Propagation of malicious code through an information technology network
First Claim
Patent Images
1. A method of restricting transmission of data packets from a host entity in a network, comprising:
- transmitting outgoing packets to destination hosts whose identities are contained in a record stored in a working set of host identity records;
over the course of repeated predetermined time intervals, restricting, to a predetermined number, destination hosts not identified in the working set and to which packets may be transmitted;
deleting packets whose transmission has been restricted.
0 Assignments
0 Petitions
Accused Products
Abstract
A method of restricting transmission of data packets from a host entity in a network, comprising: transmitting outgoing packets to destination hosts whose identities are contained in a record stored in a working set of host identity records; over the course of repeated predetermined time intervals, restricting, to a predetermined number, destination hosts not identified in the working set and to which packets may be transmitted; deleting packets whose transmission has been restricted.
-
Citations
19 Claims
-
1. A method of restricting transmission of data packets from a host entity in a network, comprising:
-
transmitting outgoing packets to destination hosts whose identities are contained in a record stored in a working set of host identity records;
over the course of repeated predetermined time intervals, restricting, to a predetermined number, destination hosts not identified in the working set and to which packets may be transmitted;
deleting packets whose transmission has been restricted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer program product adapted to restrict transmission of packets from a host computing entity in a network, the program being adapted to:
-
permit transmission of outgoing packets to destination hosts whose identities are contained in a record stored in a working set of host identity records;
over the course of repeated predetermined time intervals, restrict, to a predetermined number, destination hosts not identified in the working set and to which packets may be transmitted; and
delete packets whose transmission has been restricted. - View Dependent Claims (11, 12, 13)
-
-
14. A network of interconnected computing entities, each entity in the network being capable of sending packets to at least one other entity via a hierarchy of programs implementing a hierarchy of networking protocols, the hierarchy containing a further program which throttles transmission of malicious code, the further program being adapted to:
-
permit transmission of outgoing packets to destination hosts whose identities are contained in a record stored in a working set of host identity records;
over the course of repeated predetermined time intervals, restrict, to a predetermined number, destination hosts not identified in the working set and to which packets may be transmitted; and
delete packets whose transmission has been restricted. - View Dependent Claims (15, 16)
-
-
17. A computer which is operably connected to one or more other computers, the computer being adapted to restrict transmission of data packets to the other computers in the following manner:
-
permit transmission of outgoing packets to other computers which are identified in a record stored in a working set of computer identity records;
over the course of repeated predetermined time intervals, restrict, to a predetermined number, other computers not identified in the working set and to which packets may be transmitted; and
delete packets whose transmission has been restricted. - View Dependent Claims (18, 19)
-
Specification