×

Isolation approach for network users associated with elevated risk

  • US 7,607,021 B2
  • Filed: 03/09/2004
  • Issued: 10/20/2009
  • Est. Priority Date: 03/09/2004
  • Status: Active Grant
First Claim
Patent Images

1. A method, comprising the computer-implemented steps of:

  • in a security controller that is coupled, through a network, to a network device having a first network address assigned from a first subset of addresses within a first specified pool associated with normal network users;

    determining a user identifier associated with the network device that has caused a security event in the network;

    in response to the security event, causing the network device to acquire a second network address that is selected from a second subset of addresses within a second specified pool associated with suspected malicious network users;

    wherein the security event is an event that indicates at least one of;

    a possible denial of service attack, possible IP address spoofing, extraneous requests for network addresses, and possible MAC address spoofing;

    wherein the second subset of addresses is different from the first subset of addresses; and

    configuring one or more security restrictions with respect to the second network address.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×