Propagation of viruses through an information technology network
First Claim
Patent Images
1. A method of operating a host within a network of a plurality of hosts, comprising the steps of:
- monitoring requests to send data to other hosts in the network during successive intervals of time; and
for each interval of time, creating (a) a dispatch record for requests which have occurred within the scope of a policy, and (b) a buffer record for requests which have occurred outside the scope of the policy.
9 Assignments
0 Petitions
Accused Products
Abstract
Requests to send data from a first host within a network of hosts are monitored against a record of destination hosts that have been sent data in accordance with a predetermined policy. Destination host identities (not the record) are stored in a buffer. The buffer size is monitored to determine whether requests from the first host are pursuant to viral activity therein.
20 Citations
20 Claims
-
1. A method of operating a host within a network of a plurality of hosts, comprising the steps of:
- monitoring requests to send data to other hosts in the network during successive intervals of time; and
for each interval of time, creating (a) a dispatch record for requests which have occurred within the scope of a policy, and (b) a buffer record for requests which have occurred outside the scope of the policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
- monitoring requests to send data to other hosts in the network during successive intervals of time; and
Specification