OPERATING A NETWORK MONITORING ENTITY
First Claim
Patent Images
1. A method for operating a network monitoring entity (TE) comprising at said network monitoring entity (TE) the steps of:
- receiving network flow records (FR) from several administrative domains (AD1-AD5);
performing an analysis (AN) of the network flow records (FR) to locate a source of malicious network flow; and
providing serviced entities (SE) with a result (RE) of the analysis (AN).
1 Assignment
0 Petitions
Accused Products
Abstract
Network flow records from various administrative domains are provided to a network monitoring entity. The network monitoring entity analyzes the network flow records in a way to locate a source of malicious network flow.
116 Citations
16 Claims
-
1. A method for operating a network monitoring entity (TE) comprising at said network monitoring entity (TE) the steps of:
-
receiving network flow records (FR) from several administrative domains (AD1-AD5); performing an analysis (AN) of the network flow records (FR) to locate a source of malicious network flow; and providing serviced entities (SE) with a result (RE) of the analysis (AN). - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
2. (canceled)
-
14. A network monitoring entity comprising being adapted to:
-
a receiving component for being provided with network flow records (FR) from several administrative domains (AD1-AD5); an analysis component for performing an analysis (AN) on the network flow records (FR) in a way to locate a source of malicious network flow; and a notification component for providing serviced entities (SE) with a result (RE) of the analysis (AN).
-
-
15. (canceled)
-
16. A computer program product comprising a computer-readable medium storing program instructions executable by a processor to perform a method for operating a network monitoring entity (TE), said method comprising at said network monitoring entity (TE) the steps of:
-
receiving network flow records (FR) from several administrative domains (AD1-AD5); performing an analysis (AN) of the network flow records (FR) to locate a source of malicious network flow; and providing serviced entities (SE) with a result (RE) of the analysis (AN).
-
Specification