Network isolation techniques suitable for virus protection

作者: Yi Fen Chen , Yung Chang Liang

DOI:

关键词:

摘要: In a distributed network having number of server computers and associated client devices, method isolating infected devices from uninfected is described. The carried out by correlating related virus infection information, determining if outbreak has occurred based on the correlated when confirmed, monitoring all data packets in for virus, identifying packet type with blocking only identified type.

参考文章(32)
David M. Chess, John F. Morar, William C. Arnold, Steve R. White, Morton Swimmer, Edward J. Pring, Anatomy of a Commercial-Grade Immune System ,(1999)
Richard Golasky, Charles Butler, System and method for releasing device reservations ,(2003)
Noriko Kotabe, Akira Katsuyama, Yasuo Kusagaya, Shigeo Tanaka, Koichi Sugiyama, Hiroshi Yamazaki, Makoto Sato, Yoshio Osakabe, System for transmitting command and/or data in a single packet and automatically reporting status a predetermined time after receiving a command ,(1993)
Dan Touitou, Yehuda Afek, Rafi Zadikario, Barr Anat Bremler, Protecting against malicious traffic ,(2002)
Craig Alan VanZante, Douglas Edwin O'Neil, Trinh Van Pham, Hardware sampler for statistical monitoring of network traffic ,(1998)
Ching-Fong Su, Takeo Hamada, Peter J. Czezowski, Fault tolerant network routing ,(2003)
Taro Yajima, Minoru Akaishi, Yoshikuni Horishita, Matching box, vacuum apparatus using the same, and vacuum processing method ,(2003)
Martin Bergenwall, Janne Suuronen, System and method of providing virus protection at a gateway ,(2002)