Methods and systems for network traffic security
18 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to methods of and systems for adaptive networking that monitors a network resource of a network. The method monitors an application performance. The method categorizes a first subset of traffic of the network. The categories for the first subset include trusted, known to be bad, and suspect. The method determines an action for a second subset of traffic based on the category for the first subset of traffic. Some embodiments provide a system for adaptive networking that includes a first device and traffic that has a first subset and a second subset. The system also includes a first resource and a second resource for the transmission of the traffic. The first device receives the traffic and categorizes the traffic into the first and second subsets. The first device assigns the first subset to the first resource. Some embodiments provide a network device that includes an input for receiving incoming traffic, an output for sending outgoing traffic, a categorization module that categorizes incoming traffic, and a resource assignment module that assigns the categorized traffic for a particular resource. A traffic category for the device includes suspect traffic.
-
Citations
38 Claims
-
1-29. -29. (canceled)
-
30. A method comprising:
-
a. discovering automatically a user by using traffic in a network; b. monitoring a performance of an application relevant to the user; c. assessing performance of the application; and d. controlling the traffic. - View Dependent Claims (31, 32, 33)
-
-
34. A method of routing data comprising:
-
a. receiving a data stream from a node, the data stream comprising a plurality of data packets; b. classifying the plurality of data packets, wherein the classifications include; i. trusted traffic, wherein trusted traffic includes data from a trusted source; ii. bad traffic, wherein bad traffic includes data that is known to contain undesirable data; and iii. suspect traffic, wherein suspect traffic includes data that is unknown or that is not from a trusted source. - View Dependent Claims (35, 36, 37)
-
-
38-45. -45. (canceled)
Specification