×

Multi-method gateway-based network security systems and methods

  • US 8,370,936 B2
  • Filed: 02/08/2002
  • Issued: 02/05/2013
  • Est. Priority Date: 02/08/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, at a network device, a plurality of packets;

    inspecting, by the network device, the plurality of packets to determine whether the plurality of packets includes information indicative of a security breach,inspecting the plurality of packets including;

    inspecting the plurality of packets to identify one or more protocol irregularities, associated with the plurality of packets, to determine whether the plurality of packets includes the information indicative of the security breach, without a user request to inspect the plurality of packets to identify the one or more protocol irregularities,after inspecting the plurality of packets to identify the one or more protocol irregularities and when the plurality of packets does not include the one or more protocol irregularities;

    inspecting the plurality of packets to identify one or more attack signatures, associated with the plurality of packets, to determine whether the plurality of packets includes the information indicative of the security breach, without a user request to inspect the plurality of packets to identify the one or more attack signatures, andafter inspecting the plurality of packets to identify the one or more attack signatures and when the plurality of packets does not include the one or more attack signatures;

    inspecting the plurality of packets to identify one or more traffic signatures, associated with the plurality of packets, to determine whether the plurality of packets includes the information indicative of the security breach, without a user request to inspect the plurality of packets to identify the one or more traffic signatures;

    dropping, by the network device, at least one packet of the plurality of packets when the at least one packet includes the information indicative of the security breach; and

    forwarding, by the network device, the at least one packet when the at least one packet does not include the information indicative of the security breach.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×