×

Methods, communication networks, and computer program products for monitoring, examining, and/or blocking traffic associated with a network element based on whether the network element can be trusted

  • US 8,977,745 B2
  • Filed: 02/18/2013
  • Issued: 03/10/2015
  • Est. Priority Date: 12/22/2005
  • Status: Expired due to Fees
First Claim
Patent Images

1. A method of operating a communication network, comprising:

  • determining whether a network element can be trusted, wherein determining whether a network element can be trusted comprises;

    generating a first hash value based on data associated with the network element wherein the first hash value is based on a configuration of the network element at a first time and the first hash value is an acceptable result for the configuration of the network element;

    generating a second hash value based on the data associated with the network element wherein the second hash value is based on a configuration of the network element at a second time different than the first time;

    comparing the first hash value with the second hash value to determine whether the network element can be trusted based on whether a change has occurred in the configuration of the network between the first time and the second time;

    monitoring traffic associated with the network element based on whether the network element can be trusted; and

    selecting some of the traffic that was monitored to be blocked based on the degree of trust for the network element;

    wherein monitoring traffic comprises;

    monitoring the traffic using rules to determine if the traffic contains unexpected information based on the degree of trust for the network element;

    providing results with respect to whether the traffic contains unexpected information to a human expert interface based on the degree of trust for the network element;

    selecting traffic for monitoring using rules that are based on network element trust information; and

    selecting some of the traffic that was monitored for examination based on a degree of trust for the network element;

    wherein monitoring traffic further comprises;

    specifying the traffic to be monitored based on traffic classification;

    examining the traffic that was monitored and was selected using rules using a level of examination selected from a plurality of levels of examination to determine whether the traffic contains unexpected information based on the degree of trust for the network element; and

    providing results with respect to whether the traffic that was monitored and was selected using rules contains unexpected information to the human expert interface based on the degree of trust for the network element;

    wherein the level of examination of the traffic that was monitored and was selected using rules is based on the degree of trust for the network element.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×