Protecting a network from unauthorized access
First Claim
1. A method of dynamically protecting access to a first network, comprising:
- receiving, in a system, a data unit containing a source address indicating a source of a data unit;
matching the source address with information stored in the system; and
enabling entry of the data unit to the first network if the source address matches the information stored in the system and denying entry of the data unit to the first network if the source address does not match the information stored in the system.
13 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus of protecting a first network from unauthorized access includes storing profile information for each call session, and determining if an unauthorized access of the first network is occurring based on the profile information. The profile information includes a predetermined threshold indicating a maximum acceptable rate of incoming data units from an external network to the first network. If the incoming data unit rate exceeds the predetermined threshold, then a security action is taken, such as generating an alarm or preventing further transport of data units from the external network to the first network.
89 Citations
25 Claims
-
1. A method of dynamically protecting access to a first network, comprising:
-
receiving, in a system, a data unit containing a source address indicating a source of a data unit;
matching the source address with information stored in the system; and
enabling entry of the data unit to the first network if the source address matches the information stored in the system and denying entry of the data unit to the first network if the source address does not match the information stored in the system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. An article comprising at least one storage medium containing instructions for protecting a first network, the instructions when executed causing a system to:
-
determine if a rate of incoming data units from an external network to the first network exceeds a predetermined threshold; and
perform a security action if the determined rate of incoming data units exceeds the predetermined threshold. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A system for use in communications between a first network and an external network, comprising:
-
a storage module to store a threshold value for a communications session, the threshold value representing an acceptable rate of incoming data units from the external network to the first network; and
a controller adapted to deny further entry of data units from the external network to the first network in the communications session in response to the controller detecting that the rate of incoming data units exceeds the threshold value. - View Dependent Claims (21, 22, 23, 24, 25)
-
Specification