Network intrusion protection
Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets rep...
Saved in:
Main Authors | , , , , |
---|---|
Format | Patent |
Language | English |
Published |
18.03.2014
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets represents data in the network. A network intrusion analysis cost-benefit value is determined representing a benefit for analyzing the received packet for intrusions in relation to a cost for analyzing the received packet for intrusions. The method compares the network intrusion analysis cost-benefit value to a network intrusion analysis cost-benefit threshold to determine whether analyzing the received packet for intrusions before forwarding the received packet is warranted. Responsive to a determination that analyzing the received packet for intrusions before forwarding the received packet is not warranted, the received packet is forwarded, an indication is made that subsequent packets of the flow should be forwarded, and a determination is made whether the received packet indicates an intrusion after forwarding the received packet. |
---|---|
AbstractList | Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a computing element of a network. A packet of a flow is received, the flow comprising a plurality of packets, wherein the plurality of packets represents data in the network. A network intrusion analysis cost-benefit value is determined representing a benefit for analyzing the received packet for intrusions in relation to a cost for analyzing the received packet for intrusions. The method compares the network intrusion analysis cost-benefit value to a network intrusion analysis cost-benefit threshold to determine whether analyzing the received packet for intrusions before forwarding the received packet is warranted. Responsive to a determination that analyzing the received packet for intrusions before forwarding the received packet is not warranted, the received packet is forwarded, an indication is made that subsequent packets of the flow should be forwarded, and a determination is made whether the received packet indicates an intrusion after forwarding the received packet. |
Author | NELMS, II TERRY LEE LAPOTIN DAVID PAUL FRANKE HUBERTUS DENNERLINE DAVID ALLEN YU HAO |
Author_xml | – fullname: NELMS, II TERRY LEE – fullname: LAPOTIN DAVID PAUL – fullname: YU HAO – fullname: DENNERLINE DAVID ALLEN – fullname: FRANKE HUBERTUS |
BookMark | eNrjYmDJy89L5WSQ8UstKc8vylbIzCspKi3OzM9TKCjKL0lNLgEyeRhY0xJzilN5oTQ3g4Kba4izh25qQX58anFBYnJqXmpJfGiwhZm5uYm5sZORMRFKAHK_JgM |
ContentType | Patent |
DBID | EVB |
DatabaseName | esp@cenet |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: EVB name: esp@cenet url: http://worldwide.espacenet.com/singleLineSearch?locale=en_EP sourceTypes: Open Access Repository |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Medicine Chemistry Sciences Physics |
ExternalDocumentID | US8677473B2 |
GroupedDBID | EVB |
ID | FETCH-epo_espacenet_US8677473B23 |
IEDL.DBID | EVB |
IngestDate | Fri Jul 19 13:55:12 EDT 2024 |
IsOpenAccess | true |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-epo_espacenet_US8677473B23 |
Notes | Application Number: US20080273142 |
OpenAccessLink | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20140318&DB=EPODOC&CC=US&NR=8677473B2 |
ParticipantIDs | epo_espacenet_US8677473B2 |
PublicationCentury | 2000 |
PublicationDate | 20140318 |
PublicationDateYYYYMMDD | 2014-03-18 |
PublicationDate_xml | – month: 03 year: 2014 text: 20140318 day: 18 |
PublicationDecade | 2010 |
PublicationYear | 2014 |
RelatedCompanies | INTERNATIONAL BUSINESS MACHINES CORPORATION NELMS, II TERRY LEE LAPOTIN DAVID PAUL FRANKE HUBERTUS DENNERLINE DAVID ALLEN YU HAO |
RelatedCompanies_xml | – name: LAPOTIN DAVID PAUL – name: DENNERLINE DAVID ALLEN – name: FRANKE HUBERTUS – name: INTERNATIONAL BUSINESS MACHINES CORPORATION – name: NELMS, II TERRY LEE – name: YU HAO |
Score | 2.9336996 |
Snippet | Improved techniques are disclosed for use in an intrusion prevention system or the like. For example, a method comprises the following steps performed by a... |
SourceID | epo |
SourceType | Open Access Repository |
SubjectTerms | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
Title | Network intrusion protection |
URI | https://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20140318&DB=EPODOC&locale=&CC=US&NR=8677473B2 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTIBtukTzRJ1QcvWdE3MDUx1k0DH3ZlbGiaaJCWbW1oYgfYO-_qZeYSaeEWYRjAxZML2woDPCS0HH44IzFHJwPxeAi6vCxCDWC7gtZXF-kmZQKF8e7cQWxc1aO8YdPgcMDu7ONm6Bvi7-DurOTvbhgar-QXZgo5tMzE3dgKW1qygVjTomH3XMCfQppQC5BrFTZCBLQBoWF6JEANTap4wA6cz7OI1YQYOX-h8tzADO3iBZnIxUBCaCYtFGGT8IEu3FTLzQDsmgG5VgJ62AGSKMii4uYY4e-gCLYyHey4-NBjuNGMxBhZgnz9VgkHB0CwNmJGAjQPjlCRgF8YyEdSvMjM2SAO2WMxSjFMkGSRxGiOFR06agQsUSqBFVIYWMgwsQGemygJr1ZIkOXB4AACBI3pG |
link.rule.ids | 230,309,786,891,25594,76903 |
linkProvider | European Patent Office |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwY2BQSTIBtukTzRJ1QcvWdE3MDUx1k0DH3ZlbGiaaJCWbW1oYgfYO-_qZeYSaeEWYRjAxZML2woDPCS0HH44IzFHJwPxeAi6vCxCDWC7gtZXF-kmZQKF8e7cQWxc1aO8YdPgcMDu7ONm6Bvi7-DurOTvbhgar-QXZgo5tMzE3dgKW1qzmwB4huKcU5gTalFKAXKO4CTKwBQANyysRYmBKzRNm4HSGXbwmzMDhC53vFmZgBy_QTC4GCkIzYbEIg4wfZOm2QmYeaMcE0K0K0NMWgExRBgU31xBnD12ghfFwz8WHBsOdZizGwALs86dKMCgYmqUBMxKwcWCckgTswlgmgvpVZsYGacAWi1mKcYokgyROY6TwyMkzcHqE-PrE-3j6eUszcIFCDLSgytBChoEF6ORUWWANW5IkBw4bAF19fTA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Apatent&rft.title=Network+intrusion+protection&rft.inventor=NELMS%2C+II+TERRY+LEE&rft.inventor=LAPOTIN+DAVID+PAUL&rft.inventor=YU+HAO&rft.inventor=DENNERLINE+DAVID+ALLEN&rft.inventor=FRANKE+HUBERTUS&rft.date=2014-03-18&rft.externalDBID=B2&rft.externalDocID=US8677473B2 |