System and method for network edge data protection
First Claim
1. A system for providing protection against malicious code, said system comprising:
- a malicious code analyzer disposed in a communication system traffic pattern between an originator of an information communication of said communication system traffic pattern and an intended recipient of said information communication to intercept said information communication and to analyze said information communication for malicious code, said malicious code analyzer being configured to be transparent to systems of said communication system.
6 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods which examine information communication streams to identify and/or eliminate malicious code, while allowing the good code to pass unaffected. Embodiments operate to provide spam filtering, e.g., filtering of unsolicited and/or unwanted communications. Embodiments provide network based or inline devices that scan and scrub information communication in its traffic pattern. Embodiments are adapted to accommodate various information communication protocols, such as simple mail transfer protocol (SMTP), post office protocol (POP), hypertext transfer protocol (HTTP), Internet message access protocol (IMAP), file transfer protocol (FTP), domain name service (DNS), and/or the like, and/or routing protocols, such as hot standby router protocol (HSRP), border gateway protocol (BGP), open shortest path first (OSPF), enhanced interior gateway routing protocol (EIGRP), and/or the like.
455 Citations
43 Claims
-
1. A system for providing protection against malicious code, said system comprising:
a malicious code analyzer disposed in a communication system traffic pattern between an originator of an information communication of said communication system traffic pattern and an intended recipient of said information communication to intercept said information communication and to analyze said information communication for malicious code, said malicious code analyzer being configured to be transparent to systems of said communication system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
13. A computer program product having a computer readable medium having computer program logic recorded thereon for providing protection against malicious code, said computer program product comprising:
-
code for analyzing malicious code present in information communication traffic between an originator of an information communication of said communication traffic and an intended recipient of said information communication; and
code for a steering said information communication between interfaces associated with said information communication originator and said intended recipient and providing a translate function which detours at least a portion of said information communication to said code for analyzing malicious code and which renders said code for analyzing malicious code invisible to said information communication originator and said intended recipient. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A method for providing protection against malicious code, said method comprising:
-
intercepting packets in an information communication traffic pattern;
steering said packets between interfaces associated with an information communication originator and said intended recipient, said steering providing detouring of at least a portion of said packets to a malicious code analyzer; and
analyzing said at least a portion of said packets by said malicious code analyzer before releasing said at least a portion of said packets back into said traffic pattern. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A system for providing protection against malicious code, said system comprising:
-
a steering module for directing packets between a first interface and a second interface of said system, wherein said steering module provides a translate function that monitors each packet provided to said first interface and said second interface for packets to be provided malicious code analysis and directs at least some of said packets to a malicious code analyzer; and
said malicious code analyzer coupled to said steering module for receiving packets which are not addressed for receipt by said malicious code analyzer but which are directed to said malicious code analyzer by said steering module and for providing packets analyzed by said malicious code analyzer to said steering module, wherein said malicious code analyzer provides a malicious code remediation function. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
Specification