Unauthorized communication detection method
First Claim
1. A method for controlling an apparatus for transferring data from a plurality of first devices to a second device via a network, said data being transferred by using a packet, the method comprising the steps of:
- extracting type information identifying type of software conveyed by a packet and destination information identifying destination of the packet transmitted from one of said first devices, the software being used by said one of said first devices;
counting the number of kinds of said type information extracted from packets associated with the same destination information, respectively; and
determining an unauthorized communication when the number of kinds of said type information is less than a predetermined value.
1 Assignment
0 Petitions
Accused Products
Abstract
According to an aspect of an embodiment, a method for controlling an apparatus for transferring data from a plurality of first devices to a second device via a network, the data being transferred by using a packet, comprises the steps of: extracting type information identifying type of software conveyed by a packet and destination information identifying destination of the packet transmitted from one of the first devices; counting the number of kinds of the type information extracted from packets associated with the same destination information, respectively; and determining an unauthorized communication when the number of kinds of the type information is less than a predetermined value.
17 Citations
9 Claims
-
1. A method for controlling an apparatus for transferring data from a plurality of first devices to a second device via a network, said data being transferred by using a packet, the method comprising the steps of:
-
extracting type information identifying type of software conveyed by a packet and destination information identifying destination of the packet transmitted from one of said first devices, the software being used by said one of said first devices; counting the number of kinds of said type information extracted from packets associated with the same destination information, respectively; and determining an unauthorized communication when the number of kinds of said type information is less than a predetermined value. - View Dependent Claims (2, 3)
-
-
4. A method for controlling an apparatus for transferring data from a plurality of first devices to a second device via a network, said data being transferred by using a packet, the method comprising the steps of:
-
extracting type information identifying type of software conveyed by a packet and destination information identifying destination of the packet transmitted from one of said first devices, the software being used by said one of said first devices; counting the number of kinds of said destination information extracted from packets associated with the same type information, respectively; and determining an unauthorized communication when the number of kinds of said destination information is less than a predetermined value. - View Dependent Claims (5, 6)
-
-
7. An apparatus for transferring data from a plurality of first devices to a second device via a network, said data is transferred by using a packet, comprising:
-
a processor for executing a process comprising; extracting type information identifying type of software conveyed by a packet and destination information identifying destination of the packet transmitted from one of said first devices, the software being used by said one of said first devices; counting the number of kinds of said type information;
extracted from packets associated with the same destination information, respectively; anddetermining an unauthorized communication when the number of kinds of said type information is less than predetermined value. - View Dependent Claims (8, 9)
-
Specification