GEOGRAPHICAL INTRUSION RESPONSE PRIORITIZATION MAPPING SYSTEM
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for geographically mapping an intrusion into a network having one or more network points include receiving intrusion information identifying a intrusion into a point of the network, correlating the intrusion information with location information for the identified network point, and network identification information for the identified network point, and generating a map displaying a geographical location of the intrusion.
2 Citations
88 Claims
-
1-68. -68. (canceled)
-
69. A method for displaying information reflecting an intrusion into a computer network, the method comprising:
-
receiving network intrusion information indicating a potential intrusion into at least one computing device connected to the network; responsive to receiving the network intrusion information, identifying a network address associated with the at least one intruded computing device; determining, using the network address, a geographical location of the at least one intruded computing device; providing a geographical map of an area including at least the geographical location of the at least one potentially intruded computing device; and providing a network intrusion symbol on the map to designate the geographical location of the at least one potentially intruded computing device. - View Dependent Claims (70, 71, 72, 73, 74, 75, 76, 77)
-
-
78-1. The non-transitory computer-readable storage medium of claim 78, wherein the network address includes an Internet Protocol (IP) address.
-
86. A system for geographically mapping an intrusion into a computer network, the system comprising:
-
a network address database storing network address information for a plurality of computing devices connected to the network; a location database storing geographical location information associated with the plurality of computing devices; a computer in electronic communication with the map database and being configured to; receive network intrusion information indicating a potential intrusion into at least one computing device connected to the network; responsive to receiving the network intrusion information, identify a network address associated with the at least one potentially intruded computing device using the network address database; determine, based on the network address, a geographical location of the at least one potentially intruded computing device using the location database; provide a geographical map of an area including at least the geographical location of the at least one potentially intruded computing device; and provide a network intrusion symbol on the map to designate the geographical location of the at least one potentially intruded computing device. - View Dependent Claims (87, 88)
-
Specification