Network intrusion protection

Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets rep...

Full description

Saved in:
Bibliographic Details
Main Authors NELMS, II TERRY LEE, LAPOTIN DAVID PAUL, YU HAO, DENNERLINE DAVID ALLEN, FRANKE HUBERTUS
Format Patent
LanguageEnglish
Published 18.03.2014
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets represents data in the network. A network intrusion analysis cost-benefit value is determined representing a benefit for analyzing the received packet for intrusions in relation to a cost for analyzing the received packet for intrusions. The method compares the network intrusion analysis cost-benefit value to a network intrusion analysis cost-benefit threshold to determine whether analyzing the received packet for intrusions before forwarding the received packet is warranted. Responsive to a determination that analyzing the received packet for intrusions before forwarding the received packet is not warranted, the received packet is forwarded, an indication is made that subsequent packets of the flow should be forwarded, and a determination is made whether the received packet indicates an intrusion after forwarding the received packet.
AbstractList Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets represents data in the network. A network intrusion analysis cost-benefit value is determined representing a benefit for analyzing the received packet for intrusions in relation to a cost for analyzing the received packet for intrusions. The method compares the network intrusion analysis cost-benefit value to a network intrusion analysis cost-benefit threshold to determine whether analyzing the received packet for intrusions before forwarding the received packet is warranted. Responsive to a determination that analyzing the received packet for intrusions before forwarding the received packet is not warranted, the received packet is forwarded, an indication is made that subsequent packets of the flow should be forwarded, and a determination is made whether the received packet indicates an intrusion after forwarding the received packet.
Author NELMS, II TERRY LEE
LAPOTIN DAVID PAUL
FRANKE HUBERTUS
DENNERLINE DAVID ALLEN
YU HAO
Author_xml – fullname: NELMS, II TERRY LEE
– fullname: LAPOTIN DAVID PAUL
– fullname: YU HAO
– fullname: DENNERLINE DAVID ALLEN
– fullname: FRANKE HUBERTUS
BookMark eNrjYmDJy89L5WSQ8UstKc8vylbIzCspKi3OzM9TKCjKL0lNLgEyeRhY0xJzilN5oTQ3g4Kba4izh25qQX58anFBYnJqXmpJfGiwhZm5uYm5sZORMRFKAHK_JgM
ContentType Patent
DBID EVB
DatabaseName esp@cenet
DatabaseTitleList
Database_xml – sequence: 1
  dbid: EVB
  name: esp@cenet
  url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP
  sourceTypes: Open Access Repository
DeliveryMethod fulltext_linktorsrc
Discipline Medicine
Chemistry
Sciences
Physics
ExternalDocumentID US8677473B2
GroupedDBID EVB
ID FETCH-epo_espacenet_US8677473B23
IEDL.DBID EVB
IngestDate Fri Jul 19 13:55:12 EDT 2024
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-epo_espacenet_US8677473B23
Notes Application Number: US20080273142
OpenAccessLink https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20140318&DB=EPODOC&CC=US&NR=8677473B2
ParticipantIDs epo_espacenet_US8677473B2
PublicationCentury 2000
PublicationDate 20140318
PublicationDateYYYYMMDD 2014-03-18
PublicationDate_xml – month: 03
  year: 2014
  text: 20140318
  day: 18
PublicationDecade 2010
PublicationYear 2014
RelatedCompanies INTERNATIONAL BUSINESS MACHINES CORPORATION
NELMS, II TERRY LEE
LAPOTIN DAVID PAUL
FRANKE HUBERTUS
DENNERLINE DAVID ALLEN
YU HAO
RelatedCompanies_xml – name: LAPOTIN DAVID PAUL
– name: DENNERLINE DAVID ALLEN
– name: FRANKE HUBERTUS
– name: INTERNATIONAL BUSINESS MACHINES CORPORATION
– name: NELMS, II TERRY LEE
– name: YU HAO
Score 2.9336996
Snippet Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a...
SourceID epo
SourceType Open Access Repository
SubjectTerms CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
Title Network intrusion protection
URI https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20140318&DB=EPODOC&locale=&CC=US&NR=8677473B2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTIBtukTzRJ1QcvWdE3MDUx1k0DH3ZlbGiaaJCWbW1oYgfYO-_qZeYSaeEWYRjAxZML2woDPCS0HH44IzFHJwPxeAi6vCxCDWC7gtZXF-kmZQKF8e7cQWxc1aO8YdPgcMDu7ONm6Bvi7-DurOTvbhgar-QXZgo5tMzE3dgKW1qygVjTomH3XMCfQppQC5BrFTZCBLQBoWF6JEANTap4wA6cz7OI1YQYOX-h8tzADO3iBZnIxUBCaCYtFGGT8IEu3FTLzQDsmgG5VgJ62AGSKMii4uYY4e-gCLYyHey4-NBjuNGMxBhZgnz9VgkHB0CwNmJGAjQPjlCRgF8YyEdSvMjM2SAO2WMxSjFMkGSRxGiOFR06agQsUSqBFVIYWMgwsQGemygJr1ZIkOXB4AACBI3pG
link.rule.ids 230,309,786,891,25594,76903
linkProvider European Patent Office
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTIBtukTzRJ1QcvWdE3MDUx1k0DH3ZlbGiaaJCWbW1oYgfYO-_qZeYSaeEWYRjAxZML2woDPCS0HH44IzFHJwPxeAi6vCxCDWC7gtZXF-kmZQKF8e7cQWxc1aO8YdPgcMDu7ONm6Bvi7-DurOTvbhgar-QXZgo5tMzE3dgKW1qzmwB4huKcU5gTalFKAXKO4CTKwBQANyysRYmBKzRNm4HSGXbwmzMDhC53vFmZgBy_QTC4GCkIzYbEIg4wfZOm2QmYeaMcE0K0K0NMWgExRBgU31xBnD12ghfFwz8WHBsOdZizGwALs86dKMCgYmqUBMxKwcWCckgTswlgmgvpVZsYGacAWi1mKcYokgyROY6TwyMkzcHqE-PrE-3j6eUszcIFCDLSgytBChoEF6ORUWWANW5IkBw4bAF19fTA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Network+intrusion+protection&rft.inventor=NELMS%2C+II+TERRY+LEE&rft.inventor=LAPOTIN+DAVID+PAUL&rft.inventor=YU+HAO&rft.inventor=DENNERLINE+DAVID+ALLEN&rft.inventor=FRANKE+HUBERTUS&rft.date=2014-03-18&rft.externalDBID=B2&rft.externalDocID=US8677473B2