Unlock instant, AI-driven research and patent intelligence for your innovation.

Network security elements using endpoint resources

A network, endpoint technology, applied in the field of network security units

Inactive Publication Date: 2013-11-20
INTEL CORP
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, a user may go undetected if he is able to avoid unassigned IP addresses or unused networks
Additionally, darknet / honeypot operations may be detected by an unauthorized user, allowing the user to disconnect before the network administrator can obtain information about the intruder

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network security elements using endpoint resources
  • Network security elements using endpoint resources
  • Network security elements using endpoint resources

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] Embodiments of the invention relate to network security elements using endpoint resources.

[0018] As used herein:

[0019] "Darknet" refers to a web server or element used to direct unauthorized use away from an operating network element. In one general example, a user attempting to access an unassigned IP address in an unused subnet can be detected and directed to the darknet.

[0020] A "honeypot" is a network element used to simulate network access by unauthorized users. In one example, a party suspected of being unauthorized accessing the network can be directed to a honeypot in order to obtain information related to the unauthorized access attempt.

[0021] "Network security element" means an element used to protect a network from unauthorized access. The term "network security element" includes, but is not limited to, the dark web or honeypots.

[0022] In an embodiment of the invention, the network security elements that prevent unauthorized users are distr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and apparatus for network security elements using endpoint resources. An embodiment of a method includes receiving a request for access to a network at an endpoint server. The method further includes detecting that the request for access to the network includes a request that is unauthorized. The request for access to the network is directed to a network security element.

Description

technical field [0001] Embodiments of the invention relate to computer security. More specifically, embodiments of the invention relate to network security elements using endpoint resources. Background technique [0002] For computer operations, many network security elements have been introduced in order to prevent attacks from outsiders. For example, unauthorized persons often attempt to gain access to network resources by probing the network for accessible points in the system. [0003] Among the network security elements that have been designed to deal with unauthorized network entry are darknet analyzers and honeypots, which combine to lure harmful traffic away from operating computer resources and allow system personnel to analyze attackers. Generally, the security element will recognize that an unauthorized person is trying to access an IP (Internet Protocol) address on an unused subnet and thus should not be accessed. Once this access is detected, the unauthorize...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L63/1491H04L63/10H04L63/1441H04L9/00H04L12/22H04L12/28
Inventor O·本-沙洛姆U·布卢门塔尔
Owner INTEL CORP