Network intrusion protection

Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets rep...

Full description

Saved in:
Bibliographic Details
Main Authors LAPOTIN DAVID PAUL, YU HAO, NELMS II TERRY LEE, DENNERLINE DAVID ALLEN, FRANKE HUBERTUS
Format Patent
LanguageChinese
English
Published 05.10.2011
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets represents data in the network. A network intrusion analysis cost-benefit value is determined representing a benefit for analyzing the received packet for intrusions in relation to a cost for analyzing the received packet for intrusions. The method compares the network intrusion analysis cost-benefit value to a network intrusion analysis cost-benefit threshold to determine whether analyzing the received packet for intrusions before forwarding the received packet is warranted.; Responsive to a determination that analyzing the received packet for intrusions before forwarding the received packet is not warranted, the received packet is forwarded, an indication is made that subsequent packets of the flow should be forward
Bibliography:Application Number: CN200980145011