Data processing: artificial intelligence – Knowledge processing system – Knowledge representation and reasoning technique
Reexamination Certificate
2011-05-03
2011-05-03
Sparks, Donald (Department: 2129)
Data processing: artificial intelligence
Knowledge processing system
Knowledge representation and reasoning technique
C709S225000, C709S229000, C709S238000, C726S011000, C726S013000
Reexamination Certificate
active
07937353
ABSTRACT:
A method and system for determining whether to alter a firewall configuration. Message flow data associated with a message packet blocked by a firewall is received. The packet was blocked based on the firewall not having a message flow rule that permitted passage of the message packet. Risk values associated with a source network, destination network and destination port are identified by the message flow data. Based on the risk values, an electronic recommendation indicating whether to add to the firewall a message flow rule that permits the message flow to pass is determined and generated.
REFERENCES:
patent: 6061797 (2000-05-01), Jade et al.
patent: 6212558 (2001-04-01), Antur et al.
patent: 6226372 (2001-05-01), Beebe et al.
patent: 6519703 (2003-02-01), Joyce
patent: 6535227 (2003-03-01), Fox et al.
patent: 6895383 (2005-05-01), Heinrich
patent: 6906709 (2005-06-01), Larkin et al.
patent: 6912676 (2005-06-01), Gusler et al.
patent: 2002/0107961 (2002-08-01), Kinoshita
patent: 2003/0120955 (2003-06-01), Bartal et al.
patent: 2004/0015719 (2004-01-01), Lee et al.
patent: 2005/0160480 (2005-07-01), Birt et al.
patent: 2005/0268335 (2005-12-01), Le et al.
patent: 2006/0031373 (2006-02-01), Werner et al.
patent: 2006/0174337 (2006-08-01), Bernoth
patent: WO 2004109971 (2004-12-01), None
“An Expert System for analyzing firewall rules”, Pasi Eronen, Jukka Zitting, Helsinki University of Technology, NordSec 2001 Conference, Copenhagen, Nov. 2001, pp. 1-8.
“An Expert System for preventing and auditing intrusion”, Zong-pu Jia, Zhi-lin Yao, Shu-fen Liu, Proceedings of the 9thInternational Conference on Computer Supported Cooperative Work in Design, May 24-26, 2005, vol. 2, pp. 852-855.
“Taxonomy of Conflicts in Network Security Policies”, Hazem Hamed, Ehad Al-Shaer, DePaul University, IEEE Communications Magazine, vol. 44 No. 3, pp. 134-141, Mar. 2006.
Bernoth Andrew
Sandoval Medardo Roberto
International Business Machines - Corporation
Samodovitz Arthur J.
Schmeiser Olsen & Watts
Sparks Donald
Tran Mai T
LandOfFree
Method and system for determining whether to alter a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and system for determining whether to alter a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for determining whether to alter a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2631230