abstract |
A network security system protects a computer network by evaluating all incoming data packets with one or more triggers to determine whether the incoming data packets are suspect data packets or acceptable data packets. The system changes the triggers and sensors that incoming packets encounter according to a programmable schedule, which makes attackers confused and uncertain about the network. When suspect data packets are encountered, the system performs one or more protective actions with respect to the suspect data packet. Some of these actions include logging, allowing, delaying, blocking, redirecting, and trapping the suspect data packets. |