发明名称 Method for detecting the hijacking of computer resources
摘要 An exemplary technique is provided for detecting a hijacking of computer resources, located in an internal network implementing security criteria and confidentiality criteria specific to the internal network, connected to an external network with no security criteria and confidentiality criteria, through a connection managed by a service provider. The technique includes storing, at the internal network, a connection parameter implemented by the computer resources to communicate with the external network; processing, at the internal network, the stored connection parameter based on an irreversible function to generate a unique code that corresponds to the stored connection parameter but which does not allow the identification of the stored connection parameter from the corresponding generated unique code; and sending, at the internal network, the generated unique code to a server located on the external network so that the server can analyze an activity of the computer resources from the unique code and detect any hijacking of the computer resources.
申请公布号 US9104874(B2) 申请公布日期 2015.08.11
申请号 US201013515316 申请日期 2010.12.08
申请人 Alcatel Lucent 发明人 Clevy Laurent;Martin Antony
分类号 G06F12/14;G06F17/00;H04L29/06;H04L9/32;G06F21/56;G06F21/55 主分类号 G06F12/14
代理机构 Patti & Malvone Law Group, LLC 代理人 Patti & Malvone Law Group, LLC
主权项 1. A method for detecting a hijacking of computer resources, located in an internal network implementing security criteria and confidentiality criteria specific to the internal network, connected to an external network with no security criteria and confidentiality criteria, through a connection managed by a service provider, comprising the steps of: storing, at the internal network, a connection parameter implemented by the computer resources to communicate with the external network, wherein the connection parameter comprises a content of a body of a packet transmitted from the internal network to the external network or identifiers included in DNS server requests issued by the internal network to the external network; processing, at the internal network, the stored connection parameter based on an irreversible function to generate a unique code that corresponds to said stored connection parameter but which does not allow the identification of said stored connection parameter from the corresponding generated unique code; and sending, at the internal network, said generated unique code to a server located on the external network so that the server can analyze an activity of the computer resources from said unique code and detect any hijacking of the computer resources.
地址 Boulogne-Billancourt FR
您可能感兴趣的专利