Correlation engine for detecting network attacks and detection method
First Claim
Patent Images
1. A method for detecting network attacks, comprising:
- (a) receiving a plurality of attack indications based on data transmitted on the network;
(b) applying rules to the plurality of attack indications; and
(c) generating an alert if an application of at least a subset of the rules on the plurality of attack indications indicates a potential attack.
5 Assignments
0 Petitions
Accused Products
Abstract
A method for detecting network attacks is provided. In one implementation, the method receives a plurality of attack indications based on data transmitted on the network and applies rules to the plurality of attack indications. Also, the method generates an alert if an application of at least a subset of the rules on the plurality of attack indications indicates a potential attack. In addition, a network device that performs the method and a computer program corresponding to the method are provided.
-
Citations
65 Claims
-
1. A method for detecting network attacks, comprising:
-
(a) receiving a plurality of attack indications based on data transmitted on the network; (b) applying rules to the plurality of attack indications; and (c) generating an alert if an application of at least a subset of the rules on the plurality of attack indications indicates a potential attack. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
-
22. A software program, which is contained on a computer-readable medium and which is capable of instructing a computer to perform a routine for detecting network attacks, wherein the routine comprises:
-
(a) receiving a plurality of attack indications based on data transmitted on the network; (b) applying rules to the plurality of attack indications; and (c) generating an alert if an application of at least a subset of the rules on the plurality of attack indications indicates a potential attack. - View Dependent Claims (23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
43. A network device that detects network attacks, comprising:
-
a network sensor that receives data transmitted on the network and that generates a plurality of attack indications based on the data; and a first correlation engine that applies a first set of rules to the plurality of attack indications and that generates a first alert if an application of at least a subset of the first set of rules on the plurality of attack indications indicates a first potential attack. - View Dependent Claims (44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65)
-
Specification