×

Protecting a data processing system from attack by a vandal who uses a vulnerability scanner

  • US 7,278,161 B2
  • Filed: 10/01/2001
  • Issued: 10/02/2007
  • Est. Priority Date: 10/01/2001
  • Status: Active Grant
First Claim
Patent Images

1. A method for protecting a data processing system against attack by a vandal, the method comprising the steps of:

  • determining, by a vulnerability scanner, a first externally visible vulnerability of the data processing system, said first externally visible vulnerability being on a list, said list appearing in a database accessed by the vulnerability scanner;

    providing, by the vulnerability scanner to an observation engine, a description of a first instance of a network flow to the data processing system such that the first instance of the network flow is associated with the first externally visible vulnerability;

    detecting, by the observation engine, the first instance of the network flow satisfying said description;

    instructing, by the observation engine, a blocker to block the detected first instance of the network flow, said instructing being in response to said detecting;

    blocking, by the blocker, the first instance of the network flow, said blocking being in response to said instructing; and

    lifting, by the observation engine, a blocking of a earlier-blocked instance of the network flow, wherein the earlier-blocked instance of the network flow had been blocked due to having satisfied a description of the earlier-blocked instance provided by the vulnerability scanner responsive to the vulnerability scanner having detennined a second externally visible vulnerability of the data processing system such that the earlier-blocked instance of the network flow is associated with the second externally visible vulnerability, and wherein the second externally visible vulnerability is on the list.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×