Methods and systems for network traffic security
First Claim
1. A method of routing data comprising:
- a. receiving a data stream from a node, the data stream comprising a plurality of data packets;
b. classifying the plurality of data packets, wherein the classifications include;
i. trusted traffic, wherein trusted traffic includes data from a trusted source;
ii. bad traffic, wherein bad traffic includes data that is known to contain undesirable data; and
iii. suspect traffic, wherein suspect traffic includes data that is unknown or that is not from a trusted source; and
c. routing each of the plurality of data packets to a common destination via a path selected based upon the classification of the data packet, wherein trusted traffic is routed to the common destination via a first path, wherein the bad traffic is routed to the common destination via a second path, wherein the suspect traffic is routed to the common destination via a third path, and wherein the first and third paths are different.
18 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to methods of and systems for adaptive networking that monitors a network resource of a network. The method monitors an application performance. The method categorizes a first subset of traffic of the network. The categories for the first subset include trusted, known to be bad, and suspect. The method determines an action for a second subset of traffic based on the category for the first subset of traffic. Some embodiments provide a system for adaptive networking that includes a first device and traffic that has a first subset and a second subset. The system also includes a first resource and a second resource for the transmission of the traffic. The first device receives the traffic and categorizes the traffic into the first and second subsets. The first device assigns the first subset to the first resource. Some embodiments provide a network device that includes an input for receiving incoming traffic, an output for sending outgoing traffic, a categorization module that categorizes incoming traffic, and a resource assignment module that assigns the categorized traffic for a particular resource. A traffic category for the device includes suspect traffic.
-
Citations
10 Claims
-
1. A method of routing data comprising:
-
a. receiving a data stream from a node, the data stream comprising a plurality of data packets; b. classifying the plurality of data packets, wherein the classifications include; i. trusted traffic, wherein trusted traffic includes data from a trusted source; ii. bad traffic, wherein bad traffic includes data that is known to contain undesirable data; and iii. suspect traffic, wherein suspect traffic includes data that is unknown or that is not from a trusted source; and c. routing each of the plurality of data packets to a common destination via a path selected based upon the classification of the data packet, wherein trusted traffic is routed to the common destination via a first path, wherein the bad traffic is routed to the common destination via a second path, wherein the suspect traffic is routed to the common destination via a third path, and wherein the first and third paths are different. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
Specification