Propagation protection within a network
First Claim
Patent Images
1. A computerized method for propagation protection within a network, the method comprising:
- monitoring, by a transparent network appliance, data being transmitted from a first portion of the network to a second portion of the network through the network appliance;
analyzing, by the transparent network appliance, the data to determine whether the data represents a threat to the network;
transmitting, by the transparent network appliance, the data to the second portion of the network if the data does not represent a threat to the network or preventing transmission of the data to the second portion of the network if the data represents a threat to the network and transmitting, by the transparent network appliance, the data between the first portion of the network and the second portion of the network upon a failed or powerless condition of the transparent network appliance; and
establishing, by the transparent network appliance, one or more connection statistics on the data from the first portion of the network to the second portion of the network wherein the one or more connection statistics include at least one connection statistic not dependent on a threat.
3 Assignments
0 Petitions
Accused Products
Abstract
Described are methods and apparatus, including computer program products, for propagation protection within a network. A transparent network appliance monitors data being transmitted from a first portion of the network to a second portion of the network through the network appliance and analyzes the data to determine whether the data represents a threat to the network. The network appliance transmits the data to the second portion of the network if the data does not represent a threat to the network or prevents transmission of the data to the second portion of the network if the data represents a threat to the network.
64 Citations
32 Claims
-
1. A computerized method for propagation protection within a network, the method comprising:
-
monitoring, by a transparent network appliance, data being transmitted from a first portion of the network to a second portion of the network through the network appliance; analyzing, by the transparent network appliance, the data to determine whether the data represents a threat to the network; transmitting, by the transparent network appliance, the data to the second portion of the network if the data does not represent a threat to the network or preventing transmission of the data to the second portion of the network if the data represents a threat to the network and transmitting, by the transparent network appliance, the data between the first portion of the network and the second portion of the network upon a failed or powerless condition of the transparent network appliance; and establishing, by the transparent network appliance, one or more connection statistics on the data from the first portion of the network to the second portion of the network wherein the one or more connection statistics include at least one connection statistic not dependent on a threat. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 20)
-
-
19. A transparent network appliance for propagation protection within a network, the network appliance comprising:
-
a transparent network interface card configured to act as a bridge between a first portion of the network and a second portion of the network; a failsafe circuit configured to transmit data between the first portion of the network and the second portion of the network in a failed or powerless condition of the transparent network appliance; a data analyzer module tangibly embodied in electronic circuitry or a computer readable medium, the data analyzer module configured to analyze data transmitted from the first portion of the network to the second portion of the network to determine whether the data represents a threat to the network and to transmit the data to the second portion of the network if the data does not represent a threat to the network or prevent transmission of the data to the second portion of the network if the data represents a threat to the network and configured to establish one or more connection statistics on the data from the first portion of the network to the second portion of the network, wherein the one or more connection statistics include at least one connection statistic not dependent on a threat. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 29, 31)
-
-
28. A computer program product, tangibly embodied in a machine-readable storage device, for propagation protection within a network, the computer program product including instructions being operable to cause a data processing apparatus to:
-
monitor, by a transparent network appliance, data being transmitted from a first portion of the network to a second portion of the network through the network appliance; analyze, by the transparent network appliance, the data to determine whether the data represents a threat to the network; transmit, by the transparent network appliance, the data to the second portion of the network if the data does not represent a threat to the network or prevent transmission of the data to the second portion of the network if the data represents a threat to the network; establish, by the transparent network appliance, one or more connection statistics on the data from the first portion of the network to the second portion of the network, wherein the one or more connection statistics include at least one connection statistic not dependent on a threat; and transmit, by the transparent network appliance, the data between the first portion of the network and the second portion of the network upon a failed or powerless condition of the transparent network appliance. - View Dependent Claims (30, 32)
-
Specification