Methods and systems for network traffic security
First Claim
1. A method comprising:
- a. monitoring at least one of a network resource for a network and a performance of an application in a network;
b. categorizing network traffic into at least good, bad and suspect categories of traffic based upon the monitoring; and
c. treating at least two of the categories of traffic different from a third one of the categories of traffic.
24 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to methods of and systems for adaptive networking that monitors a network resource of a network. The method monitors an application performance. The method categorizes a first subset of traffic of the network. The categories for the first subset include trusted, known to be bad, and suspect. The method determines an action for a second subset of traffic based on the category for the first subset of traffic. Some embodiments provide a system for adaptive networking that includes a first device and traffic that has a first subset and a second subset. The system also includes a first resource and a second resource for the transmission of the traffic. The first device receives the traffic and categorizes the traffic into the first and second subsets. The first device assigns the first subset to the first resource. Some embodiments provide a network device that includes an input for receiving incoming traffic, an output for sending outgoing traffic, a categorization module that categorizes incoming traffic, and a resource assignment module that assigns the categorized traffic for a particular resource. A traffic category for the device includes suspect traffic.
-
Citations
45 Claims
-
1. A method comprising:
-
a. monitoring at least one of a network resource for a network and a performance of an application in a network;
b. categorizing network traffic into at least good, bad and suspect categories of traffic based upon the monitoring; and
c. treating at least two of the categories of traffic different from a third one of the categories of traffic. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
30. A method comprising:
-
a. discovering automatically a user by using traffic in a network;
b. monitoring a performance of an application relevant to the user;
c. assessing performance of the application; and
d. controlling the traffic. - View Dependent Claims (31, 32, 33)
-
-
34. A method of routing data comprising:
-
a. receiving a data stream from a node, the data stream comprising a plurality of data packets;
b. classifying the plurality of data packets, wherein the classifications include;
i. trusted traffic, wherein trusted traffic includes data from a trusted source;
ii. bad traffic, wherein bad traffic includes data that is known to contain undesirable data; and
iii. suspect traffic, wherein suspect traffic includes data that is unknown or that is not from a trusted source. - View Dependent Claims (35, 36, 37)
-
-
38. A network device comprising:
-
a. an input for receiving incoming traffic;
b. an output for sending outgoing traffic;
c. a categorization module that categorizes incoming traffic, wherein a category for the incoming traffic comprises suspect; and
d. a resource assignment module that assigns the categorized traffic for a particular resource. - View Dependent Claims (39, 40)
-
-
41. A system for adaptive networking comprising:
-
traffic comprising a plurality of subsets, wherein a first subset includes suspect traffic;
a resource for the traffic, wherein the resource is allocated for suspect traffic; and
a first device for receiving the traffic, wherein the first device is configured to categorize the received traffic into the first subset. - View Dependent Claims (42, 43, 44, 45)
-
Specification