Method and device for filtering and analyzing communication traffic based on packet
A technology of data grouping and malicious traffic, applied in the field of computer networks, can solve problems such as occupying server resources and consuming bandwidth
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0062] FIG. 1 is a block diagram schematically showing a network protection system 20 according to an embodiment of the present invention. A protected area 30 of the network communicates through one or more routers 22 with a wide area network (WAN) 40 , typically the Internet. The protected area 30 includes various network elements 26 , such as servers 24 , clients, switches, internal routers, and bridges, which are typically connected by one or more local area networks (LANs) 32 . As described below, protected area 30 typically (but not necessarily) includes a private network, such as a corporate or campus network, or a network operated by an Internet Service Provider (ISP).
[0063] To prevent server 24 from being infected with a worm, protection device 28 intercepts incoming packets from WAN 40 addressed to network element 26 . Protection device 28 analyzes these incoming packets to detect packets suspected of being infected with a worm, generally using the techniques desc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 