Security intrusion mitigation system and method
First Claim
Patent Images
1. A security intrusion mitigation method comprising:
- utilizing network spanning tree configuration information to determine an action for mitigating diffusion of intrusive attacks, wherein said spanning tree information includes an indication of an internal diffusion risks; and
performing said action for mitigating diffusion of intrusive attacks automatically, wherein said action for mitigating includes compensation for functional support of prioritized applications.
5 Assignments
0 Petitions
Accused Products
Abstract
A security intrusion mitigation system and method are presented. In one embodiment a security intrusion mitigation method includes utilizing network spanning tree configuration information to determine an action for mitigating diffusion of intrusive attacks. The spanning tree information can include an indication of an internal diffusion risks. An action for mitigating diffusion of intrusive attacks is automatically performed. The action for mitigating diffusion of the intrusive attacks includes compensation for functional support of prioritized applications.
-
Citations
20 Claims
-
1. A security intrusion mitigation method comprising:
-
utilizing network spanning tree configuration information to determine an action for mitigating diffusion of intrusive attacks, wherein said spanning tree information includes an indication of an internal diffusion risks; and
performing said action for mitigating diffusion of intrusive attacks automatically, wherein said action for mitigating includes compensation for functional support of prioritized applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A security intrusion mitigation system comprising:
-
a means for communicating information;
a means for processing said information including instructions for determining a highest risk path and automatically mitigating an attack spread to components included in said highest risk path; and
a means for storing said information, including instructions determining a highest risk path and automatically mitigating an attack spread to components included in said highest risk path. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer usable storage medium having computer readable program code embodied therein for causing a computer system to implement security intrusion mitigation instructions comprising:
-
a component risk determination module for determining a risk of an attack spreading from a first component to a second component included in a network; and
an attack spreading response module for responding to said risk of an attack spreading from a first component to a second component included in said network. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification