Efficient network monitoring and control
First Claim
Patent Images
1. A method comprising:
- assigning a trust level to each of a plurality of users in a network;
setting a monitoring level for each of said plurality of users based on said trust level of the user;
monitoring at a network device, traffic associated with each of said plurality of users at the set monitoring levels, wherein monitoring comprises measuring data traffic transmitted between the network device and each of said plurality of users assigned a trust level;
analyzing at the network device, the monitored traffic associated with each of said plurality of users, wherein analyzing comprises comparing said measured data traffic to specified network usage parameters; and
modifying said trust level of one or more of said plurality of users if the analyzed traffic indicates that the one or more of said plurality of users is operating outside of the specified network usage parameters;
wherein modifying said trust level of the user comprises decreasing said trust level and increasing said data traffic measurements if the user operates outside of the specified network usage parameters, and increasing said trust level and reducing said data traffic measurements if the user operates within said specified network usage parameters for a set period of time.
1 Assignment
0 Petitions
Accused Products
Abstract
In one embodiment, a method for monitoring traffic associated with users in a network includes assigning a trust level to each of the users, monitoring traffic associated with each of the users, and analyzing the monitored traffic. A level of monitoring is based on the trust level of the user. A user'"'"'s trust level is modified if the analyzed traffic indicates that the user is operating outside of specified network usage parameters. An apparatus for monitoring traffic associated with users in a network is also disclosed.
47 Citations
20 Claims
-
1. A method comprising:
assigning a trust level to each of a plurality of users in a network; setting a monitoring level for each of said plurality of users based on said trust level of the user; monitoring at a network device, traffic associated with each of said plurality of users at the set monitoring levels, wherein monitoring comprises measuring data traffic transmitted between the network device and each of said plurality of users assigned a trust level; analyzing at the network device, the monitored traffic associated with each of said plurality of users, wherein analyzing comprises comparing said measured data traffic to specified network usage parameters; and modifying said trust level of one or more of said plurality of users if the analyzed traffic indicates that the one or more of said plurality of users is operating outside of the specified network usage parameters; wherein modifying said trust level of the user comprises decreasing said trust level and increasing said data traffic measurements if the user operates outside of the specified network usage parameters, and increasing said trust level and reducing said data traffic measurements if the user operates within said specified network usage parameters for a set period of time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
10. An apparatus comprising:
a database for storing a list of users and a trust level assigned to each of the users; a monitor operable to monitor traffic associated with each of the users, wherein a level of monitoring is based on said trust level of the user, wherein the monitor is operable to measure data traffic transmitted between the apparatus and each of the users assigned a trust level; and a processor for setting said trust level for each of the users, setting said monitoring level for each of the users based on said trust level of the user, analyzing the monitored traffic, and modifying said trust level of one or more of the users if the analyzed traffic indicates that the one or more of the users is operating outside of specified network usage parameters; wherein analyzing the monitored traffic comprises comparing said measured data traffic to the specified network usage parameters and modifying said trust level of the user comprises decreasing said trust level and increasing said data traffic measurements if the user operates outside of the specified network usage parameters, and increasing said trust level and reducing said data traffic measurements if the user operates within said specified network usage parameters for a set period of time. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
17. Logic encoded on one or more non-transitory computer readable media for execution and when executed operable to:
-
assign a trust level to each of a plurality of users; set a monitoring level for each of the users based on said trust level of the user; monitor traffic associated with each of the users, wherein computer code that monitors comprises computer code that measures data traffic transmitted between the system and each of said plurality of users assigned a trust level; analyze the monitored traffic, wherein computer code that analyzes comprises computer code that compares said measured data traffic to specified network usage parameters; and modify said trust level of one or more of the plurality of users if the analyzed traffic indicates that the one or more of the users is operating outside of the specified network usage parameters; wherein modifying said trust level of the user comprises decreasing said trust level and increasing said data traffic measurements if the user operates outside of the specified network usage parameters, and increasing said trust level and reducing said data traffic measurements if the user operates within said specified network usage parameters for a set period of time. - View Dependent Claims (18, 19, 20)
-
Specification