×

Secure gateway with firewall and intrusion detection capabilities

  • US 8,176,553 B1
  • Filed: 11/13/2002
  • Issued: 05/08/2012
  • Est. Priority Date: 06/29/2001
  • Status: Active Grant
First Claim
Patent Images

1. A method for detecting attacks on a network, comprising:

  • receiving data at a gateway from a remote source, the data destined for a target;

    discarding at least a portion of the data based on a predetermined set of rules utilizing a firewall associated with the gateway which is coupled to the remote source, wherein the firewall utilizes the predetermined set of rules to discard the at least a portion of data as a function of a plurality of parameters selected from the group consisting of a source, a destination, and a port associated with the data;

    passing that portion of the data not discarded to an intrusion detection system coupled to the firewall;

    receiving the portion of data not discarded utilizing the intrusion detection system;

    parsing the portion of data not discarded to identify data representing text therein utilizing the intrusion detection system;

    comparing the portion of data not discarded representing text to a predetermined list of data representing text associated with attacks utilizing the intrusion detection system, wherein the data representing text of the predetermined list refers to different types of attacks selected from the group consisting of information gathering attacks, a web server denial of service attack, and a file server remote compromise;

    identifying the portion of data not discarded representing text as hostile based on the comparison;

    acting on the portion of data not discarded representing text identified as hostile in order to prevent an attack, wherein the portion of data not discarded representing text identified as hostile is acted upon differently based on the type of the attack by at least one of blocking the data, alerting an administrator, and disconnecting the remote source; and

    updating the predetermined list of data representing text associated with attacks;

    wherein the firewall and the intrusion detection system are included in a single device;

    wherein the portion of data not discarded representing text identified as hostile is marked with an identifier from a table based on the comparison, the identifier being used to determine the manner in which the data representing text identified as hostile is acted upon;

    wherein the text includes ASCII characters and UNICODE characters;

    wherein the comparing, identifying, and acting further involves binary data, in order to identify binary data that is hostile;

    wherein the portion of data not discarded is assembled utilizing the intrusion detection system using header information associated with one or more packets comprising the portion of data not discarded.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×