首页> 外国专利> Correlating network information and intrusion information to find the entry point of an attack upon a protected computer

Correlating network information and intrusion information to find the entry point of an attack upon a protected computer

机译:关联网络信息和入侵信息以查找对受保护计算机的攻击的切入点

摘要

A method for determining the entry point of an attack by a vandal such as a hacker upon a device such as a computer or a server such as a web server that operates under the protection of an intrusion detection system. Intrusion detection information regarding the attack and network information regarding the attack are correlated, and the entry point of the attack thereby deduced. In one embodiment, a source address of a message representative of the attack is found in a router table of a router that provides a connection supporting the attack. Logical ports of the connection are determined, and the corresponding physical ports found, thereby identifying the attack's entry point into the protected device.
机译:一种确定入侵者(例如黑客)对设备(例如计算机)或服务器(例如Web服务器)的攻击的进入点的方法,该设备在入侵检测系统的保护下运行。将与攻击有关的入侵检测信息与与攻击有关的网络信息相关联,从而推断出攻击的入口点。在一个实施例中,在提供支持攻击的连接的路由器的路由器表中找到代表攻击的消息的源地址。确定连接的逻辑端口,并找到相应的物理端口,从而识别攻击进入受保护设备的入口点。

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号