×

Systems and methods for distributed network protection

  • US 7,406,713 B2
  • Filed: 08/10/2001
  • Issued: 07/29/2008
  • Est. Priority Date: 08/18/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for protecting a distributed network from unauthorized access, the system comprising:

  • first and second intrusion detection systems, respectively including;

    first and second intrusion detection modules, andfirst and second communications management modules respectively coupled to the first and second intrusion detection modules; and

    an intrusion analysis system coupled to the first and second intrusion detection systems, and including;

    an intrusion analysis module, andan intrusion reaction coordination module coupled to the intrusion analysis module,wherein the first intrusion detection module detects a respective possible unauthorized access attempt into a distributed network being protected,the second intrusion detection module detects a respective possible unauthorized access attempt within the distributed network being protected,the first and second communications management modules are coupled to the intrusion analysis module and forward to the intrusion analysis module respective information regarding the respective detected possible unauthorized access attempt,the intrusion analysis module determines based on the respective information regarding the respective detected possible unauthorized access attempt whether or not the respective detected possible unauthorized access attempt is authorized,if the intrusion analysis module determines that the respective detected possible unauthorized access attempt is authorized, the intrusion analysis module respectively forwards, via the first and second communications management modules, respective information to the first and second intrusion detection modules that the respective possible unauthorized access attempt is authorized, andif the intrusion analysis module determines that the respective detected possible unauthorized access attempt is not authorized, the intrusion analysis module determines, via the intrusion reaction coordination module, appropriate actions, including (i) forwarding respective information regarding the respective detected unauthorized access attempt into the distributed network being protected to a monitoring center external to the distributed network being protected, and processing respective information from the monitoring center regarding the respective detected unauthorized access attempt into the distributed network being protected, (ii) forwarding respective information regarding the respective detected unauthorized access attempt within the distributed network being protected for handling internally within the distributed network being protected, and processing respective information for internally handling the respective detected unauthorized access attempt within the distributed network being protected, and (iii) forwarding respective information regarding the respective detected unauthorized access attempt within the distributed network being protected to the monitoring center external to the distributed network being protected, and processing respective information from the monitoring center regarding the respective detected unauthorized access attempt within the distributed network being protected,wherein the intrusion analysis system in cooperation with the first and second intrusion detection systems enable communications between the monitoring center and an entity attempting the respective unauthorized access attempt without the entity being made aware that the entity attempting the respective unauthorized access attempt is communicating with the monitoring center,wherein the monitoring center sends information to the analysis system and intended for the entity attempting the unauthorized access attempt, the analysis system substitutes origin information of the monitoring center from the received information with origin information of a target of the respective unauthorized access attempt and forwards the substituted information to the entity attempting the respective unauthorized access attempt, whereby it appears to the entity attempting the respective unauthorized access attempt that communications are continuing with the target of the respective unauthorized access attempt, andwherein the intrusion analysis system in cooperation with the first intrusion detection system engages the entity attempting the respective unauthorized access attempt to determine the location or origin of the entity attempting the respective unauthorized access attempt.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×