Techniques are described for providing security to a protected network. Techniques are described for thwarting attempted network attacks using marked information. The attack correlation system provides marked information to computing devices that probe for sensitive information, and monitors subsequent communications for use of the marked information. In one example, the attack correlation system reroutes communications containing the marked information to a dedicated vulnerable device that logs the communications to monitor the attackers' methods. The attack correlation system may also include functionality to exchange information regarding attempted attacks with other attack correlation systems to gain broader knowledge of attacks throughout one or more networks.

 
Web www.patentalert.com

< Method and apparatus for transition of encryption key during an ongoing media communication session

< Method and system of promptly processing real-time media stream data packet

> Portable identity card reader system for physical and logical access

> Inertia lock apparatus

~ 00620