Systems and methods for enhanced network security
First Claim
1. A network security system, comprising:
- a security infrastructure operable to communicate with a computer network and further operable to facilitate communication of security data from a first node to a second node, wherein said first node and said second node comprise;
an adaptation layer; and
a security agent.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for an information system security infrastructure are described. One embodiment of the present invention comprises global Internet-scale defense infrastructure, referred to as the Intrusion Detection Force (IDF). The IDF comprises a virtual infrastructure implemented on top of an existing network, such as the Internet. The IDF enables secure information sharing and intelligent data analysis and response. The node (e.g. 102 of FIG. 1) is the most primitive entity in the IDF architecture, and may be a switch, router, server, or workstation. The IDF may be implemented in small networks of computers or may be utilized by millions of hosts throughout the Internet, spanning different organizations, countries, and continents.
-
Citations
19 Claims
-
1. A network security system, comprising:
a security infrastructure operable to communicate with a computer network and further operable to facilitate communication of security data from a first node to a second node, wherein said first node and said second node comprise;
an adaptation layer; and
a security agent. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
15. A method for providing network security comprising:
-
receiving a plurality of data values from a plurality of nodes;
analyzing said plurality of data values to determine if a network intrusion has occurred. - View Dependent Claims (16, 17, 18, 19)
-
Specification