Browse Prior Art Database

System for Security Conscious Bandwidth Drain using Pre-Allocation

IP.com Disclosure Number: IPCOM000247065D
Publication Date: 2016-Jul-31
Document File: 4 page(s) / 95K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a method that centers on the amalgamation of the rated/estimated future and current energy usage of individual tasks for applications/processes/devices in order to detect, stop, and prevent disobedient activity. The novel solution uses transmission capable devices to communicate and uses a wide variety of software applications that have a varied impact on bandwidth.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 36% of the total text.

Page 01 of 4

System for Security Conscious Bandwidth Drain using Pre-Allocation

Many types of security breaches are difficult to detect and prevent. For example, the data-stealing capabilities of many remote access Trojans are thorough. Variants are

capable of keylogging, accessing a computer's camera, stealing credentials stored in browsers, opening reverse shells, stealing files, manipulating processes, and viewing the user's desktop. The malignant software then wirelessly or via the network adapter sends all that data over the Internet. Some viruses/worms specifically search for

computer targets that have a high specification and good bandwidth. "... Viruses

decrease your internet speed because they need your bandwidth. They use your bandwidth for all sorts of evil purposes, like uploading illegal files online or infecting other computer users. Since most viruses are now transmitted through the internet, it's easy to see why so many viruses will specifically target your internet connection before any other part of your computer..." *

A system or method is needed to prevent the above.

In addition, the problem faced with using network capable devices, at any point, is that users are not as cognizant of the usage from a security and fair network bandwidth arbitration perspective. Additionally, many of the estimates for bandwidth usage are based on just the current consumption rate. The problem is now how to best ascertain and manage the network bandwidth to these processes/applications/devices. Individual applications have varying network demands. For example, demonstrating a newsfeed program at a meeting may require the wireless adapter to spiral, which increases

network consumption during the meeting.

A method is needed to leverage network ratings/information and historical data to detect a disobedient network drain by applications/devices.

The novel solution centers on the amalgamation of the rated/estimated future and current energy usage of individual tasks for applications/processes/devices in order to detect, stop, and prevent disobedient activity. The novel solution uses transmission capable devices to communicate and uses a wide variety of software applications that have a varied impact on bandwidth.

The prevention aspect of the solution ascertains the available bandwidth and works to fill that bandwidth with dummy data. For example, if the system estimates that the available "outgoing" bandwidth for a specific process/thread is 4.7 MB/S (via the Ethernet and wireless transmitter ), but the process is currently using 5.2 MB/S, then this may point to a security/green problem. For example, a surreptitious program might be transmitting and using bandwidth. As the system has proactively used the

bandwidth, the surreptitious program cannot transmit data.

In an example implementation in which the estimated usage for an operation is 1 MB:

1. Only provide 1 MB by imposing a limit on the process thread or by using all the available bandwidth...