Method and apparatus for combating malicious code
First Claim
Patent Images
1. A method for combating malicious code in a network, comprising:
- implementing a resource-limiting technique to slow a propagation of said malicious code through said network; and
implementing a leap-ahead technique in parallel with said resource-limiting technique to defend against said malicious code reaching a full saturation potential in said network.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus are provided for combating malicious code. In one embodiment, a method for combating malicious code in a network includes implementing a resource-limiting technique to slow a propagation of the malicious code and implementing a leap-ahead technique in parallel with the resource-limiting technique to defend against the malicious code reaching a full saturation potential in the network.
298 Citations
25 Claims
-
1. A method for combating malicious code in a network, comprising:
-
implementing a resource-limiting technique to slow a propagation of said malicious code through said network; and
implementing a leap-ahead technique in parallel with said resource-limiting technique to defend against said malicious code reaching a full saturation potential in said network. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A computer readable medium containing an executable program for combating malicious code in a network, the method comprising:
-
implementing a resource-limiting technique to slow a propagation of said malicious code through said network; and
implementing a leap-ahead technique in parallel with said resource-limiting technique to defend against said malicious code reaching a full saturation potential in said network. - View Dependent Claims (14, 18, 19, 20, 21, 22, 23, 24)
-
-
15. The computer readable medium of claim 15, wherein said leap-ahead technique comprises:
-
generating an alert in response to said detection; and
distributing said alert to a pre-selected group of peers. - View Dependent Claims (16, 17)
-
-
25. Apparatus for combating malicious code in a network, the apparatus comprising:
-
means for implementing a resource-limiting technique to slow a propagation of said malicious code through said network; and
means for implementing a leap-ahead technique in parallel with said resource-limiting technique to defend against said malicious code reaching a full saturation potential in said network.
-
Specification