System and method for monitoring network traffic
First Claim
Patent Images
1. A method, comprising:
- reserving a plurality of network addresses within a public network;
by a network server, creating a virtual private network using the plurality of network addresses;
by the network server, assigning a network address to a trap, the network address being a dark address of the virtual private network;
by the network server, monitoring network traffic destined for the network address;
by the network server, gathering data regarding the network traffic including determining a level of the network traffic destined for the network address; and
by the network server, comparing the level of traffic to a predetermined threshold level to determine whether the network traffic is unauthorized.
0 Assignments
0 Petitions
Accused Products
Abstract
Described is a method of assigning a network address to a trap, the network address being a dark address of a virtual private network. The network traffic destined for the network address is monitored and a classification of the network traffic is determined. After the classification, a predetermined response is executed based on the classification of the traffic.
48 Citations
19 Claims
-
1. A method, comprising:
-
reserving a plurality of network addresses within a public network; by a network server, creating a virtual private network using the plurality of network addresses; by the network server, assigning a network address to a trap, the network address being a dark address of the virtual private network; by the network server, monitoring network traffic destined for the network address; by the network server, gathering data regarding the network traffic including determining a level of the network traffic destined for the network address; and by the network server, comparing the level of traffic to a predetermined threshold level to determine whether the network traffic is unauthorized. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system, comprising:
a server coupled to a first computer network and a second computer network, the server comprising a processor and computer readable media that, when executed by the processor, causes the processor to; reserve an address space within the second computer network for the first computer network; install a trap in the address space for monitoring network traffic to the address space; monitor network traffic destined for the network address, and gather data regarding the network traffic including a level of the network traffic destined for the network address; and compare the level of traffic to a predetermined threshold level to determine whether the network traffic is unauthorized. - View Dependent Claims (8, 9, 10, 11, 12, 13)
-
14. A computer-readable storage device storing a set of instructions, the set of instructions capable of being executed by a processor, the set of instructions performing the steps of:
-
reserving a plurality of network addresses within a public network; creating a virtual private network using the plurality of network addresses; assigning a network address to a trap, the network address being a dark address of the virtual private network; monitoring network traffic destined for the network addresses; gathering data regarding the network traffic including determining a level of the network traffic destined for the network address; and comparing the level of traffic to a predetermined threshold level to determine whether the network traffic is unauthorized. - View Dependent Claims (15, 16, 17, 18, 19)
-
Specification