摘要 |
<p>The method comprises computing means for capturing suspicious data traffic through a plurality of access nodes in a communication network characterized in that it comprises: a) detecting, a detector module, said suspicious data traffic passing through said plurality of access nodes in the communication network; and b) receiving and analysing, a mitigation module, said suspicious data traffic detected, in order of blocking it in case said suspicious data traffic is infected, in real time at the origin of the network access node in said communication network. The system is arranged for implementing the method of the present invention.</p> |