×

Multi-method gateway-based network security systems and methods

  • US 8,635,695 B2
  • Filed: 09/14/2012
  • Issued: 01/21/2014
  • Est. Priority Date: 02/08/2002
  • Status: Expired due to Term
First Claim
Patent Images

1. A method comprising:

  • receiving, at a network device, a packet;

    inspecting, by the network device, the packet to determine whether the packet includes information indicative of a security breach,inspecting the packet including a plurality of;

    inspecting the packet to identify one or more protocol irregularities in the packet to determine whether the packet includes the information indicative of the security breach, without a user request to inspect the packet to identify the one or more protocol irregularities,inspecting the packet to identify one or more attack signatures to determine whether the packet includes the information indicative of the security breach, without a user request to inspect the packet to identify the one or more attack signatures,inspecting the packet for one or more traffic signatures matching a packet flow, associated with the packet, to determine whether the packet includes the information indicative of the security breach, without a user request to inspect the packet for the one or more traffic signatures,one of inspecting the packet to identify the one or more protocol irregularities, inspecting the packet to identify the one or more attack signatures, or inspecting the packet for the one or more traffic signatures being performed based on another one of inspecting the packet to identify the one or more protocol irregularities, inspecting the packet to identify the one or more attack signatures, or inspecting the packet for the one or more traffic signatures;

    dropping, by the network device, the packet when the packet includes the information indicative of the security breach; and

    forwarding, by the network device, the packet to a network destination of the packet when the packet does not include the information indicative of the security breach.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×