Systems and methods for distributed network protection
First Claim
1. A distributed network monitoring system comprising:
- one or more hierarchical monitoring systems; and
one or more alarm signals that represent an unauthorized access attempt into one or more portions of the distributed network, wherein the one or more hierarchical monitoring systems at least one of analyze the unauthorized access attempt, determine a responsive action to the unauthorized access attempt, or forward information regarding the unauthorized access attempt to one or more of the one or more hierarchical monitoring systems.
1 Assignment
0 Petitions
Accused Products
Abstract
By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined geographical area serving, for example, a wide variety of commercial and public sites, an organizational structure, or the like, for alarms. Upon analyzing an alarm for various characteristics, the Level 1 monitoring center can refer the unauthorized access attempt to an appropriate Level 2 center for, for example, possible retaliatory and/or legal action. Then, a Level 3 monitoring center can record and maintain an overall picture of the security of one or more networks, the plurality of monitoring centers and information about one or more hacking attempts.
-
Citations
15 Claims
-
1. A distributed network monitoring system comprising:
- one or more hierarchical monitoring systems; and
one or more alarm signals that represent an unauthorized access attempt into one or more portions of the distributed network, wherein the one or more hierarchical monitoring systems at least one of analyze the unauthorized access attempt, determine a responsive action to the unauthorized access attempt, or forward information regarding the unauthorized access attempt to one or more of the one or more hierarchical monitoring systems. - View Dependent Claims (2, 3, 4, 5, 6, 7)
- one or more hierarchical monitoring systems; and
-
8. A method of protecting a distributed network comprising:
- monitoring one or more portions of the distributed network through one or more hierarchical monitoring systems; and
receiving one or more alarm signals that represent an unauthorized access attempt into one or more portions of the distributed network, wherein the one or more hierarchical monitoring systems at least one of analyze the unauthorized access attempt, determine a responsive action to the unauthorized access attempt, or forward information regarding the unauthorized access attempt to one or more of the one or more hierarchical monitoring systems. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
- monitoring one or more portions of the distributed network through one or more hierarchical monitoring systems; and
Specification