Method and system for protecting publicly accessible network computer services from undesirable network traffic in real-time
First Claim
1. A method for protecting publicly accessible network computer services from undesirable network traffic in real-time, the method comprising:
- receiving network traffic destined for the services;
analyzing the network traffic to identify an undesirable user of the services; and
limiting access of the undesirable user to the services to protect the services.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system are provided for protecting publicly accessible network computer services from undesirable network traffic in real-time. The method includes receiving network traffic destined for the services and analyzing the network traffic to identify an undesirable user of the services. Access of the undesirable user to the services is limited to protect the services. The method and system identify and remove a new level of security threat that is not addressable by current techniques. Specifically, the method and system identify topologically anomalous application-level patterns of traffic and remove these data flows in real-time from the network.
189 Citations
16 Claims
-
1. A method for protecting publicly accessible network computer services from undesirable network traffic in real-time, the method comprising:
-
receiving network traffic destined for the services;
analyzing the network traffic to identify an undesirable user of the services; and
limiting access of the undesirable user to the services to protect the services. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for protecting publicly accessible network computer services from undesirable network traffic in real-time, the system comprising:
-
an interface for receiving network traffic destined for the services;
a analysis engine for analyzing the network traffic to identify an undesirable user of the services; and
a forwarding engine in communication with the analysis engine for limiting access of the undesirable user to the services to protect the services. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
Specification