Network security system and method
First Claim
1. A network security system, comprising:
- a packet-dedicated processor for primarily performing hardware filtering on static attacks of network traffic; and
a host system provided with a software filter for secondarily performing software filtering on dynamic attacks of network traffic.
2 Assignments
0 Petitions
Accused Products
Abstract
Disclosed herein is a network security system and method. The network security system includes a packet-dedicated processor for primarily performing hardware filtering on static attacks of network traffic, and a host system provided with a software filter for secondarily performing software filtering on dynamic attacks of network traffic. In the network security method, hardware filtering is performed on static network traffic attacks, software filtering is performed on dynamic network traffic attacks based on an analysis the results of the hardware filtering and packet streams generated by incoming packets for a predetermined time, and intrusion prevention information is provided to an administrator based on the accumulation and an analysis of the results of the software filtering.
-
Citations
27 Claims
-
1. A network security system, comprising:
-
a packet-dedicated processor for primarily performing hardware filtering on static attacks of network traffic; and
a host system provided with a software filter for secondarily performing software filtering on dynamic attacks of network traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A network security system, comprising:
-
a blocking system connected to a gateway of a network in transparent mode to prevent traffic attacks on the network;
a remote management system for creating security rules to be applied to the blocking system and transmitting the security rules to the blocking system on-line; and
a network traffic analysis system for receiving network traffic information from the blocking system, accumulating and analyzing the network traffic information, and proving intrusion prevention information to an administrator.
-
-
23. A network security method, comprising the steps of;
-
performing hardware filtering on static network traffic attacks;
performing software filtering on dynamic network traffic attacks based on an analysis of results of the hardware filtering and packet streams generated by incoming packets for a predetermined time; and
providing intrusion prevention information to an administrator based on accumulation and an analysis of results of the software filtering. - View Dependent Claims (24, 25, 26, 27)
-
Specification