Security monitor of system runs software simulator in parallel

Data processing: structural design – modeling – simulation – and em – Simulating electronic device or electrical system – Computer or peripheral device

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C703S002000, C703S022000, C713S152000, C713S152000

Reexamination Certificate

active

06985845

ABSTRACT:
A monitoring system monitors a system that has multiple devices that perform respective primary tasks. For the purpose of the monitoring, each device has a finite state machine (FSM) with stochastic non-periodic behavior. The monitoring system simulates in software the behavior of the FSM's. A discrepancy between the states assumed by the FSM's after each time step and the states assumed in the simulation in each time step indicates a failure or a breach of the network's integrity. Hacking such as primary system is practically impossible without being detected. Each device comprises computational resources. In order to reduce the computational environment available to a virus, the idle time of the resources is absorbed by dynamically increasing the complexity of the FSM's.

REFERENCES:
patent: 5394347 (1995-02-01), Kita et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5528516 (1996-06-01), Yemini et al.
patent: 5661668 (1997-08-01), Yemini et al.
patent: 6061599 (2000-05-01), Rhodehamel et al.
patent: 6249755 (2001-06-01), Yemini et al.
patent: 6393386 (2002-05-01), Zager et al.
patent: 6408262 (2002-06-01), Leerberg et al.
patent: 6434512 (2002-08-01), Discenzo
patent: 6477439 (2002-11-01), Bernaden et al.
patent: 6477651 (2002-11-01), Teal
patent: 6647519 (2003-11-01), Lometti et al.
patent: 6654882 (2003-11-01), Froutan et al.
patent: 6697857 (2004-02-01), Dixon et al.
Ilgun, K. et al. “State Transition Analysis: A Rule-Based Intrusion Detection Approach.” IEEE Transaction on Software Engineering. Mar. 1995. vol. 21, Issue 3, pp. 181-199.
Sekar, R. et al. “Synthesizing Fast Intrusion Prevention / Detection Systems from High-Level Specifications.” Proc. of the 8th USENIX Security Symposium. Aug. 23-26, 1999.
Forrest, S. et al. “Computer Immunology”. Communications of the ACM. Oct. 1997. vol. 40, Issue 10, pp. 88-96.
Ilugin, K. “USTAT: A Real-Time Intrusion Detection System for UNIX”. Proc. IEEE Comp. Society Symposium on Research in Security and Privacy. May 1993. pp. 24-26.
Venkatesan, R.M. et al. “Threat-Adaptive Security Policy.” IEEE IPCCC 1997. Feb. 1997. pp. 525-531.
Lunt, T.F. et al. “IDES: A Progress Report.” Proc. 6thAnnual Comp. Security App. Conf. Dec. 1990. pp. 273-285.
Lunt, T.F. “Real-Time Intrusion Detection.” COMPCON Spring '89. Feb.-Mar. 1989. pp. 348-353.
King, G. et al. “An Alternative Implementation of the Reference Monitor Concept.” 4thAerospace Computer Security Conference. Dec. 1988. pp. 159-166.
Murthy, V.K. et al. “Knowledge-Based Key-Hole Monitoring of Users for Security Control in Transaction Processing Systems.” Proc. IEEE Singapore Int'l Conf. on Networks. Sep. 1993. vol. 1, pp. 416-420.
Bodorik, P. “Multi-View Memory to Support OS Locking for Transaction Systems.” Proc. Int'l Database Engineering and Applications Symposium. (IDEAS '97). Aug. 1997. pp. 309-318.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Security monitor of system runs software simulator in parallel does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Security monitor of system runs software simulator in parallel, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security monitor of system runs software simulator in parallel will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3594196

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.