Identification of potential network threats using a distributed threshold random walk
A distributed and networked technology, applied in the field of computer networks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] figure 1 is a block diagram illustrating an exemplary system 2 including an asymmetric routing network 6 in which routers 8A and 8B cooperate to implement a distributed random walk technique to identify any suspicious host devices. For purposes of illustration, system 2 is shown to include routers 8A and 8B that cooperate to implement a distributed random walk technique to identify any suspicious host devices. For the convenience of description, only two host devices 4A and 4B (collectively referred to as host devices 4) are shown, and the host devices may be personal computers, servers, network data centers, intermediate network devices, TV set-top boxes, VoIP, network devices, mobile devices, etc.
[0020] The network 6 may be an enterprise network. For example, a company may utilize network 6 to enable communications with employee computers and with customers and users. The host device 4 may be directly or indirectly connected to the network 6 . For example, host...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 