NETWORK SECURITY ARCHITECTURE
6 Assignments
0 Petitions
Accused Products
Abstract
A network security system is deployed between an internet backbone and intranets that belong to subscribing organizations. The system includes a scanning system that scans incoming electronic mail for malicious code and an anti-virus server for downloading anti-virus code to clients on the intranets. A switch is provided for directing incoming electronic mail from the internet backbone to the scanning system so that the electronic mail can be scanned. In one embodiment, a decoy server is also provided for masquerading as a legitimate server and logging suspicious activity from communications received from the internet backbone.
-
Citations
21 Claims
-
1. (canceled)
-
2. A method comprising:
-
directing incoming electronic mail from an internet backbone network to a scanning system that interfaces between the internet backbone network and one or more intranets associated with different organizations; scanning incoming electronic mail to detect malicious code; generating an event indicating an outcome of the scanning; and initiating transmission of antivirus code to the intranets in response to the generated event. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code, the memory and the computer program code configured to, with the processor, cause the apparatus to perform at least the following; direct incoming electronic mail from an internet backbone network to a scanning system that interfaces between the internet backbone network and one or more intranets associated with different organizations, scan incoming electronic mail to detect malicious code, generate an event indicating an outcome of the scanning, and initiate transmission of antivirus code to the intranets in response to the generated event. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A system comprising:
-
a scanning system configured to receive incoming electronic mail from an internet backbone network, wherein the scanning system is further configured to interface between the internet backbone network and one or more intranets associated with different organizations, wherein the scanning system is further configured to scan incoming electronic mail to detect malicious code, to generate an event indicating an outcome of the scanning, and to initiate transmission of antivirus code to the intranets in response to the generated event. - View Dependent Claims (19, 20, 21)
-
Specification