×

Network intrusion mitigation

  • US 7,676,841 B2
  • Filed: 02/01/2005
  • Issued: 03/09/2010
  • Est. Priority Date: 02/01/2005
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for mitigating against a cyber attack on a network, the method comprising:

  • receiving an IP address of an infected device and a signature identifier from an intrusion detection system at a cyber attack mitigation control center in response to the intrusion detection system detecting an event that represents a threat to the network at one or more locations on the network, wherein the intrusion detection system checks data packets travelling through the network against a predefined signature;

    locating, by the cyber attack mitigation control center, a physical port associated with the threat in response to receiving the IP address by;

    a) querying, by the cyber attack mitigation control center, an address table corresponding to a first router or a first switch to determine a port associated with the IP address on the router or the switch,b) if the port associated with the IP address is not connected to the infected device, navigating to a second router or to a second switch connected to the port associated with the IP address of the first router or to the first switch, andc) navigating to additional routers and/or switches by repeating a) and b) until the physical port associated with the infected device is located; and

    automatically shutting off the physical port associated with the infected device.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×