Unlock instant, AI-driven research and patent intelligence for your innovation.

Identification of potential network threats using a distributed threshold random walk

A distributed and networked technology, applied in the field of computer networks

Inactive Publication Date: 2011-10-26
JUMIPER NETWORKS INC
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Many invitations sent by infected network devices are rejected or fail outright because infected network devices send invitations to network devices that do not exist or do not accept network connections

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification of potential network threats using a distributed threshold random walk
  • Identification of potential network threats using a distributed threshold random walk
  • Identification of potential network threats using a distributed threshold random walk

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] figure 1 is a block diagram illustrating an exemplary system 2 including an asymmetric routing network 6 in which routers 8A and 8B cooperate to implement a distributed random walk technique to identify any suspicious host devices. For purposes of illustration, system 2 is shown to include routers 8A and 8B that cooperate to implement a distributed random walk technique to identify any suspicious host devices. For the convenience of description, only two host devices 4A and 4B (collectively referred to as host devices 4) are shown, and the host devices may be personal computers, servers, network data centers, intermediate network devices, TV set-top boxes, VoIP, network devices, mobile devices, etc.

[0020] The network 6 may be an enterprise network. For example, a company may utilize network 6 to enable communications with employee computers and with customers and users. The host device 4 may be directly or indirectly connected to the network 6 . For example, host...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In general, the present invention is directed to techniques of identifying an infected network device in a computer network where traffic to and from the infected network device is not necessarily routed through a single point on the computer network. For example, individual line cards in network devices count incoming network flows from network devices in host tables. The host tables of all linecards of all participating network devices are then correlated. It is then determined whether the number of flows from a network device outweighs the number of flows to the network device to a significant degree. If so, the network device may be considered suspicious. Packets from a suspicious network device may be rerouted to a network security device for more thorough inspection.

Description

technical field [0001] The present invention relates to computer networks, and in particular to computer network security. Background technique [0002] Computer viruses and worms are major threats to corporate and home computer networks. Viruses and worms can cause leakage of sensitive information, congestion of computer networks, hardware and software failures, and other problems. Many viruses and worms try to replicate themselves on as many network devices as possible. In order to replicate itself, a virus or worm on an infected network device can cause the network device to attempt to create network connections with other network devices. If the network device successfully establishes a network connection to another network device, the virus or worm can use the network connection to transmit a copy of itself to the other network device, or cause the other network device to run malicious code. [0003] Typically, an infected network device is not pre-programmed with th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/56
CPCH04L63/1425
Inventor 哈沙德·纳基尔布赖恩·伯恩斯安库尔·辛格拉
Owner JUMIPER NETWORKS INC