Claims
- 1. A network protection system comprising:
a communications management system; and an analysis system, wherein the analysis system receives information associated with an unauthorized access attempt and at least one of forwards a portion of the received information to at least one destination and forwards instructions to an intrusion detection system.
- 2. The system of claim 1, wherein the information associated with an unauthorized access attempt is received from an intrusion detection system.
- 3. The system of claim 2, wherein the intrusion detection system at least detects one or more unauthorized access attempts.
- 4. The system of claim 1, wherein the analysis system verifies the legitimacy of one or more access attempts.
- 5. The system of claim 1, wherein the analysis system communicates information regarding an unauthorized access attempt to a monitoring center.
- 6. The system of claim 1, wherein the analysis system communicates with the at least one destination via a communications link.
- 7. The system of claim 6, wherein the communications link is a secure tunnel.
- 8. The system of claim 1, wherein the analysis system enables communication between the at least one destination and one or more entities attempting the unauthorized access attempt.
- 9. The system of claim 1, wherein the one or more entities attempting the unauthorized access attempt is unaware that they are communicating with the at least one destination.
- 10. The system of claim 1, wherein communications from the at least one destination are modified to appear as if they have a predetermined origin.
- 11. A method of protecting a network comprising:
managing one or more network communications; and receiving information associated with an unauthorized access attempt and at least one of forwarding a portion of the received information to at least one destination and forwarding instructions to an intrusion detection system.
- 12. The method of claim 11, further comprising receiving unauthorized access attempt information from an intrusion detection system.
- 13. The method of claim 12, further comprising detecting one or more unauthorized access attempts.
- 14. The method of claim 11, further comprising verifying the legitimacy of one or more access attempts.
- 15. The method of claim 11, further comprising communicating information regarding an unauthorized access attempt to a monitoring center.
- 16. The method of claim 11, further comprising communicating with the at least one destination via a communications link.
- 17. The method of claim 16, wherein the communications link is a secure tunnel.
- 18. The method of claim 11, further comprising establishing communication between the at least one destination and one or more entities attempting the unauthorized access attempt.
- 19. The method of claim 11, wherein the one or more entities attempting the unauthorized access attempt is unaware that they are communicating with the at least one destination.
- 20. The method of claim 11, wherein communications from the at least one destination are modified to appear as if they have a predetermined origin.
- 21. An information storage media comprising information that protects a network comprising:
information that manages one or more network communications; and information that receives information associated with an unauthorized access attempt and at least one of forwarding a portion of the received information to at least one destination and forwarding instructions to an intrusion detection system.
- 22. The media of claim 11, further comprising information that receives unauthorized access attempt information from an intrusion detection system.
- 23. The media of claim 12, further comprising information that detects one or more unauthorized access attempts.
- 24. The media of claim 11, further comprising information that verifies the legitimacy of one or more access attempts.
- 25. The media of claim 11, further comprising information that communicates information regarding an unauthorized access attempt to a monitoring center.
- 26. The media of claim 11, further comprising information that communicates with the at least one destination via a communications link.
- 27. The media of claim 16, wherein the communications link is a secure tunnel.
- 28. The media of claim 11, further comprising information that establishes communication between the at least one destination and one or more entities attempting the unauthorized access attempt.
- 29. The media of claim 11, wherein the one or more entities attempting the unauthorized access attempt is unaware that they are communicating with the at least one destination.
- 30. The media of claim 11, wherein communications from the at least one destination are modified to appear as if they have a predetermined origin.
RELATED APPLICATION DATA
[0001] This application claims benefit of U.S. Provisional Application Ser. No. 60,226,088 entitled “Cyber Hacking Unauthorized Access Attempt Tracing and Retaliation Methods and Systems” filed Aug. 18, 2000, and is related to U.S. Patent Application Ser. No. 09,867,442 entitled “Systems and Methods for Distributed Network Protection” filed May 31, 2001 (Attorney Docket No. 741946.27), both incorporated herein by reference in their entirety.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60226088 |
Aug 2000 |
US |