Methods and systems for network traffic security
First Claim
1. A method comprising:
- monitoring on a host computer system at least one of a network resource for a network and a performance of an application in a network;
categorizing network traffic into at least good, bad and suspect categories of traffic based upon the monitoring; and
treating each of the good, bad and suspect categories of traffic different from others of the good, bad, and suspect categories of traffic, wherein good traffic and suspect traffic are forwarded toward a same destination using different resources.
24 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to methods of and systems for adaptive networking that monitors a network resource of a network. The method monitors an application performance. The method categorizes a first subset of traffic of the network. The categories for the first subset include trusted, known to be bad, and suspect. The method determines an action for a second subset of traffic based on the category for the first subset of traffic. Some embodiments provide a system for adaptive networking that includes a first device and traffic that has a first subset and a second subset. The system also includes a first resource and a second resource for the transmission of the traffic. The first device receives the traffic and categorizes the traffic into the first and second subsets. The first device assigns the first subset to the first resource. Some embodiments provide a network device that includes an input for receiving incoming traffic, an output for sending outgoing traffic, a categorization module that categorizes incoming traffic, and a resource assignment module that assigns the categorized traffic for a particular resource. A traffic category for the device includes suspect traffic.
-
Citations
42 Claims
-
1. A method comprising:
-
monitoring on a host computer system at least one of a network resource for a network and a performance of an application in a network; categorizing network traffic into at least good, bad and suspect categories of traffic based upon the monitoring; and treating each of the good, bad and suspect categories of traffic different from others of the good, bad, and suspect categories of traffic, wherein good traffic and suspect traffic are forwarded toward a same destination using different resources. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 38, 39, 40)
-
-
30. A network device comprising:
-
an input for receiving incoming traffic; an output for sending outgoing traffic; and a hardware module comprising; a categorization module that categorizes incoming traffic, wherein categories for the incoming traffic comprise trusted and suspect; and a resource assignment module that assigns the categorized traffic for a particular resource, wherein the resource assignment module assigns the trusted traffic and the suspect traffic to different resources for forwarding to a same destination. - View Dependent Claims (31, 32)
-
-
33. A system for adaptive networking comprising:
-
traffic comprising a plurality of subsets, wherein a first subset includes suspect traffic; a resource for the traffic, wherein the resource is allocated for suspect traffic, is separate from a resource allocated for trusted traffic, and is configured to forward the suspect traffic to a destination for the trusted traffic; and a first device for receiving the traffic, wherein the first device is configured to categorize the received traffic into the first subset. - View Dependent Claims (34, 35, 36, 37)
-
-
41. A method comprising:
-
monitoring on a host computer system at least one of a network resource for a network and a performance of an application in a network; categorizing network traffic into at least good, bad and suspect categories of traffic based upon the monitoring; determining an action for a first subset of traffic; categorizing a second subset of traffic; tracking a history of users and traffic patterns; using the history in categorizing the first subset of traffic; and treating each of the good, bad and suspect categories of traffic different from others of the good, bad, and suspect categories of traffic, wherein good traffic and suspect traffic are forwarded toward a same destination or different destinations using different resources.
-
-
42. A method comprising:
-
monitoring on a host computer system at least one of a network resource for a network and a performance of an application in a network; categorizing network traffic into at least good, bad and suspect categories of traffic based upon the monitoring; treating each of the good, bad and suspect categories of traffic different from others of the good, bad, and suspect categories of traffic, wherein good traffic and suspect traffic are forwarded toward a same destination or different destinations using different resources; and temporarily downgrading trusted traffic.
-
Specification