Propagation of viruses through an information technology network
First Claim
1. A method of operating a first host within a network of a plurality of hosts, the method comprising:
- during a first time interval, monitoring requests to send data to destination hosts, the requests being received at the first host from a second host;
comparing with a processor an identity of a destination host identified in a first one of the requests monitored during the first time interval with destination host identities in a record; and
preventing passage of the first one of the requests from the second host to the destination host when the identity of the destination host is not one of the destination host identities in the record and the second host has sent requests to more than a threshold number of destination hosts not in the record during the first time interval.
8 Assignments
0 Petitions
Accused Products
Abstract
A method of operating a first host within a network of a plurality of hosts. Over the course of a first time interval, requests received at the first host from a second host to send data to destination hosts are monitored. Identities of destination hosts monitored during the first time interval are compared with destination host identities in a record. Then, either data relating to requests which identify a destination host not in the record are stored in a storage buffer. Or the passage of data from the second host to the destination host within the network is limited over the course of the first time interval, so that during the first time interval the second host is unable to send data to more than a predetermined number of hosts not in the record.
-
Citations
20 Claims
-
1. A method of operating a first host within a network of a plurality of hosts, the method comprising:
-
during a first time interval, monitoring requests to send data to destination hosts, the requests being received at the first host from a second host; comparing with a processor an identity of a destination host identified in a first one of the requests monitored during the first time interval with destination host identities in a record; and preventing passage of the first one of the requests from the second host to the destination host when the identity of the destination host is not one of the destination host identities in the record and the second host has sent requests to more than a threshold number of destination hosts not in the record during the first time interval. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of operating a first host within a network of a plurality of hosts, the method comprising:
-
during a first time interval, monitoring requests to send data to destination hosts, the requests being received at the first host from a second host; determining, with a processor, if an identity of a destination host identified in a first one of the requests monitored during the first time interval is in a set of destination host identities in a record; and in response to determining that the identity of the destination host identified in the first one of the requests is not in the set of destination host identities in the record, and when the second host has sent requests to more than a first number of destination hosts not in the record during the first time interval, storing data relating to the request in a buffer. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification