×

Systems and methods for distributed network protection

  • US 7,698,444 B2
  • Filed: 03/22/2007
  • Issued: 04/13/2010
  • Est. Priority Date: 05/31/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A communications network protection system, the system comprising:

  • one or more protected communications networks, including one or more computers or devices that serve as a target of a hacker attack over the protected communications networks;

    one or more first level monitoring centers monitoring hacker attacks over the protected communications networks in a geographical area or an organizational structure corresponding to the protected communications networks;

    one or more second level monitoring centers receiving from the first level monitoring centers information regarding the hacker attacks in the geographical area or the organizational structure corresponding to the protected communications networks and determining appropriate retaliatory or legal action against the hacker attacks;

    one or more third level monitoring centers receiving from the second level monitoring centers information regarding the hacker attacks and determining an overall security condition of the protected communications networks;

    one or more centralized databases located within respective of the third level monitoring centers for maintaining information regarding the overall security condition of the protected communications networks; and

    one or more distributed databases linked to the centralized databases and located within respective of the first and second level monitoring centers for maintaining respective information regarding the monitored hacker attacks in the geographical area or the organizational structure corresponding to the protected communications networks and the determined appropriate retaliatory or legal action against the hacker attacks,wherein the first level monitoring centers receive information on a hacker attack in progress over the protected communications networks from the protected communications networks and based on a referral from a site of the protected communications networks that was attacked pose as the attacked site to an attacker for positive identification of the attacker, andonce the hacker attack is confirmed, the attacked site or one of the first level monitoring centers sends a response to the attacker and including a concealed flag in the response for detection of the response via the flag, as the response passes through communications networks, for identifying the origin of the hacker attack and locations of previous attacks related to the hacker attack.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×