Propagation of viruses through an information technology network
First Claim
1. A method of operating a first host within a network of a plurality of hosts comprising the steps of:
- over the course of a first time interval, monitoring requests received at the first host from a second host to send data to destination hosts;
comparing destination hosts identified in requests monitored during the first time interval with destination host identities in a record; and
at least one of;
storing in a buffer data relating to requests which identify a destination host not in the record;
or limiting passage of data from the second host to destination hosts within the network over the course of the first time interval, so that during the first time interval the second host is unable to send data via the first host to more than a predetermined number of destination hosts not in the record.
8 Assignments
0 Petitions
Accused Products
Abstract
A method of operating a first host within a network of a plurality of hosts. Over the course of a first time interval, requests received at the first host from a second host to send data to destination hosts are monitored. Identities of destination hosts monitored during the first time interval are compared with destination host identities in a record. Then, either data relating to requests which identify a destination host not in the record are stored in a storage buffer. Or the passage of data from the second host to the destination host within the network is limited over the course of the first time interval, so that during the first time interval the second host is unable to send data to more than a predetermined number of hosts not in the record.
83 Citations
35 Claims
-
1. A method of operating a first host within a network of a plurality of hosts comprising the steps of:
-
over the course of a first time interval, monitoring requests received at the first host from a second host to send data to destination hosts;
comparing destination hosts identified in requests monitored during the first time interval with destination host identities in a record; and
at least one of;
storing in a buffer data relating to requests which identify a destination host not in the record;
orlimiting passage of data from the second host to destination hosts within the network over the course of the first time interval, so that during the first time interval the second host is unable to send data via the first host to more than a predetermined number of destination hosts not in the record. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 35)
-
-
14. A method of operating a host within a network which receives requests from an originating host to direct data to a destination host, the method comprising the steps of:
-
monitoring requests to direct data to destination hosts over the course of successive time intervals; and
for each interval of time and for each originating host, creating a dispatch record for requests which have occurred within the scope of a policy, and a buffer record for request which have occurred outside the scope of the policy. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A computing entity which operates to receive data from an originating host and direct the received data to a destination host, the computing entity being adapted to:
-
monitor requests to direct data to destination hosts over the course of successive time intervals; and
for each interval of time and for each originating host, create a dispatch record for requests which have occurred within the scope of a policy, and a buffer record for request which have occurred outside the scope of the policy. - View Dependent Claims (34)
-
Specification