Systems and methods for distributed network protection
First Claim
Patent Images
1. A network protection system comprising:
- a communications management system; and
an analysis system, wherein the analysis system receives information associated with an unauthorized access attempt and at least one of forwards a portion of the received information to at least one destination and forwards instructions to an intrusion detection system.
1 Assignment
0 Petitions
Accused Products
Abstract
Through the use of an intermediate party, a first party is given the ability to communicate with a second party, with the communication appearing as if it originated with the intermediate party. Specifically, in a protected network system, the protected network is capable of acting as a conduit through which an entity, such as law enforcement, can communicate with an entity attempting an unauthorized access attempt unbeknownst to the entity attempting the unauthorized access attempt. This allows, for example, the detection and identification of the entity attempting the unauthorized access attempt.
82 Citations
30 Claims
-
1. A network protection system comprising:
-
a communications management system; and
an analysis system, wherein the analysis system receives information associated with an unauthorized access attempt and at least one of forwards a portion of the received information to at least one destination and forwards instructions to an intrusion detection system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A method of protecting a network comprising:
-
managing one or more network communications; and
receiving information associated with an unauthorized access attempt and at least one of forwarding a portion of the received information to at least one destination and forwarding instructions to an intrusion detection system. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
-
21. An information storage media comprising information that protects a network comprising:
-
information that manages one or more network communications; and
information that receives information associated with an unauthorized access attempt and at least one of forwarding a portion of the received information to at least one destination and forwarding instructions to an intrusion detection system.
-
Specification