Systems and methods for processing data flows
DCFirst Claim
1. A flow processing facility for implementing a security policy, comprising:
- a plurality of application processing hardware modules, each configured with an application for processing data packets;
a subscriber profile for identifying data packets associated with the subscriber profile in a stream of data packets; and
a network processing module for identifying one or more of the plurality of application processing modules for processing the identified data packets based on an association of the application configured on each application processing module with the subscriber profile and for transmitting the identified data packets in at least one of series and parallel to the identified application processing modules based on the security policy.
12 Assignments
Litigations
1 Petition
Accused Products
Abstract
A flow processing facility, which uses a set of artificial neurons for pattern recognition, such as a self-organizing map, in order to provide security and protection to a computer or computer system supports unified threat management based at least in part on patterns relevant to a variety of types of threats that relate to computer systems, including computer networks. Flow processing for switching, security, and other network applications, including a facility that processes a data flow to address patterns relevant to a variety of conditions are directed at internal network security, virtualization, and web connection security. A flow processing facility for inspecting payloads of network traffic packets detects security threats and intrusions across accessible layers of the IP-stack by applying content matching and behavioral anomaly detection techniques based on regular expression matching and self-organizing maps. Exposing threats and intrusions within packet payload at or near real-time rates enhances network security from both external and internal sources while ensuring security policy is rigorously applied to data and system resources. Intrusion Detection and Protection (IDP) is provided by a flow processing facility that processes a data flow to address patterns relevant to a variety of types of network and data integrity threats that relate to computer systems, including computer networks.
-
Citations
19 Claims
-
1. A flow processing facility for implementing a security policy, comprising:
-
a plurality of application processing hardware modules, each configured with an application for processing data packets; a subscriber profile for identifying data packets associated with the subscriber profile in a stream of data packets; and a network processing module for identifying one or more of the plurality of application processing modules for processing the identified data packets based on an association of the application configured on each application processing module with the subscriber profile and for transmitting the identified data packets in at least one of series and parallel to the identified application processing modules based on the security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A flow processing facility for implementing a security policy, comprising:
-
a plurality of applications configured on one or more application processing hardware modules for processing data packets; a subscriber profile for identifying data packets associated with the subscriber profile in a stream of data packets; a security policy for determining a portion of the identified data packets to be processed by each of the applications; and a network processing module for identifying at least one of the one or more application processing modules for processing the identified data packets based on an association of applications configured on each of the one or more application processing modules with the subscriber profile, and for transmitting the portion of the identified data packets in at least one of series and parallel to the applications configured on the identified application processing modules based on the security policy. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
Specification