System, method and program product for visually presenting data describing network intrusions
First Claim
1. A method for graphically representing network intrusions, said method comprising the steps of:
- displaying source icons in rows in a first column, said source icons representing source IP addresses from which intrusions were sent;
displaying destination icons in rows in a second column, said destination icons representing destination IP addresses to which said intrusions were sent, wherein the destination icons that receive intrusions from a same source icon are clustered together in said graphical representation across from said same source icon; and
displaying an arrow from each of the source icons pointing to each of the destination icons to which said each source icon sent an intrusion, such that there are “
N”
arrows from each source icon to “
N”
destination icons to which said each source icon sent at least one intrusion.
1 Assignment
0 Petitions
Accused Products
Abstract
Computer system, method and program for graphically representing network intrusions. Source icons are displayed in rows in a first column. The source icons represent source IP addresses from which intrusions were sent. Destination icons are displayed in rows in a second column. The destination icons represent destination IP addresses to which the intrusions were sent. The destination icons that receive intrusions from a same source icon are clustered together in the graphical representation across from the same source icon. An arrow is displayed from each of the source icons pointing to each of the destination icons to which each source icon sent an intrusion, such that there are “N” arrows from each source icon to “N” destination icons to which each source icon sent at least one intrusion.
43 Citations
20 Claims
-
1. A method for graphically representing network intrusions, said method comprising the steps of:
-
displaying source icons in rows in a first column, said source icons representing source IP addresses from which intrusions were sent; displaying destination icons in rows in a second column, said destination icons representing destination IP addresses to which said intrusions were sent, wherein the destination icons that receive intrusions from a same source icon are clustered together in said graphical representation across from said same source icon; and displaying an arrow from each of the source icons pointing to each of the destination icons to which said each source icon sent an intrusion, such that there are “
N”
arrows from each source icon to “
N”
destination icons to which said each source icon sent at least one intrusion. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for graphically representing network intrusions, said method comprising the steps of:
-
displaying source icons in columns in a first row, said source icons representing source IP addresses from which intrusions were sent; displaying destination icons in columns in a second row, said destination icons representing destination IP addresses to which said intrusions were sent, wherein the destination icons that receive intrusions from a same source icon are clustered together in said graphical representation above or below said same source icon; and displaying an arrow from each of the source icons pointing to each of the destination icons to which said each source icon sent an intrusion, such that there are “
N”
arrows from each source icon to “
N”
destination icons to which said each source icon sent at least one intrusion. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer program product for graphically representing network intrusions, said computer program product comprising:
-
a computer readable media; first program instructions to direct display source icons in rows in a first column, said source icons representing source IP addresses from which intrusions were sent; second program instructions to direct display of destination icons in rows in a second column, said destination icons representing destination IP addresses to which said intrusions were sent, wherein the destination icons that receive intrusions from a same source icon are clustered together in said graphical representation across from said same source icon; and third program instructions to direct display of an arrow from each of the source icons pointing to each of the destination icons to which said each source icon sent an intrusion, such that there are “
N”
arrows from each source icon to “
N”
destination icons to which said each source icon sent at least one intrusion; and
whereinsaid first, second and third program instructions are stored on said media in functional form. - View Dependent Claims (20)
-
Specification