×

Correlating network information and intrusion information to find the entry point of an attack upon a protected computer

  • US 7,845,004 B2
  • Filed: 07/27/2001
  • Issued: 11/30/2010
  • Est. Priority Date: 07/27/2001
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method of identifying the entry point of an attack upon a device protected by an intrusion detection system, the method comprising the steps of;

  • obtaining intrusion information, from an intrusion detection system, regarding an attack upon a device protected by the intrusion detection system;

    obtaining network information, from network equipment connected to the device, regarding the attack;

    determining a logical entry point of the attack using a correlation engine to correlate the intrusion information and the network information; and

    identifying a physical entry point associated with the logical entry point.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×