×

Switching device, method, and computer program for efficient intrusion detection

  • US 7,849,506 B1
  • Filed: 10/12/2004
  • Issued: 12/07/2010
  • Est. Priority Date: 10/12/2004
  • Status: Active Grant
First Claim
Patent Images

1. A switching device for detecting unauthorized access in a communications network, said switching device comprising:

  • a plurality of input ports;

    a plurality of output ports;

    switch logic coupled to each of the input ports and output ports, the switch logic comprising,a plurality of switch circuits corresponding to the plurality of input ports, each switch circuit operable for receiving incoming original packets from its corresponding input port and copy a selected number of the incoming original packets to create a limited number of copied packets, and wherein the selected number depends on a packet selection mechanism;

    the packet selection mechanism including a maximum byte count, a time period for forwarding packets, a maximum amount of time that received packets should be copied, and a specified number of packets, andwherein the switch logic is operable to route the incoming original packets from each input port to one of the output ports using a routing table;

    a processor operable to analyze information related to the incoming original packets and the limited number of copied packets from each input port to detect an anomaly related to the incoming original packets and the limited number of copied packets from each input port, the processor being further operable to cause the limited number of copied packets to be forwarded to an intrusion detection system within the communications network upon detecting the anomaly, the copied packets including a monitor field which when set directs the processor to process the packet to detect an anomaly related to the copied packets;

    wherein the processor is further operable to analyze a copied packets relationship to adjacent and related packets to detect an anomaly related to the copied packets; and

    wherein when an anomaly is detected said processor terminates a connection associated with said copied packets.

View all claims
  • 23 Assignments
Timeline View
Assignment View
    ×
    ×