International business machines corporation (20240163190). SIGNAL BASED NODE RELATIONSHIP IDENTIFICATION simplified abstract

From WikiPatents
Jump to navigation Jump to search

SIGNAL BASED NODE RELATIONSHIP IDENTIFICATION

Organization Name

international business machines corporation

Inventor(s)

Cheng-Ta Lee of Cumming GA (US)

Iosif Viorel Onut of Ottawa (CA)

Russell Couturier of Worcester MA (US)

Mattias Johansson of Dunwoody GA (US)

SIGNAL BASED NODE RELATIONSHIP IDENTIFICATION - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240163190 titled 'SIGNAL BASED NODE RELATIONSHIP IDENTIFICATION

Simplified Explanation

The patent application describes a method where a generated signal is injected into a network node to prevent data traffic from exiting the node, and by monitoring data flow, a correlation is detected between two network nodes, leading to blocking traffic from one node to the network.

  • The generated signal injected into the network node comprises a predetermined pattern with multiple time periods where data traffic is prevented from exiting.
  • Monitoring data flow within the network nodes helps detect correlations between nodes, leading to blocking traffic from one node to the network.

Potential Applications

This technology could be applied in network security systems to prevent unauthorized data flow between network nodes.

Problems Solved

This technology helps in identifying and blocking potential security threats within a network by correlating data flow patterns between nodes.

Benefits

The technology enhances network security by detecting and preventing unauthorized data flow within the network.

Potential Commercial Applications

The technology could be utilized by cybersecurity companies to offer advanced network security solutions to businesses and organizations.

Possible Prior Art

One possible prior art could be the use of network monitoring tools to detect anomalies in data flow patterns within a network.

What are the limitations of this technology in real-world applications?

The limitations of this technology in real-world applications include the need for continuous monitoring and potential false positives in detecting correlations between network nodes.

How does this technology compare to existing network security solutions?

This technology offers a more proactive approach to network security by actively monitoring data flow patterns and correlating them with injected signals to detect potential threats, whereas existing solutions may rely more on reactive measures.


Original Abstract Submitted

a generated signal is injected into a first network node in a set of network nodes. the generated signal comprises a predetermined pattern, the predetermined pattern comprises a plurality of time periods, wherein during each time period in the plurality of time periods a first data traffic is prevented from exiting the first network node. by monitoring data flow within the set of network nodes while the generated signal is being injected, a correlation with the generated signal is detected, the correlation correlating a second network node with the first network node. the second network node is associated with the first network node. responsive to the association, traffic from the second network node to the set of network nodes is blocked.