Claims
- 1. A method for protecting a network appliance against a security breach, comprising:
determining when an AP process is an AP aware process; determining when the AP process is an AP unaware process; determining a current signature for the AP process executing on the network appliance; determining an expected signature for the AP process; comparing the current signature with the expected signature; and terminating the AP process when the current signature and expected signature do not match.
- 2. The method in claim 1, further comprising, sending an encrypted response to the AP aware process when the current signature and expected signature match.
- 3. The method in claim 1, wherein determining the current signature further comprises:
sending an initiation signal; and receiving the current signature from the AP process through a communication channel.
- 4. The method in claim 3, wherein the communication channel uses a TCP/IP protocol.
- 5. The method in claim 1, wherein determining the current signature further comprises; receiving the current signature from a process monitor when the AP process has been determined to be an AP unaware process.
- 6. The method in claim 1, wherein the current signature and the expected signature comprises identification data associated with the AP process.
- 7. The method of claim 6, wherein the identification data is selected from process identification, version information, memory usage, and run time data, associated with the AP process.
- 8. The method in claim 1, wherein comparing the current signature with the expected signature occurs at predetermined intervals.
- 9. The method in claim 8, wherein the predetermined intervals relate to a clock speed of the network appliance.
- 10. The method in claim 1, further comprising determining when the process fails, and when, restarting the process.
- 11. The method of claim 1, further comprising receiving an update message; and when the update message has been received: terminating the AP process; updating the AP process; and restarting the AP process.
- 12. A method for protecting a process on a network appliance against a security breach, comprising:
starting the process on the network appliance when the process is listed in a process list; determining a current signature of the process; determining an expected signature for the process; determining when the signature is valid by comparing the current signature with the expected signature; when the signature is not valid, terminating the process, otherwise, sending an encrypted response to the process.
- 13. The method of claim 12, further comprising determining when the process fails, and when the process fails restarting the process.
- 14. The method of claim 12, further comprising receiving an update message, and in response to receiving the update message updating the process.
- 15. The method of claim 12, wherein updating the process further comprises:
terminating the process; updating the process; and restarting the updated process when the update is complete.
- 16. A network appliance, comprising:
a processor and a computer-readable medium; an operating environment executing on the processor from the computer-readable medium; a network interface unit arranged to communicate with a network; a data store including an expected signature for a process; and an appliance protector program executing under the control of the operating system and operative to perform actions, including: determining a current signature of the process, determining the expected signature of the process, determining when the signature is valid by comparing the current signature with the expected signature, and, when the signature is determined to not be valid, terminating the process.
- 17. The network appliance of claim 16, wherein the data store further comprises a process list; and wherein the appliance protector program starts processes listed within the process list.
- 18. The network appliance of claim 16, wherein the data store further comprises encryption data; and when the appliance protector program determines when the signature is valid, the appliance protector sends a response that is encrypted using the encryption data.
- 19. The network appliance of claim 16, further comprising an update process; wherein the update process updates the process.
RELATED APPLICATION
[0001] This application claims the benefit of U.S. Provisional Application No. 60/283,587 filed Apr. 13, 2001, the benefit of the filing date of which is hereby claimed under 35 U.S.C. §119(e).
Provisional Applications (1)
|
Number |
Date |
Country |
|
60283587 |
Apr 2001 |
US |