Unlock instant, AI-driven research and patent intelligence for your innovation.

Intrusion detection in a data center environment

A technology of intrusion detection and intrusion detection system, applied in the direction of data exchange network, electrical digital data processing, digital transmission system, etc., can solve the problems of inability to use the third IDS to monitor the third subnet, limit the number of sessions, etc., and achieve large Granularity, removal of traffic noise, effect of reducing false positives

Active Publication Date: 2011-05-18
CISCO TECH INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Unfortunately, in some networks there is a practical limit to the number of sessions an IDS sensor can monitor due to traffic capture techniques
Therefore, there is no ability to utilize a third IDS to monitor a third subnet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection in a data center environment
  • Intrusion detection in a data center environment
  • Intrusion detection in a data center environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In describing the embodiments of the present invention herein, numerous specific details are provided, such as examples of components and / or methods, in order to provide a thorough understanding of the embodiments of the present invention. Those skilled in the art will appreciate, however, that embodiments of the invention may be practiced without one or more of these specific details, or with other apparatus, systems, assemblies, methods, components, components, and the like. In other instances, well-known structures, materials, or operations are not specifically shown or described in detail to avoid obscuring aspects of the embodiments of the invention.

[0019] Referring now to the drawings in more detail using the numerals, figure 1 A network segment 10 of a network environment is shown in . Network segment 10 is an example of a portion of a network environment typically used in a data center or large institutional or enterprise network. The network environment 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An intrusion detection system (IDS) is capable of identifying the source of traffic, filtering the traffic to classify it as either safe or suspect and then applying sophisticated detection techniques such as stateful pattern recognition, protocol parsing, heuristic detection or anomaly detection either singularly or in combination based on the traffic type. In a network environment, each trafficsource is provided with at least one IDS sensor that is dedicated to monitoring a specific type of traffic such as RPC, HTTP, SMTP, DNS, or others. Traffic from each traffic source is filtered to remove known safe traffic to improve efficiency and increase accuracy by keeping each IDS sensor focused on a specific traffic type.

Description

[0001] Cross References to Related Applications [0002] This application claims priority to Provisional Patent Application No. 60 / 623,810, filed October 28, 2004, by Mauricio Arregoces and Maurizio Portolani, entitled "Data Center Network Design And Infrastructure Architecture," which is hereby incorporated by reference in its entirety combined here. Background technique [0003] A successful Internet presence requires a company to have a website and computer resources available to handle a large number of hits from both customers and employees. Electronic commerce is now generally recognized as an efficient way of executing transactions and increasingly accounts for a vast majority of commerce worldwide. At the same time, a successful Internet presence means that the company must provide adequate security for customer records such as credit card numbers as well as his own private information. However, once an Internet presence is established, computer resources are expose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F15/173
CPCH04L67/1097H04L29/08549H04L12/462
Inventor 毛里西奥·波尔托拉尼毛里西奥·阿雷格赛斯蒂莫西·W·史蒂文森
Owner CISCO TECH INC