METHOD AND APPARATUS FOR DETECTING PORT SCANS WITH FAKE SOURCE ADDRESS

    公开(公告)号:CA2672528A1

    公开(公告)日:2008-10-30

    申请号:CA2672528

    申请日:2008-04-16

    Applicant: IBM

    Abstract: A computer implemented method, apparatus, and computer program product fo r port scan protection. A reply data packet having a modified transmission c ontrol protocol header is generated to form a modified reply data packet, in response to detecting a port scan. The modified reply data packet will illi cit a response from a recipient of the modified data packet. The reply data packet is sent to a first Internet protocol address associated with the port scan. A second Internet protocol address is identified from a header of the response to the modified reply data packet. The second Internet protocol ad dress is an actual Internet protocol address of a source of the port scan. A ll network traffic from the second Internet protocol address may be blocked to prevent an attack on any open ports from the source of the port scan.

    22.
    发明专利
    未知

    公开(公告)号:BRPI0410569A

    公开(公告)日:2006-06-20

    申请号:BRPI0410569

    申请日:2004-04-15

    Applicant: IBM

    Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially-tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and re-configures the server ports to accept a re-mount from the client via a more secure port. The server re-configured server port is provided the IP address of the client and matches the IP address during the re-mount operation. The switch to a secure mount is completed in a seamless manner so that authorized users are allowed to access sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from un-authorized capture during transmission to the client system.

    DISTRIBUTED FILESYSTEM NETWORK SECURITY EXTENSION

    公开(公告)号:CA2525249A1

    公开(公告)日:2004-12-02

    申请号:CA2525249

    申请日:2004-04-15

    Applicant: IBM

    Abstract: A security protocol that dynamically implements enhanced mount security of a filesystem when access to sensitive files on a networked filesystem is requested. When the user of a client system attempts to access a specially- tagged sensitive file, the server hosting the filesystem executes a software code that terminates the current mount and reconfigures the server ports to accept a re-mount from the client via a more secure port. The server reconfigured server port is provided the IP address of the client and matche s the IP address during the re-mount operation. The switch to a secure mount i s completed in a seamless manner so that authorized users are allowed to acces s sensitive files without bogging down the server with costly encryption and other resource-intensive security features. No significant delay is experienced by the user, while the sensitive file is shielded from unauthorized capture during transmission to the client system.

Patent Agency Ranking