Firewall system and method via feedback from broad-scope monitoring for intrusion detection
DC CAFCFirst Claim
1. A method of alerting at least one device in a networked computer system comprising a plurality of devices to an anomaly, at least one of the plurality of devices having a firewall, comprising:
- detecting an anomaly in the networked computer system using network-based intrusion detection techniques comprising analyzing data entering into a plurality of hosts, servers, and computer sites in the networked computer system;
determining which of the plurality of devices are anticipated to be affected by the anomaly by using pattern correlations across the plurality of hosts, servers, and computer sites; and
alerting the devices that are anticipated to be affected by the anomaly.
7 Assignments
Litigations
4 Petitions
Accused Products
Abstract
A broad-scope intrusion detection system analyzes traffic coming into multiple hosts or other customers'"'"' computers or sites. This provides additional data for analysis as compared to systems that just analyze the traffic coming into one customer'"'"'s site. Additional detection schemes can be used to recognize patterns that would otherwise be difficult or impossible to recognize with just a single customer detector. Standard signature detection methods can be used. Additionally, new signatures can be used based on broad-scope analysis goals. An anomaly is detected in the computer system, and then it is determined which devices or devices are anticipated to be affected by the anomaly in the future. These anticipated devices are then alerted to the potential for the future anomaly. The anomaly can be an intrusion or an intrusion attempt or reconnaissance activity.
135 Citations
33 Claims
-
1. A method of alerting at least one device in a networked computer system comprising a plurality of devices to an anomaly, at least one of the plurality of devices having a firewall, comprising:
-
detecting an anomaly in the networked computer system using network-based intrusion detection techniques comprising analyzing data entering into a plurality of hosts, servers, and computer sites in the networked computer system;
determining which of the plurality of devices are anticipated to be affected by the anomaly by using pattern correlations across the plurality of hosts, servers, and computer sites; and
alerting the devices that are anticipated to be affected by the anomaly. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
determining which of the plurality of devices have been affected by the anomaly; and
alerting the devices that have been affected by the anomaly.
-
-
3. The method of claim 1, further comprising adjusting the firewall of each of the devices that is anticipated to be affected by the anomaly responsive to the detection of the anomaly.
-
4. The method of claim 1, wherein the anomaly comprises one of an intrusion and an intrusion attempt.
-
5. The method of claim 1, wherein detecting the anomaly comprises analyzing a plurality of data packets with respect to predetermined patterns.
-
6. The method of claim 5, wherein analyzing the data packets comprises analyzing data packets that have been received at at least two of the plurality of devices.
-
7. The method of claim 1, wherein detecting the anomaly comprises recognition of an intrusion and further comprising generating an automated response to the intrusion.
-
8. The method of claim 1, further comprising adjusting anomaly detection sensitivity and alarm thresholds based on the detected anomaly.
-
9. A method of alerting a device in a networked computer system comprising a plurality of devices to an anomaly, comprising:
-
detecting an anomaly at a first device in the computer system using network-based intrusion detection technicques comprising analyzing data entering into a plurality of hosts, servers, and computer sites in the networked computer system;
determining a device that is anticipated to be affected by the anomaly by using pattern correlations across the plurality of hosts, servers, and computer sites; and
alerting the device that is anticipated to be affected by the anomaly. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. An intrusion detection and alerting system for a computer network comprising:
-
a plurality of devices coupled to the computer network, each device adapted to at least one of;
(1) sense data and provide the data to a data collection and processing center, and (2) be adjustable; and
the data collection and processing center comprising a computer with a firewall coupled to the computer network, the data collection and processing center monitoring data communicated to at least a portion of the plurality of devices coupled to the network, detecting an anomaly in the network using network-based intrusion detection techniques comprising analyzing data entering into a plurality of hosts, servers, and computer sites in the networked computer system, determining which of the devices are anticipated to be affected by the anomaly by using pattern correlations across the plurality of hosts, servers, and computer sites, and alerting the devices. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
- 26. A data collection and processing center comprising a computer with a firewall coupled to a computer network, the data collection and processing center monitoring data communicated to the network, and detecting an anomaly in the network using network-based intrusion detection techniques comprising analyzing data entering into a plurality of hosts, servers, and computer sites in the networked computer system.
Specification