首页>
外国专利>
CYBER DEFENCE AND NETWORK TRAFFIC MANAGEMENT USING EMULATION OF NETWORK RESOURCES
CYBER DEFENCE AND NETWORK TRAFFIC MANAGEMENT USING EMULATION OF NETWORK RESOURCES
展开▼
机译:基于网络资源仿真的网络防御与网络流量管理
展开▼
页面导航
摘要
著录项
相似文献
摘要
A computer security protection module (22) arranged to provide cyber defence capabilities to a target computer resource (12), the target computer resource being a potential target of a cyber-attack from an attacker computer entity (14), the protection module comprising: a first communications interface (43) arranged to interface with a communications network, the attacker computer entity being remotely located from the computer resource via the communications network (18); a second communications interface (45) arranged to interface with the target computer resource such that the protection module is located in a communications path between the communications network and the target computer resource; a processor (47) arranged to inspect communications traffic between the communications network and the target computer resource; wherein, the processor is arranged to forward trusted communications traffic received at the first communications interface (43) to the target computer resource (12) via the second communications interface (45) and to forward communications traffic received at the first communications interface that is not trusted to a virtual target (24), the virtual target being arranged to be a substantial replica of the target computer resource.
展开▼