Malware scanning using a network bridge
11 Assignments
0 Petitions
Accused Products
Abstract
A network bridge (14) has an associated malware scanner (16) that serves to concatenate portions of a data file from within data packets intercepted by the network bridge (14) and then scan the data file concerned before the data file is forwarded to its intended recipient by the network bridge (14). The network bridge (14) may be inserted in a network topology without requiring significant network configuration changes. The network bridge (14) may include a packet analysis unit (56) that serves to intercept only data packets having a predetermined network layer protocol or a predetermined application layer protocol.
64 Citations
27 Claims
- 1. A network bridge having a malware scanner.
- 11. A network bridge operable to intercept one or more data packets, to forward at least a portion of said data packets to a malware scanner for scanning, and to forward data from said data packets after scanning to its intended recipient.
- 17. A malware scanner operable to receive at least a portion of one or more data packets intercepted by a network bridge, to concatenate said data packets into a data file to be scanned and to forward said data file after scanning to its intended recipients via said network bridge.
-
20. A method of malware scanning comprising the steps of:
-
receiving data packets at a network bridge;
sending at least a portion of said data packets from said network bridge to a malware scanner;
concatenating data received by said malware scanner to form a data file to be scanned;
scanning said data file with said malware scanner; and
forwarding said data file after scanning via said network bridge to its intended recipient. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
Specification