An electrical cable includes a solid-core wire; an outer sheath surrounding the solid-core wire; and a connector attached directly to each end of the cable. The electrical cable may have a code marked on the outer sheath of the cable near each end of the cable in which the code is individualized for that particular electrical cable. The code may also be marked at intervals along the length of the cable, for example about every one to five feet. The cable may have at least eight solid-core wires, each wire being at least 24 gauge or heavier; an outer sheath surrounding the at least eight solid-core wires; and a factory/field-attached RJ45 connector attached directly to each end of the cable, wherein each connection is factory or factory-quality tested. The cable may be at least 60 feet long.
Applying Blocking Measures Progressively To Malicious Network Traffic
Robert William Danford - Ashburn VA, US Kenneth M. Farmer - Manitou Springs CO, US Clark Debs Jeffries - Chapel Hill NC, US Robert B. Sisk - Chapel Hill NC, US Michael A. Walter - Denver CO, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/08 G08B 23/00
US Classification:
726 23, 726 25, 709224
Abstract:
A method of progressive response for invoking and suspending blocking measures that defend against network anomalies such as malicious network traffic so that false positives and false negatives are minimized. When an anomaly is detected, the detector notifies protective equipment such as a firewall or a router to invoke a blocking measure. The blocking measure is maintained for an initial duration, after which it is suspended while another test for the anomaly is made. If the anomaly is no longer evident, the method returns to the state of readiness. Otherwise, a loop is executed to re-applying the blocking measure for a specified duration, then suspend the blocking measure and test again for the anomaly. If the anomaly is detected, the blocking measure is re-applied, and its duration is adapted. If the anomaly is no longer detected, the method returns to the state of readiness.
Applying Blocking Measures Progressively To Malicious Network Traffic
Robert William Danford - Ashburn VA, US Kenneth M. Farmer - Manitou Springs CO, US Clark Debs Jeffries - Chapel Hill NC, US Robert B. Sisk - Chapel Hill NC, US Michael A. Walter - Denver CO, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/30 G08B 23/00 G06F 11/18
US Classification:
726 23, 726 25, 709224
Abstract:
A method of progressive response for invoking and suspending blocking measures that defend against network anomalies such as malicious network traffic so that false positives and false negatives are minimized. When an anomaly is detected, the detector notifies protective equipment such as a firewall or a router to invoke a blocking measure. The blocking measure is maintained for an initial duration, after which it is suspended while another test for the anomaly is made. If the anomaly is no longer evident, the method returns to the state of readiness. Otherwise, a loop is executed to re-apply the blocking measure for a specified duration, then suspend the blocking measure and test again for the anomaly. If the anomaly is detected, the blocking measure is re-applied, and its duration is adapted. If the anomaly is no longer detected, the method returns to the state of readiness.