au>COX DENNIS</au><au>CANTRELL CRAIG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ACTIVE NETWORK DEFENSE SYSTEM AND METHOD</title><date>2010-11-25</date><risdate>2010</risdate><abstract>PROBLEM TO BE SOLVED: To provide an active network defense system which monitors and blocks traffic automatically. SOLUTION: The system is set up in an in-line state with respect to a packet traffic data flow as a part of a network infrastructure. In the configuration, all passing packets are inspected and processed. An algorithmic filter operation applies statistical threshold filtering to the data flow in order to identify a threat existing across many sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify a threat existing within each session. Threatening packet traffic is blocked and threatening session is terminated. Suspicious traffic is extracted from the data flow and receives more comprehensive content matching examination and asset risk analyzing examination further. COPYRIGHT: (C)2011,JPO&INPIT</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_JP2010268483A |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | ACTIVE NETWORK DEFENSE SYSTEM AND METHOD |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T19%3A29%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=MCHALE%20JOHN&rft.date=2010-11-25&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EJP2010268483A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |