Real time active network compartmentalization
First Claim
1. A method of operating a digital communication network having a plurality of nodes which have a locally hierarchical relationship, comprising the steps of:
- detecting a condition at a first node and communicating the condition to a trusted second node locally higher in said hierarchical relationship;
collecting information regarding said condition through nodes at the same or higher hierarchical level as said trusted second node; and
controlling a response at said first node in response to said information.
1 Assignment
0 Petitions
Accused Products
Abstract
Security policy manager devices are leveraged by manager objects to use highly secure user transparent communications to provide detection of questionable activities at every node, automatic collection of information related to any potential attack, isolation of the offending object with arbitrary flexibility of response (e.g. flexibly determining the level of certainty of an attack for initiation of a response in accordance with the number of nodes to be partitioned that is determined by the collected data concerning the potential attack), changing trust relationships between security domains, limiting the attack and launching offensive information warfare capabilities (e.g. outbound from the compromised node while limiting or eliminating inbound communications) in log time and simultaneously and/or concurrently in different but possibly overlapping sections or segments of a digital network of arbitrary configuration.
141 Citations
10 Claims
-
1. A method of operating a digital communication network having a plurality of nodes which have a locally hierarchical relationship, comprising the steps of:
-
detecting a condition at a first node and communicating the condition to a trusted second node locally higher in said hierarchical relationship;
collecting information regarding said condition through nodes at the same or higher hierarchical level as said trusted second node; and
controlling a response at said first node in response to said information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification