Systems and methods for enhanced network security
First Claim
1. A node infrastructure implemented in a resident memory of at least one computing device on top of an existing computer network comprising:
- a) a plurality of nodes arranged in a collective configured in a ring topology wherein there are at least two independent collectives in a zone of the computer network, each node comprising a host and a security agent capable of being executed on the host configured to identify data about an attack on the node;
b) a plurality of super nodes arranged in a first super collective having authority of the zone of the computer network and configured in a ring topology having the at least two independent collectives in the zone associated with the first super collective each super node comprising a host and software capable of analyzing data received from a node in an associated collective about an attack on the node and sharing the data with other super nodes in the super collective;
c) wherein each collective directly delivers data to an associated super node in the associated super collective; and
d) wherein each node can only share data between nodes in its collective and its associated super node in the associated super collective.
3 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for an information system security infrastructure are described. One embodiment of the present invention comprises global Internet-scale defense infrastructure, referred to as the Intrusion Detection Force (IDF). The IDF comprises a virtual infrastructure implemented on top of an existing network, such as the Internet. The IDF enables secure information sharing and intelligent data analysis and response. The node (e.g. 102 of FIG. 1) is the most primitive entity in the IDF architecture, and may be a switch, router, server, or workstation. The IDF may be implemented in small networks of computers or may be utilized by millions of hosts throughout the Internet, spanning different organizations, countries, and continents.
-
Citations
11 Claims
-
1. A node infrastructure implemented in a resident memory of at least one computing device on top of an existing computer network comprising:
-
a) a plurality of nodes arranged in a collective configured in a ring topology wherein there are at least two independent collectives in a zone of the computer network, each node comprising a host and a security agent capable of being executed on the host configured to identify data about an attack on the node; b) a plurality of super nodes arranged in a first super collective having authority of the zone of the computer network and configured in a ring topology having the at least two independent collectives in the zone associated with the first super collective each super node comprising a host and software capable of analyzing data received from a node in an associated collective about an attack on the node and sharing the data with other super nodes in the super collective; c) wherein each collective directly delivers data to an associated super node in the associated super collective; and d) wherein each node can only share data between nodes in its collective and its associated super node in the associated super collective. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
Specification