×

Method for customizing processing and response for intrusion prevention

  • US 7,657,937 B1
  • Filed: 01/02/2004
  • Issued: 02/02/2010
  • Est. Priority Date: 01/02/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for preventing intrusions to a computer system, comprising:

  • using a network-based appliance to intercept data packets;

    deciding whether to forward the intercepted packets or whether to route the intercepted packets to a virtual proxy;

    performing TCP or UDP processing on the intercepted packets before routing them to the virtual proxy;

    using the virtual proxy to analyze the packets that have been routed to the virtual proxy to detect intrusions using a processing engine having at least one processing procedure that detects intrusions; and

    when the virtual proxy detects an attack or violation in the packets, using the virtual proxy to direct a transport layer to modify the packets,wherein the virtual proxy directs the transport layer to modify the packets using packet stream modification requests, the method further comprising sending the packet stream modification requests from the network-based appliance to a standby network-based appliance to support fault tolerance.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×