Method and system for detecting and stopping illegitimate communication attempts on the internet
First Claim
1. A method of identifying and stopping illegitimate communication attempts on the internet, comprising the steps of:
- collecting statistics of a sending IP address from a plurality of subscribers and storing said statistics in a central database;
calculating a risk assessment factor from said statistics of the risk that the sending IP address is controlled by an abusive message sender; and
distributing said risk assessment factor to the plurality of subscribers so that each of said plurality of subscribers may determine whether to accept a connection request from said sending IP address according to a locally set policy at each of said plurality of subscribers.
1 Assignment
0 Petitions
Accused Products
Abstract
The method and system of identifying and stopping illegitimate communication attempts on the internet includes collecting statistics of a sending IP address from a plurality of subscribers and storing said statistics in a central database. A risk assessment factor is calculated from the statistics to determine the risk that the sending IP address is controlled by an abusive message sender. Afterwards, the risk assessment factor is distributed to the plurality of subscribers so that each of the subscribers may determine whether to accept a connection request from a particular sending IP address according to its own locally set policy.
48 Citations
24 Claims
-
1. A method of identifying and stopping illegitimate communication attempts on the internet, comprising the steps of:
-
collecting statistics of a sending IP address from a plurality of subscribers and storing said statistics in a central database;
calculating a risk assessment factor from said statistics of the risk that the sending IP address is controlled by an abusive message sender; and
distributing said risk assessment factor to the plurality of subscribers so that each of said plurality of subscribers may determine whether to accept a connection request from said sending IP address according to a locally set policy at each of said plurality of subscribers. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of identifying and stopping illegitimate communication attempts on the internet, comprising the steps of:
-
receiving a connection request from a sending source having an IP address;
compiling statistics of the sending characteristics of the IP address of the sending source;
storing said statistics in a local database;
posting said statistics to a central database having a plurality of statisitics compiled from a plurality of subscribers about the IP address of the sending source;
calculating a risk assessment factor from said plurality of statistics;
updating the local database with the risk assessment factor; and
determining whether to allow the connection request by comparing the risk assessment factor of the IP address of the sending source against a locally set policy on acceptable risk. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A system for detecting and throttling rogue senders on the internet having a plurality of subscriber components, comprising:
-
a tracking component having a database for storing statistics of connection requests for a plurality of sending IP addresses, a forecasting component for analyzing said statistics of the plurality of sending IP addresses and calculating risk assessment factor for each of the plurality of sending IP addresses;
one or more delivery components for storing statistics of the plurality of sending IP addresses from the plurality of subscriber components and transmitting the risk assessment factor to the plurality of subscriber components. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification