A method (300) of managing security in a network is described. A data anomaly at a first location on a network is detected (305). A source of this data anomaly is identified (310). The source is compared with a plurality of access control policies, wherein each of the plurality of access control policies comprises at least one access restriction instruction associated with one or more sources (315). Based on the comparing, the source is associated with a corresponding one of the plurality of access control policies (320).
申请公布号
WO2010087838(A1)
申请公布日期
2010.08.05
申请号
WO2009US32501
申请日期
2009.01.29
申请人
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.;BALLESTEROS, REBECCA M.;KRELL, SHERRY;COWHAM, ADRIAN;GREEN, JOHN M.;YALAKANTI, RAMACHANDRA
发明人
BALLESTEROS, REBECCA M.;KRELL, SHERRY;COWHAM, ADRIAN;GREEN, JOHN M.;YALAKANTI, RAMACHANDRA