Hierarchical application of security services with a computer network
A security service, network security technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve problems such as insecure networks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0020] figure 1is a block diagram illustrating an exemplary network system 2 in which intrusion detection / prevention module 4 of router 10 implements hierarchical security techniques in accordance with the principles of the present invention. Although shown as a module integrated within distribution router 10, where intrusion detection / prevention module 4 ("IDP module 4") may be implemented in a separate device (such as an IDP device), firewall, or any other device separate from distribution router 10 in the network security device. Thus, although described below with reference to router 10, the hierarchical security technique may be implemented by any network device or network security device to dynamically reduce the security device in response to monitored security capabilities within a network, such as private network 6. overlapping applications.
[0021] like figure 1 As shown, network system 2 includes a private network 6 coupled to a public network 8 . Public networ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 