ACTIVE NETWORK DEFENSE SYSTEM AND METHOD

PROBLEM TO BE SOLVED: To provide an active network defense system which monitors and blocks traffic automatically. SOLUTION: The system is set up in an in-line state with respect to a packet traffic data flow as a part of a network infrastructure. In the configuration, all passing packets are inspec...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: MCHALE JOHN, SMITH BRIAN, KOLBLY DONOVAN, WILLEBEEK-LEMAIR MARC, COX DENNIS, CANTRELL CRAIG
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator MCHALE JOHN
SMITH BRIAN
KOLBLY DONOVAN
WILLEBEEK-LEMAIR MARC
COX DENNIS
CANTRELL CRAIG
description PROBLEM TO BE SOLVED: To provide an active network defense system which monitors and blocks traffic automatically. SOLUTION: The system is set up in an in-line state with respect to a packet traffic data flow as a part of a network infrastructure. In the configuration, all passing packets are inspected and processed. An algorithmic filter operation applies statistical threshold filtering to the data flow in order to identify a threat existing across many sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify a threat existing within each session. Threatening packet traffic is blocked and threatening session is terminated. Suspicious traffic is extracted from the data flow and receives more comprehensive content matching examination and asset risk analyzing examination further. COPYRIGHT: (C)2011,JPO&INPIT
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_JP2010268483A</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>JP2010268483A</sourcerecordid><originalsourceid>FETCH-epo_espacenet_JP2010268483A3</originalsourceid><addsrcrecordid>eNrjZNBwdA7xDHNV8HMNCfcP8lZwcXVz9Qt2VQiODA5x9VVw9HNR8HUN8fB34WFgTUvMKU7lhdLcDEpuriHOHrqpBfnxqcUFicmpeakl8V4BRgaGBkZmFiYWxo7GRCkCAEwpJIA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ACTIVE NETWORK DEFENSE SYSTEM AND METHOD</title><source>esp@cenet</source><creator>MCHALE JOHN ; SMITH BRIAN ; KOLBLY DONOVAN ; WILLEBEEK-LEMAIR MARC ; COX DENNIS ; CANTRELL CRAIG</creator><creatorcontrib>MCHALE JOHN ; SMITH BRIAN ; KOLBLY DONOVAN ; WILLEBEEK-LEMAIR MARC ; COX DENNIS ; CANTRELL CRAIG</creatorcontrib><description>PROBLEM TO BE SOLVED: To provide an active network defense system which monitors and blocks traffic automatically. SOLUTION: The system is set up in an in-line state with respect to a packet traffic data flow as a part of a network infrastructure. In the configuration, all passing packets are inspected and processed. An algorithmic filter operation applies statistical threshold filtering to the data flow in order to identify a threat existing across many sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify a threat existing within each session. Threatening packet traffic is blocked and threatening session is terminated. Suspicious traffic is extracted from the data flow and receives more comprehensive content matching examination and asset risk analyzing examination further. COPYRIGHT: (C)2011,JPO&amp;INPIT</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2010</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20101125&amp;DB=EPODOC&amp;CC=JP&amp;NR=2010268483A$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76290</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20101125&amp;DB=EPODOC&amp;CC=JP&amp;NR=2010268483A$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>MCHALE JOHN</creatorcontrib><creatorcontrib>SMITH BRIAN</creatorcontrib><creatorcontrib>KOLBLY DONOVAN</creatorcontrib><creatorcontrib>WILLEBEEK-LEMAIR MARC</creatorcontrib><creatorcontrib>COX DENNIS</creatorcontrib><creatorcontrib>CANTRELL CRAIG</creatorcontrib><title>ACTIVE NETWORK DEFENSE SYSTEM AND METHOD</title><description>PROBLEM TO BE SOLVED: To provide an active network defense system which monitors and blocks traffic automatically. SOLUTION: The system is set up in an in-line state with respect to a packet traffic data flow as a part of a network infrastructure. In the configuration, all passing packets are inspected and processed. An algorithmic filter operation applies statistical threshold filtering to the data flow in order to identify a threat existing across many sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify a threat existing within each session. Threatening packet traffic is blocked and threatening session is terminated. Suspicious traffic is extracted from the data flow and receives more comprehensive content matching examination and asset risk analyzing examination further. COPYRIGHT: (C)2011,JPO&amp;INPIT</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2010</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZNBwdA7xDHNV8HMNCfcP8lZwcXVz9Qt2VQiODA5x9VVw9HNR8HUN8fB34WFgTUvMKU7lhdLcDEpuriHOHrqpBfnxqcUFicmpeakl8V4BRgaGBkZmFiYWxo7GRCkCAEwpJIA</recordid><startdate>20101125</startdate><enddate>20101125</enddate><creator>MCHALE JOHN</creator><creator>SMITH BRIAN</creator><creator>KOLBLY DONOVAN</creator><creator>WILLEBEEK-LEMAIR MARC</creator><creator>COX DENNIS</creator><creator>CANTRELL CRAIG</creator><scope>EVB</scope></search><sort><creationdate>20101125</creationdate><title>ACTIVE NETWORK DEFENSE SYSTEM AND METHOD</title><author>MCHALE JOHN ; SMITH BRIAN ; KOLBLY DONOVAN ; WILLEBEEK-LEMAIR MARC ; COX DENNIS ; CANTRELL CRAIG</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_JP2010268483A3</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2010</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>MCHALE JOHN</creatorcontrib><creatorcontrib>SMITH BRIAN</creatorcontrib><creatorcontrib>KOLBLY DONOVAN</creatorcontrib><creatorcontrib>WILLEBEEK-LEMAIR MARC</creatorcontrib><creatorcontrib>COX DENNIS</creatorcontrib><creatorcontrib>CANTRELL CRAIG</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>MCHALE JOHN</au><au>SMITH BRIAN</au><au>KOLBLY DONOVAN</au><au>WILLEBEEK-LEMAIR MARC</au><au>COX DENNIS</au><au>CANTRELL CRAIG</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ACTIVE NETWORK DEFENSE SYSTEM AND METHOD</title><date>2010-11-25</date><risdate>2010</risdate><abstract>PROBLEM TO BE SOLVED: To provide an active network defense system which monitors and blocks traffic automatically. SOLUTION: The system is set up in an in-line state with respect to a packet traffic data flow as a part of a network infrastructure. In the configuration, all passing packets are inspected and processed. An algorithmic filter operation applies statistical threshold filtering to the data flow in order to identify a threat existing across many sessions. A trigger filtering operation applies header and content match filtering to the data flow in order to identify a threat existing within each session. Threatening packet traffic is blocked and threatening session is terminated. Suspicious traffic is extracted from the data flow and receives more comprehensive content matching examination and asset risk analyzing examination further. COPYRIGHT: (C)2011,JPO&amp;INPIT</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_JP2010268483A
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title ACTIVE NETWORK DEFENSE SYSTEM AND METHOD
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-30T19%3A29%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=MCHALE%20JOHN&rft.date=2010-11-25&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EJP2010268483A%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true