Method and system for controlling network access
    1.
    发明申请
    Method and system for controlling network access 有权
    控制网络接入的方法和系统

    公开(公告)号:US20050204050A1

    公开(公告)日:2005-09-15

    申请号:US11076591

    申请日:2005-03-10

    CPC分类号: H04L63/105 H04L63/0263

    摘要: Systems and methods intended to control a network devices access to a network are disclosed. Embodiments of the current invention expose a method for confining a network client's network access to a specific logical region of the network. A network communication may be received and the client that originated this communication determined. This client is associated with a set of rules or walled garden that specifies the access allowed by that client. The destination of the communication may also be determined and if the destination is allowed by the set of rules associated with the client and access to the destination allowed if access to the destination is allowed by the set of rules.

    摘要翻译: 公开了旨在控制网络设备对网络的访问的系统和方法。 本发明的实施例公开了一种将网络客户端的网络访问限制在网络的特定逻辑区域的方法。 可以接收网络通信,并确定发起该通信的客户端。 该客户端与一组规则或围墙花园相关联,指定该客户端允许的访问。 还可以确定通信的目的地,并且如果通过该组规则允许对该目的地的访问允许的与客户端相关联的规则集合允许目的地以及允许访问目的地。

    System and method for detection of aberrant network behavior by clients of a network access gateway
    2.
    发明申请
    System and method for detection of aberrant network behavior by clients of a network access gateway 有权
    用于检测网络接入网关的客户端的异常网络行为的系统和方法

    公开(公告)号:US20050204169A1

    公开(公告)日:2005-09-15

    申请号:US11076652

    申请日:2005-03-10

    申请人: Steven Tonnesen

    发明人: Steven Tonnesen

    IPC分类号: H04L9/00

    摘要: A system and method for detecting aberrant network behavior. One embodiment provides a system of detecting aberrant network behavior behind a network access gateway comprising a processor, a first network interface coupled to the processor, a second network interface coupled to the processor, a storage media accessible by the processor and a set of computer instructions executable by the processor. The computer instructions can be executable to observe network communications arriving at the first network interface from multiple clients and determine when the traffic of a particular client is indicative of malware infection or other hostile network activity. If the suspicious network communication is determined to be of a sufficient volume, type, or duration the computer instructions can be executable to log such activity to storage media, or to notify an administrative entity via either the first network interface or second network interface, or to make the computer instructions be executable to perform other configured actions related to the functioning of the network access gateway.

    摘要翻译: 一种用于检测异常网络行为的系统和方法。 一个实施例提供一种检测网络接入网关后的异常网络行为的系统,其包括处理器,耦合到处理器的第一网络接口,耦合到处理器的第二网络接口,处理器可访问的存储介质和一组计算机指令 由处理器执行。 计算机指令可以被执行以观察从多个客户端到达第一网络接口的网络通信,并确定特定客户端的业务何时指示恶意软件感染或其他恶意网络活动。 如果可疑网络通信被确定为足够的卷,类型或持续时间,则计算机指令可以被执行以将此类活动记录到存储介质,或者通过第一网络接口或第二网络接口通知管理实体,或者 以使计算机指令可执行以执行与网络接入网关的功能相关的其他配置的动作。