×

SYSTEMS AND METHOD FOR DISTRIBUTED NETWORK PROTECTION

  • US 20080256624A1
  • Filed: 06/23/2008
  • Published: 10/16/2008
  • Est. Priority Date: 08/18/2000
  • Status: Abandoned Application
First Claim
Patent Images

1. A network protection system, the system comprising:

  • an external intrusion detection system that detects an external possible unauthorized access attempt into a communications network being protected, and including,an external intrusion detection module, anda external communications management module coupled to the external intrusion detection module;

    an internal intrusion detection system that detects an internal possible unauthorized access attempt within the communications network being protected, and including,an internal intrusion detection module, andan internal communications management module coupled to the internal intrusion detection module; and

    an analysis system coupled to the external intrusion detection system and the internal intrusion detection system, and including,a database for storing at least one of profile of information related to one or more hackers, unauthorized access attempt origin information, information that can aid the intrusion analysis system in determining accuracy of a detected unauthorized access attempt,an intrusion analysis module coupled to the database, andan intrusion reaction coordination module coupled to the intrusion analysis module and the database,wherein the external and internal communications management modules are coupled to the intrusion analysis module and forward to the intrusion analysis module respective information regarding the respective detected possible unauthorized access attempt,the intrusion analysis module determines based on the respective information regarding the respective detected possible unauthorized access attempt whether or not the respective detected possible unauthorized access attempt is authorized and communicates with the internal and external intrusion detection modules via the external and internal communications management modules whether or not the respective detected possible unauthorized access attempt is authorized, andthe intrusion reaction coordination module determines an appropriate action to take if the intrusion analysis module determines that the respective detected possible unauthorized access attempt is unauthorized.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×