SYSTEMS AND METHODS FOR DISTRIBUTED NETWORK PROTECTION
First Claim
1. A communications network protection system, the system comprising:
- one or more computers or devices of a protected communications network that serve as a target of a hacker attack over a communications network;
first through third level monitoring centers for receiving information regarding hacker attacks in a geographical area or an organizational structure corresponding to the protected communications network, and for determining appropriate retaliatory or legal action against the hacker attacks; and
one or more distributed databases linked to a centralized databases and located within respective of the first and second level monitoring centers for maintaining respective information regarding monitored hacker attacks in the geographical area or the organizational structure corresponding to the protected communications network, and the determined appropriate retaliatory or legal action against the hacker attacks.
1 Assignment
0 Petitions
Accused Products
Abstract
By distributing various information and monitoring centers that monitor distributed networks and unauthorized access attempts, it is possible to, for example, more quickly defend against an unauthorized access attempts. For example, a Level 1 monitoring center could monitor a predetermined geographical area serving, for example, a wide variety of commercial and public sites, an organizational structure, or the like, for alarms. Upon analyzing an alarm for various characteristics, the Level 1 monitoring center can refer the unauthorized access attempt to an appropriate Level 2 center for, for example, possible retaliatory and/or legal action. Then, a Level 3 monitoring center can record and maintain an overall picture of the security of one or more networks, the plurality of monitoring centers and information about one or more hacking attempts.
29 Citations
30 Claims
-
1. A communications network protection system, the system comprising:
-
one or more computers or devices of a protected communications network that serve as a target of a hacker attack over a communications network; first through third level monitoring centers for receiving information regarding hacker attacks in a geographical area or an organizational structure corresponding to the protected communications network, and for determining appropriate retaliatory or legal action against the hacker attacks; and one or more distributed databases linked to a centralized databases and located within respective of the first and second level monitoring centers for maintaining respective information regarding monitored hacker attacks in the geographical area or the organizational structure corresponding to the protected communications network, and the determined appropriate retaliatory or legal action against the hacker attacks. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A communications network protection method, the method comprising:
-
providing one or more computers or devices of a protected communications network that serve as a target of a hacker attack over a communications network; receiving, via first through third level monitoring centers, information regarding hacker attacks in a geographical area or an organizational structure corresponding to the protected communications network; determining, via the first through third level monitoring centers, appropriate retaliatory or legal action against the hacker attacks; and maintaining via one or more distributed databases linked to a centralized databases and located within respective of the first and second level monitoring centers, respective information regarding monitored hacker attacks in the geographical area or the organizational structure corresponding to the protected communications network, and the determined appropriate retaliatory or legal action against the hacker attacks. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer program product for communications network protection, including one or more computer readable instructions stored on a computer readable medium and configured to cause one or more computer processors to perform the steps of:
-
providing one or more computers or devices of a protected communications network that serve as a target of a hacker attack over a communications network; receiving, via first through third level monitoring centers, information regarding hacker attacks in a geographical area or an organizational structure corresponding to the protected communications network; determining, via the first through third level monitoring centers, appropriate retaliatory or legal action against the hacker attacks; and maintaining via one or more distributed databases linked to a centralized databases and located within respective of the first and second level monitoring centers, respective information regarding monitored hacker attacks in the geographical area or the organizational structure corresponding to the protected communications network, and the determined appropriate retaliatory or legal action against the hacker attacks. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification