17987254. SIGNAL BASED NODE RELATIONSHIP IDENTIFICATION simplified abstract (INTERNATIONAL BUSINESS MACHINES CORPORATION)
Contents
- 1 SIGNAL BASED NODE RELATIONSHIP IDENTIFICATION
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 SIGNAL BASED NODE RELATIONSHIP IDENTIFICATION - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 How does this technology impact network performance?
- 1.11 What are the limitations of this method in detecting correlations between network nodes?
- 1.12 Original Abstract Submitted
SIGNAL BASED NODE RELATIONSHIP IDENTIFICATION
Organization Name
INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor(s)
Cheng-Ta Lee of Cumming GA (US)
Iosif Viorel Onut of Ottawa (CA)
Russell Couturier of Worcester MA (US)
Mattias Johansson of Dunwoody GA (US)
SIGNAL BASED NODE RELATIONSHIP IDENTIFICATION - A simplified explanation of the abstract
This abstract first appeared for US patent application 17987254 titled 'SIGNAL BASED NODE RELATIONSHIP IDENTIFICATION
Simplified Explanation
The abstract describes a method where a generated signal is injected into a network node to detect correlations and block traffic from another node.
- A generated signal with a predetermined pattern is injected into a network node.
- The pattern includes time periods where data traffic is prevented from exiting the node.
- Data flow within the network nodes is monitored to detect correlations with the injected signal.
- A correlation between two network nodes is detected, leading to blocking traffic from one node to the network nodes.
Potential Applications
This technology could be applied in network security systems to detect and prevent unauthorized data flow between network nodes.
Problems Solved
This technology helps in identifying potential security threats within a network by detecting correlations between network nodes and blocking suspicious traffic.
Benefits
- Enhanced network security - Improved monitoring and control over data flow within network nodes
Potential Commercial Applications
"Enhanced Network Security System: Detecting and Blocking Unauthorized Data Flow"
Possible Prior Art
One possible prior art could be the use of intrusion detection systems in network security to monitor and block suspicious traffic.
Unanswered Questions
How does this technology impact network performance?
The article does not provide information on how the injection of generated signals affects the overall performance of the network.
What are the limitations of this method in detecting correlations between network nodes?
The article does not address any potential limitations or challenges in accurately detecting correlations between network nodes using this method.
Original Abstract Submitted
A generated signal is injected into a first network node in a set of network nodes. The generated signal comprises a predetermined pattern, the predetermined pattern comprises a plurality of time periods, wherein during each time period in the plurality of time periods a first data traffic is prevented from exiting the first network node. By monitoring data flow within the set of network nodes while the generated signal is being injected, a correlation with the generated signal is detected, the correlation correlating a second network node with the first network node. The second network node is associated with the first network node. Responsive to the association, traffic from the second network node to the set of network nodes is blocked.