Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dynamic strategy supply in network security device

A network security and policy technology, applied in the field of computer networks, can solve problems such as damage to network connectivity

Inactive Publication Date: 2009-12-30
JUMIPER NETWORKS INC
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, by providing IDP devices to detect and / or prevent all groups or ranges of attack patterns, IDP devices can compromise network connectivity during periods of high network congestion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic strategy supply in network security device
  • Dynamic strategy supply in network security device
  • Dynamic strategy supply in network security device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] figure 1 is a block diagram illustrating an exemplary network system 2 in which an intrusion detection prevention device 4 performs dynamic policy provisioning techniques in accordance with the principles of the present invention. Intrusion detection and prevention device 4 ("IDP device 4") represents one example of a network security device, and although described below with reference to IDP device 4, dynamic policy provisioning techniques may be implemented by any network security device in response to network (e.g., Changing conditions within the private network 6) automatically balance security and network security.

[0023] Such as figure 1 As shown, the network system 2 includes a public network 8 and a private network 6 , wherein the private network 6 is connected to the public network 8 . Public network 8 may include any publicly accessible computer network, such as the Internet. Public network 8 may include a wide variety of interconnected computing devices ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a technology of dynamic strategy supply. A network security device comprises a memory, used for storing a first strategy and a second strategy of a first group mode corresponding to a first group network attack; and a control unit, used for applying the first strategy to network traffic to detect the first group network attack. When the first strategy is used, the control unit monitors parameters corresponding to one or more resources, and dynamically determines whether the second strategy is applied to network traffic based on the parameters. Thus, the control unit applies the second strategy to network traffic to detect a second group network attack, and transmits network traffic according to application of the second strategy. By this way, the network security device can realize the dynamic strategy supply technology.

Description

technical field [0001] The present invention relates to a computer network, and more particularly, to provisioning network equipment for a computer network. Background technique [0002] A computer network typically includes a collection of interconnected computer devices that exchange data and share resources. For example, devices may include web servers, database servers, file servers, routers, printers, end-user computers, and other devices. Various devices can execute many different services, operating systems (or operating system versions), and communication protocols. Each of the different services, operating systems, and communication protocols can expose the network to different security weaknesses. Malicious users or "hackers" exploit these security weaknesses to gain unauthorized access, thereby disrupting or generally attacking the network. [0003] Typically, the techniques used to detect these cyber attacks use pattern matching. Specifically, an intrusion de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L12/56H04L29/06
CPCH04L63/14H04L63/20H04L63/1425H04L63/1408H04L63/02
Inventor 克里希纳·纳拉亚纳斯瓦米
Owner JUMIPER NETWORKS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products