×

Network security apparatus, network security control method and network security system

  • US 8,544,063 B2
  • Filed: 01/27/2006
  • Issued: 09/24/2013
  • Est. Priority Date: 09/29/2005
  • Status: Active Grant
First Claim
Patent Images

1. A network security apparatus for monitoring telecommunication information flowing through a network and carrying out detection of, and/or protection from, an illegitimate intrusion to the network, comprising:

  • a first port connected to the network, to import first telecommunication information currently from the network;

    a second port connected to a telecommunication information accumulation apparatus, to import second telecommunication information accumulated by the telecommunication information accumulation apparatus historically; and

    a processor configuredto judge a presence or absence of an abnormality of the first and the second telecommunication information based on judgment reference information by using a statistical method,to create and update the judgment reference information by learning the presence or absence of the abnormality,to decrease a replay rate, which represents an input speed of the second telecommunication information in the telecommunication information accumulation apparatus to the second port, when a magnitude of a processing load at the network security apparatus is high,to increase the replay rate for allocating a spare resource of the network security apparatus to learning the second telecommunication information when the magnitude of the processing load is lowto synchronize the operation of the second telecommunication information with the changed replay rate,to allocate the first and second telecommunication information taken in respectively from the first and second ports to the processor, to categorize the first and second telecommunication information into a time independent item and a time dependent item, simply to multiplex the time independent item included in the first and second telecommunication information, and to make the time dependent item of the second telecommunication information conform to a processing speed of the time dependent item of the first telecommunication information based on timing information at the time of picking up the second telecommunication information.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×