×

Logical / physical address state lifecycle management

  • US 9,667,589 B2
  • Filed: 09/04/2012
  • Issued: 05/30/2017
  • Est. Priority Date: 10/01/2002
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • capturing, by executing an instruction with a processor, a data packet from a network;

    determining, by executing an instruction with the processor, whether the data packet is associated with a known threat based on whether an address in the data packet is in a table of addresses associated with known threats;

    when the data packet is not associated with the known threat;

    processing, by executing an instruction with the processor, the data packet to generate processed information, the data packet including a source address, a target address, and a target hardware address, the source address including an Internet Protocol (IP) address and a port;

    updating, by executing an instruction with the processor, at least one record in a frequency table based on at least the processed information, the at least one record indicating a number of packets sent by the source address;

    comparing, by executing an instruction with the processor, the processed information to at least one of a behavioral rule and a reconnaissance rule, at least one of the behavioral rule and the reconnaissance rule generated or modified based on an update of the frequency table;

    determining, by executing an instruction with the processor, that the data packet is associated with a new threat if the processed information violates at least one of the behavioral rule and the reconnaissance rule;

    in response to determining that the data packet is associated with the new threat, generating, by executing an instruction with the processor, an address resolution protocol (ARP) packet using a false hardware address;

    transmitting, by executing an instruction with the processor, the ARP packet to a gateway to invoke a defense mechanism; and

    in response to receiving an additional data packet from the source address and addressed to the false physical address, dropping, by executing an instruction with the processor, the additional packet.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×