Cloud computing as a security layer
First Claim
Patent Images
1. A system comprising:
- a computing cloud comprising at least one data storage unit and at least one processing unit;
wherein the computing cloud is configured to connect to a client, monitor traffic associated with the client, determine an operational mode of the client, generate a value for a condition of the monitored traffic, compare the generated value for the condition of the monitored traffic with a value for an anticipated traffic pattern associated with the operational mode to form a comparison, and determine if a security threat is indicated based on the comparison;
wherein, to generate the value for the condition of the monitored traffic, the computing cloud is configured to generate the value for the condition of the monitored traffic based on a number of factors including a number of destination Internet Protocol addresses for the traffic associated with the client, an amount of network bandwidth used at the client, and ports over which the traffic associated with the client is being transmitted.
1 Assignment
0 Petitions
Accused Products
Abstract
A system includes a computing cloud comprising at least one data storage unit and at least one processing unit. The computing cloud is configured to connect to at least one client and monitor the traffic of the at least one client. The computing cloud is further configured to determine an operational mode of the client, compare the monitored traffic with an anticipated traffic pattern associated with the operational mode, and determine if a security threat is indicated based on the comparison.
-
Citations
22 Claims
-
1. A system comprising:
-
a computing cloud comprising at least one data storage unit and at least one processing unit; wherein the computing cloud is configured to connect to a client, monitor traffic associated with the client, determine an operational mode of the client, generate a value for a condition of the monitored traffic, compare the generated value for the condition of the monitored traffic with a value for an anticipated traffic pattern associated with the operational mode to form a comparison, and determine if a security threat is indicated based on the comparison; wherein, to generate the value for the condition of the monitored traffic, the computing cloud is configured to generate the value for the condition of the monitored traffic based on a number of factors including a number of destination Internet Protocol addresses for the traffic associated with the client, an amount of network bandwidth used at the client, and ports over which the traffic associated with the client is being transmitted. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method comprising:
-
defining a plurality of operational modes, wherein each operational mode is associated with at least one anticipated traffic pattern of a client; storing the plurality of operational modes; monitoring traffic of the client; determining the operational mode of the client; generating a value for a condition of the monitored traffic; and comparing the generated value for the condition of the monitored traffic of the client with a value for the anticipated traffic pattern associated with the operational mode of the client to form a comparison; wherein generating the value for the condition of the monitored traffic of the client comprises; generating the value for the condition of the monitored traffic based on a number of factors including a number of destination Internet Protocol addresses for the traffic associated with the client, an amount of network bandwidth used at the client, and ports over which the traffic associated with the client is being transmitted. - View Dependent Claims (13, 14, 15, 16, 17, 18)
-
-
19. A system comprising:
-
a computing cloud comprising at least one processing unit and at least one data storage unit; and a client configured to be connected to a network through the computing cloud; wherein the computing cloud is configured to determine an operational mode of the client, monitor network traffic of the client, generate a value for a condition of the monitored traffic, compare the generated value for the condition of the monitored traffic with a value for an anticipated traffic pattern associated with the operational mode to form a comparison, determine if a security threat is indicated based on the comparison, and maintain security of the client based on the operational mode; wherein, to generate the value for the condition of the monitored traffic, the computing cloud is configured to generate the value for the condition of the monitored traffic based on a number of factors including a number of destination Internet Protocol addresses for the traffic associated with the client, an amount of network bandwidth used at the client, and ports over which the traffic associated with the client is being transmitted. - View Dependent Claims (20, 21, 22)
-
Specification