发明名称 Method and apparatus for security management via vicarious network devices
摘要 In one embodiment of a method and apparatus for protecting data, voice, and video networks from individuals with malicious intent, a real network or network device has a vicarious simulated counterpart that may take the place of the real device or network upon appropriate triggering. The simulated counterpart behaves like the real device, but records the suspect transactions. The integrity of the real network or device is therefore continuously maintained because the suspect is isolated from the real network and the suspect transactions are not passed on to the actual device or network. The recorded transactions may then be analyzed for purposes of exposing the perpetrator, discovering perpetrator behavior patterns, and identifying device or network security weaknesses.
申请公布号 US2002184528(A1) 申请公布日期 2002.12.05
申请号 US20020122637 申请日期 2002.04.12
申请人 SHEVENELL MICHAEL P.;LEWIS LUNDY M.;GRAHAM RICHARD W. 发明人 SHEVENELL MICHAEL P.;LEWIS LUNDY M.;GRAHAM RICHARD W.
分类号 H04L29/06;(IPC1-7):G06F11/30 主分类号 H04L29/06
代理机构 代理人
主权项
地址