DEFENSEFLOW
Computer programs for use with network controllers, wherein the computer software collects wide traffic statistics and network topology from network controllers to detect suspicious and/or attacking network traffic patterns, and once detected, the computer software instructs the network controller to divert the suspicious and/or attacking network traffic through security attack mitigation devices in the network to filter out the suspicious and/or attacking network traffic
Registered · December 17, 2012 · 85803900 ·