Correlating network information and intrusion information to find the entry point of an attack upon a protected computer
First Claim
1. A computer-implemented method of identifying the entry point of an attack upon a device protected by an intrusion detection system, the method comprising the steps of;
- obtaining intrusion information, from an intrusion detection system, regarding an attack upon a device protected by the intrusion detection system;
obtaining network information, from network equipment connected to the device, regarding the attack;
determining a logical entry point of the attack using a correlation engine to correlate the intrusion information and the network information; and
identifying a physical entry point associated with the logical entry point.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for determining the entry point of an attack by a vandal such as a hacker upon a device such as a computer or a server such as a web server that operates under the protection of an intrusion detection system. Intrusion detection information regarding the attack and network information regarding the attack are correlated, and the entry point of the attack thereby deduced. In one embodiment, a source address of a message representative of the attack is found in a router table of a router that provides a connection supporting the attack. Logical ports of the connection are determined, and the corresponding physical ports found, thereby identifying the attack'"'"'s entry point into the protected device.
-
Citations
20 Claims
-
1. A computer-implemented method of identifying the entry point of an attack upon a device protected by an intrusion detection system, the method comprising the steps of;
-
obtaining intrusion information, from an intrusion detection system, regarding an attack upon a device protected by the intrusion detection system; obtaining network information, from network equipment connected to the device, regarding the attack; determining a logical entry point of the attack using a correlation engine to correlate the intrusion information and the network information; and identifying a physical entry point associated with the logical entry point. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A method of identifying the entry point of an attack upon a device protected by an intrusion detection system, said device one of a plurality of devices connected by a network, the method comprising the computer-implemented steps of:
-
detecting an attack on the device; notifying a correlation engine of the attack on the device; obtaining intrusion information regarding the attack; obtaining network information regarding the attack; using the correlation engine, correlating the intrusion information and the network information to produce correlation information; using the correlation information, finding on the network a logical port of connection used by the attack; and mapping the logical port on the network to a physical port on the network using the correlation engine. - View Dependent Claims (15, 16, 17)
-
-
18. An apparatus for detecting a point of an attack on a network, the apparatus comprising:
-
network equipment for connecting a protected device to a network; an intrusion detection system comprising intrusion detection equipment; a correlation engine adapted to; receive a notification of an attack on the protected device; receive intrusion information regarding the attack; receive network information regarding the attack, wherein the network information pertains to the network; correlate the intrusion information and the network information to produce correlation information; use the correlation information to find on the network a logical port of connection used by the attack; and map the logical port on the network to a physical port on the network using the correlation engine. - View Dependent Claims (19, 20)
-
Specification