×

Identification of network policy violations

  • US 7,937,755 B1
  • Filed: 01/27/2005
  • Issued: 05/03/2011
  • Est. Priority Date: 01/27/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, with an intrusion detection and prevention (IDP) device, network traffic flowing between a firewall and one or more computing nodes within a network;

    identifying, with the IDP device, packet flows within the network traffic;

    processing the packet flows with the IDP device to identify network elements associated with the packet flows;

    forming application-layer communications from the packet flows with the IDP device;

    processing the application-layer communications with protocol-specific decoders included within the IDP device to identify application-layer elements;

    analyzing the application-layer elements to determine whether each of the packet flows represents a network attack;

    based on the determination, forwarding packets of the packet flows to a destination identified by each of the packets;

    generating profiling data to associate the application-layer elements of the application-layer communications with the network elements of the packet flows;

    defining, with the IDP device, a policy violation object that specifies a set of rules for permissible packet flows within the network traffic expected to be output from the firewall, wherein each of the rules specifies network elements and application-layer elements to define permissible traffic characteristics for the permissible packet flows, and wherein the rules represent policies expected to be implemented by the firewall;

    applying, with the IDP device, the policy violation object to the profiling data to identify any of the packet flows within the network traffic output from the firewall that satisfy none of the rules; and

    producing, with the IDP device, a report listing the identified packet flows as packet flows that are not expected to be present within the network based on the application of the policy violation object to the profiling data generated by the IDP device.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×