System and method for detecting and eliminating IP spoofing in a data transmission network
First Claim
Patent Images
1. The method of controlling a traffic management system, said method comprising the steps of:
- reviewing certain parameters of data packets flowing into said system, said parameters pertaining to possible spoofing;
remembering for a period of time said reviewed certain parameters in conjunction with each received data packet; and
upon attainment of packet flow volume into said system reaching a certain level, temporarily storing certain subsequently received packets in accordance with selective remembered parameter of previously received packets.
6 Assignments
0 Petitions
Accused Products
Abstract
A traffic management system sniffs data arriving at any point in a system. The sniffer operates to extract certain data from each address. This data could be, for example, the IP address data and the physical address data. The extracted data is then used to access different data bases to determine if matches occur. Time stamps, sequencing and other parameters of each piece of data entering a system are used to control data access.
-
Citations
10 Claims
-
1. The method of controlling a traffic management system, said method comprising the steps of:
-
reviewing certain parameters of data packets flowing into said system, said parameters pertaining to possible spoofing; remembering for a period of time said reviewed certain parameters in conjunction with each received data packet; and upon attainment of packet flow volume into said system reaching a certain level, temporarily storing certain subsequently received packets in accordance with selective remembered parameter of previously received packets. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification