-
公开(公告)号:CA2672528A1
公开(公告)日:2008-10-30
申请号:CA2672528
申请日:2008-04-16
Applicant: IBM
Inventor: SHIEH JOHNNY MENG-HAN , MURILLO JESSICA CAROL , KEOHANE SUSANN MARIE , MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK
Abstract: A computer implemented method, apparatus, and computer program product fo r port scan protection. A reply data packet having a modified transmission c ontrol protocol header is generated to form a modified reply data packet, in response to detecting a port scan. The modified reply data packet will illi cit a response from a recipient of the modified data packet. The reply data packet is sent to a first Internet protocol address associated with the port scan. A second Internet protocol address is identified from a header of the response to the modified reply data packet. The second Internet protocol ad dress is an actual Internet protocol address of a source of the port scan. A ll network traffic from the second Internet protocol address may be blocked to prevent an attack on any open ports from the source of the port scan.
-
公开(公告)号:BRPI0410569A
公开(公告)日:2006-06-20
申请号:BRPI0410569
申请日:2004-04-15
Applicant: IBM
Inventor: KEOHANE SUSANN MARIE , MCBREARTY GERALD FRANCIS , MULLEN SHAWN PATRICK , MURILLO JESSICA KELLEY , SHIEH JOHNNY MENG-HAN
Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and re-configures the server ports to accept a re-mount from the client via a more secure port. The server re-configured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from un-authorized capture during transmission to the client system.
-
公开(公告)号:CA2525249A1
公开(公告)日:2004-12-02
申请号:CA2525249
申请日:2004-04-15
Applicant: IBM
Inventor: SHIEH JOHNNY MENG-HAN , MULLEN SHAWN PATRICK , MCBREARTY GERALD FRANCIS , KEOHANE SUSANN MARIE , MURILLO JESSICA KELLEY
Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially- tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and reconfigures the server ports to accept a re-mount from the client via a more secure port. The server reconfigured server port is provided the IP address of the client and matche s the IP address during the re-mount operation. The switch to a secure mount i s completed in a seamless manner so that authorized users are allowed to acces s sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from unauthorized capture during transmission to the client system.
-
-