×

Systems and methods for message threat management

  • US 8,042,149 B2
  • Filed: 05/29/2007
  • Issued: 10/18/2011
  • Est. Priority Date: 03/08/2002
  • Status: Expired due to Term
First Claim
Patent Images

1. A data traffic management system, the system comprising:

  • a communication interface adapted to allow communication between the management system and a network;

    a system data store comprising one or more data storage elements, wherein the system data store is capable of storing;

    one or more sets of data traffic management goals; and

    classification information;

    a system processor in communication with the communication interface and the system data store, wherein the system processor comprises one or more processing elements and the one or more processing elements are programmed or adapted to;

    receive a data packet directed to or from a recipient system;

    apply one or more tests to the received data packet, wherein each of the one or more tests evaluates the received data packet based upon the classification information;

    identify a classification associated with the received data packet based upon the applied one or more tests and the classification information, the classification identifying one or more types of traffic comprised by the received data packet identified by the one or more tests; and

    throttle traffic associated with the data packet, the throttling based upon the classifications identified for the data packet and based upon the one or more sets of data traffic management goals, and wherein the throttling of traffic throttles excessive numbers of incoming connections per second to levels manageable by internal application servers, and wherein the traffic management goals are derived from goal-based testing comprising;

    receiving threat information from one or more sources;

    reducing the threat information into a canonical form;

    extracting features from the reduced threat information;

    producing rules based on the features and the traffic management goals;

    testing the rules against sets of test data and comparing the outcome of the testing to the traffic management goals;

    refining the rules if one or more tests fail until the tests succeed within an acceptable margin of error; and

    propagating the rules to one or more application layer security systems, wherein the application layer security systems, implementing the rules, achieve the traffic management goals.

View all claims
  • 12 Assignments
Timeline View
Assignment View
    ×
    ×