×

Integrated network intrusion detection

  • US 10,044,738 B2
  • Filed: 09/22/2015
  • Issued: 08/07/2018
  • Est. Priority Date: 02/01/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a compute device, a request for access to network services from an invoked application;

    applying, by the compute device, a set of executable instructions of the invoked application to a hash function to generate a hash value;

    identifying, by the compute device, the invoked application based on the hash value;

    obtaining, by the compute device, a network policy specific to the identified application;

    performing, by the compute device, a statistical analysis of previous communications from the identified application;

    setting, by the compute device and as a function of the statistical analysis, a configurable threshold indicative of a severity of a violation of the network policy specific to the identified application;

    determining, by the compute device, whether the request is a violation of the network policy;

    determining, in response to a determination that the request is a violation of the network policy, the severity of the violation based on the associated configurable threshold in the network policy specific to the identified application; and

    performing, by the compute device, one or more actions as a function of the determined severity including loading, from a central security server, application-specific intrusion signatures and searching packets associated with the application for the application-specific intrusion signatures.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×