×

Methods, communication networks, and computer program products for monitoring, examining, and/or blocking traffic associated with a network element based on whether the network element can be trusted

  • US 8,380,847 B2
  • Filed: 06/14/2012
  • Issued: 02/19/2013
  • Est. Priority Date: 12/22/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of operating a communication network, comprising:

  • determining whether a network element can be trusted, wherein determining whether a network element can be trusted comprises;

    generating a first hash value based on data associated with the network element at a first time;

    generating a second hash value based on the data associated with the network element at a second time different than the first time; and

    comparing the first hash value with the second hash value to determine whether the network element can be trusted based on whether a change has occurred in a configuration of the network element between the first time and the second time; and

    monitoring traffic associated with the network element based on whether the network element can be trusted;

    wherein monitoring traffic comprises;

    monitoring the traffic using rules to determine if the traffic contains unexpected information based on a degree of trust for the network element; and

    providing results with respect to whether the traffic contains unexpected information to a human expert interface based on the degree of trust for the network element;

    wherein monitoring traffic further comprises;

    selecting the traffic for monitoring using rules that are based on network element trust information;

    selecting at least some of the traffic that was monitored for examination based on a degree of trust for the network element;

    examining the at least some of the traffic that was monitored and was selected using rules using a level of examination selected from a plurality of levels of examination to determine if the traffic contains unexpected information based on the degree of trust for the network element; and

    providing results with respect to whether the at least some of the traffic that was monitored and was selected using rules contains unexpected information to a human expert interface based on the degree of trust for the network element;

    wherein the level of examination of the at least some of the traffic that was monitored is based on the degree of trust for the network element.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×