Claims
- 1. A method for determining unauthorized network usage, comprising the steps of:
receiving internal zone data by classification of internal hosts into internal zones; receiving unauthorized zone data, the unauthorized zone data specifies which designated internal zones are not authorized to communicate with associated unauthorized internal zones; receiving override service data, the override service data specifies particular network services in which designated internal zones are authorized to participate with the associated unauthorized internal zones; monitoring network communications; capturing header information from monitored network communications; determining which internal hosts are participating in the monitored network communications based on captured header information; determining the internal zones participating in the monitored zone communications based upon the zone data; determining unauthorized network usage based upon the unauthorized internal zone data and the override service data; and generating an alarm upon detection of unauthorized network usage.
- 2. The method of claim 1, wherein the internal zones are classified by user functions.
- 3. The method of claim 1, wherein the internal zones are classified by subnet.
- 4. The method of claim 1, wherein the internal zone data includes an additional zone for outside hosts.
- 5. The method of claim 1, wherein the particular network services are based upon the client network services utilized by the internal hosts classified in the associated unauthorized internal zone.
- 6. The method of claim 1, wherein the step of generating an alarm includes providing an address to a filtering table to block the unauthorized network usage.
- 7. A method for determining unauthorized network usage, comprising the steps of:
receiving zone data by classification of hosts into zones; receiving unauthorized zone data, the unauthorized zone data specifies which designated zones are not authorized to communicate with associated unauthorized zones; receiving override service data, the override service data specifies particular network services in which designated zones are authorized to participate in communications with the associated unauthorized zones acting as a client; monitoring network communications; capturing header information from monitored network communications; determining which hosts are participating in the monitored network communications based on captured header information; determining a client host for each monitored network communication; determining the zones participating in the monitored zone communications based upon the zone data; determining unauthorized network usage based upon the unauthorized zone data and the override service data; and generating an alarm upon detection of unauthorized network usage.
- 8. The method of claim 1, wherein the zones are classified by user functions.
- 9. The method of claim 1, wherein the zones are classified by subnet.
- 10. The method of claim 1, wherein the step of generating an alarm includes adding a MAC address to a filtering table to block the unauthorized network usage.
- 11. A system for determining unauthorized network usage, comprising:
a computer system operable to receive internal zone data by classification of internal hosts into internal zones; the computer system operable to receive unauthorized zone data, the unauthorized zone data specifies which associated unauthorized zones are not authorized to initiate client communications to designated internal zones; the computer system operable to receive override service data, the override service data specifies particular network services in which designated internal zones are authorized to receive from the associated unauthorized zones; the computer system operable to capture header information from monitored network communications; the computer system operable to determine which internal hosts are participating in the monitored network communications based on captured header information; the computer system operable to determine the internal zones participating in the monitored zone communications based upon the internal zone data; the computer system operable to determine unauthorized network usage based upon the unauthorized zone data and the override service data; and a communication mechanism coupled to the computer system operable to provide an alarm upon detection of unauthorized network usage.
- 13. The system of claim 12, wherein the internal zones are classified by user functions.
- 14. The system of claim 12, wherein the internal zones are classified by subnet.
- 15. The system of claim 12, wherein the internal zone data includes an additional zone for outside hosts.
- 16. The system of claim 12, wherein the particular network services are based upon the client network services utilized by the internal hosts classified in the associated unauthorized zone.
- 17. The method of claim 1, wherein the step of generating an alarm includes providing an address to a filtering table to block the unauthorized network usage.
- 18. A system for determining unauthorized network usage, comprising:
a computer system operable to zone data by classification of hosts into zones; the computer system operable to receive unauthorized zone data, the unauthorized zone data specifies which designated zones are not authorized to communicate with associated unauthorized zones; the computer system operable to receive override service data, the override service data specifies particular network services in which designated zones are authorized to participate in communications with the associated unauthorized zones acting as a client; the computer system operable to monitor network communications; the computer system operable to capture header information from monitored network communications; the computer system operable to determine which hosts are participating in the monitored network communications based on captured header information; the computer system operable to determine a client host for each monitored network communication; the computer system operable to determine the zones participating in the monitored zone communications based upon the zone data; the computer system operable to determine unauthorized network usage based upon the unauthorized zone data and the override service data; and a communication mechanism coupled to the computer system operable to provide an alarm upon detection of unauthorized network usage.
- 19. The system of claim 18, wherein in the internal zone zones are classified by user functions.
- 20. The system of claim 18, wherein in the internal zone zones are classified by subnets.
CROSS REFERENCE TO RELATED APPLICATIONS
[0001] This is a continuation-in-part of the U.S. patent application Ser. No. 10/062,621 entitled “Network Port Profiling” filed on Jan. 31, 2002, which is incorporated in its entirety by reference and made a part hereof. This application is related to the U.S. non-provisional patent application Ser. No. 10/000,396 and PCT patent application PCT/US01/45,275, both entitled “Flow-Based Detection of Network Intrusions” and filed 30 Nov. 2001, both of which are hereby incorporated by reference in their entirety and made part hereof.
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
10062621 |
Jan 2002 |
US |
Child |
10106298 |
Mar 2002 |
US |