×

Deep packet scan hacker identification

  • US 8,001,244 B2
  • Filed: 04/12/2010
  • Issued: 08/16/2011
  • Est. Priority Date: 08/24/2000
  • Status: Expired due to Fees
First Claim
Patent Images

1. A computer-implemented method of securing an accessible computer system, the method comprising:

  • scanning a plurality of data packets communicated between a plurality of access requestors and an access provider to detect one or more predetermined patterns;

    in response to detecting that a number of data packets, transmitted between a first access requestor and the access provider, that include the one or more predetermined patterns exceeds a first configurable threshold, blacklisting the first access requestor; and

    in response to detecting the transmission, between a second access requestor and the access provider, of a configurable number of data packets in which an occurrence of the one or more predetermined patterns is below a second configurable threshold, ceasing to scan data packets between the second access requestor and the access provider to detect occurrences of the one or more predetermined patterns.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×