Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for impostor detector

A technology of deception detection and deception attack, applied in the direction of transmission system, data exchange details, electrical components, etc.

Active Publication Date: 2015-03-25
INT BUSINESS MASCH CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

this complexity and interconnectedness leads to several computer security related issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for impostor detector
  • Method and system for impostor detector
  • Method and system for impostor detector

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Those skilled in the art will understand that aspects of the present invention can be implemented as a system, method or computer program product. Accordingly, aspects of the present invention can take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, microcode, etc.), or an embodiment combining software and hardware aspects, all of which are herein Often referred to as "circuits", "modules" or "systems". Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer-readable media having computer-readable program code embodied therein.

[0017] One embodiment in accordance with claimed subject matter relates to a programmed method for detecting attacks on a system employing logical partitions. As used herein, the term "programmed method" is defined to mean one or more process steps that are currently performed; or alternatively, one or mor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are techniques for to enable a virtual input / output server (VIOS) to establish cryptographically secure signals with target LPARs to detect an imposter or spoofing LPAR. The secure signal, or “heartbeat,” may be configured as an Internet Key Exchange / Internet Protocol Security (IKE / IPSec) encapsulated packet (ESP) connection or tunnel. Within the tunnel, the VIOS pings each target LPAR and, if a heartbeat is interrupted, the VIOS makes a determination as to whether the tunnel is broken, the corresponding LPAR is down or a media access control (MAC) spoofing attach is occurring. The determination is made by sending a heartbeat that is designed to fail unless the heartbeat is received by a spoofing device.

Description

technical field [0001] The present invention relates to the detection of impostors. More specifically, the present invention relates to imposter detection in logically partitioned media access control systems. Background technique [0002] As processing demands increase, computing systems become more complex and more interconnected. For example, a particular computing device may be divided into multiple logical partitions, or "LPARs," where each logical partition includes a subset of computing device resources virtualized as separate computers. In addition, computing systems are becoming increasingly more interconnected through various networks such as local area networks (LANs) and the Internet. This complexity and interconnection leads to several problems related to computer security. [0003] US Patent 7,386,698 discloses a method for automatically defining, deploying and managing hardware and software resources in a Logical Partition (LPAR) computer system; and a solu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/22
CPCH04L63/1475H04L63/1466H04L43/10H04L63/0428H04L63/1483
Inventor S·P·马伦J·M-H·谢J·C·穆里洛G·F·麦克布瑞尔蒂S·M·基奥恩
Owner INT BUSINESS MASCH CORP