Network threat detection and mitigation
First Claim
Patent Images
1. A method, comprising:
- automatically detecting undesired network traffic at a switch belonging to a network;
mirroring the undesired traffic to a security management device;
determining a source of the undesired traffic;
redirecting traffic from the source; and
automatically sending a policy to a switch to block traffic from the source;
8 Assignments
0 Petitions
Accused Products
Abstract
A network switch automatically detects undesired network traffic and mirrors the undesired traffic to a security management device. The security management device determines the source of the undesired traffic and redirects traffic from the source to itself. The security management device also automatically sends a policy to a switch to block traffic from the source.
-
Citations
24 Claims
-
1. A method, comprising:
-
automatically detecting undesired network traffic at a switch belonging to a network;
mirroring the undesired traffic to a security management device;
determining a source of the undesired traffic;
redirecting traffic from the source; and
automatically sending a policy to a switch to block traffic from the source;
- View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system, comprising:
-
a switch to automatically detect undesired traffic on a network;
a security management device coupled with the switch to;
receive undesired traffic mirrored from the switch;
determine a source of the harmful traffic;
redirect traffic sent from the source; and
automatically send a policy to a switch to block traffic from the source; and
a network management server coupled to the security management device;
- View Dependent Claims (13, 14, 15)
-
-
16. An apparatus, comprising:
-
means for automatically detecting undesired network traffic at a switch belonging to a network;
means for mirroring the harmful traffic to a security management device;
means for determining a source of the harmful traffic;
means for redirecting traffic from the source; and
means for automatically sending a policy to a switch to block traffic from the source;
- View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24)
-
Specification