×

Systems and methods for distributed network protection

  • US 7,197,563 B2
  • Filed: 07/21/2006
  • Issued: 03/27/2007
  • Est. Priority Date: 05/31/2001
  • Status: Expired due to Fees
First Claim
Patent Images

1. A distributed system for monitoring a communications network and for detecting, tracing and responding to an unauthorized communications access attempt into the monitored communications network, the system comprising:

  • one or more distributed hierarchical monitoring systems; and

    one or more alarm signals that represent an unauthorized communications access attempt into one or more localized portions of the monitored communications network;

    wherein the one or more distributed hierarchical monitoring systems analyze the unauthorized communications access attempt in response to the unauthorized communications access attempt, and determine a responsive action to the unauthorized communications access attempt, including sending a mechanism for verifying the presence of an attack and for immediately determining a source of the unauthorized communications access attempt;

    wherein the verifying mechanism sends a determining mechanism that determines if the source of the unauthorized access attempt is hostile;

    wherein the determining mechanism includes an identified packet concealed in the response, and the one or more distributed hierarchical monitoring systems detect passage of the identified packet;

    wherein the packet is identified by a flag, and the one or more distributed hierarchical monitoring systems comprise conduit hosts and participating nodes forming a cooperative reporting system to detect passage of the flag and record information related to the flag and associated data, thereby revealing the source of the unauthorized communications access attempt regardless of a number of intermediate steps used to avoid detection by the source of the unauthorized communication access attempt;

    wherein the identified packet triggers the reporting and showing of a path to the source of the unauthorized communication access attempt;

    wherein an immediate response is launched, anytime after commencement of the unauthorized communication access attempt;

    wherein the response comprises a concealed program embedded with additional levels of verification to ensure the hostile intent and identity of the source of the unauthorized communication access attempt;

    wherein the additional levels of verification of hostile intent and identity of the source of the unauthorized communication access attempt are based on an historical profile, other previous attempts by the source of the unauthorized communication access attempt or communication with other monitoring centers to determine whether other targets have been attacked with same or similar unauthorized access requests;

    wherein upon verification of hostile intent and identity of the source of the unauthorized communication access attempt, the identification of the source of the unauthorized communication access attempt is secretly forwarded to a target station or monitoring center; and

    wherein one or more distributed hierarchical monitoring systems include first through third level monitoring systems, with the first level monitoring system configured to monitor a predetermined geographical area, an organizational structure or defined cyber boundaries, and refer the unauthorized access attempt to an appropriate second level monitoring system, with the second level monitoring system configured to receive the referral from the first level monitoring system and make a decision on a possible response based a nature of the unauthorized access attempt, and receive and analyze cumulative information on unauthorized access attempts from underlying first level monitoring systems, and with the third level monitoring system configured to collect and analyze information from the second level monitoring system, and monitor an overall security condition of the monitored communications network.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×