System and method for intruder tracking using advanced...

Communications: electrical – Condition responsive indicating system – With particular system function

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C340S522000, C709S238000

Reexamination Certificate

active

11219595

ABSTRACT:
A method for correlating event information comprises receiving event information for a plurality of detected events wherein the event information for a particular detected event comprises a plurality of attributes associated with that detected event. The method continues by assigning a plurality of attribute values to each detected event, the attribute values of each detected event defining a point in n-dimensional space. The method continues by storing the event information for each detected event in accordance with the attribute values assigned to that detected event. The method continues by receiving a target event comprising a plurality of attributes wherein the attributes of the target event are associated with attribute values and the attribute values of the target event define a target point in n-dimensional space. The method continues by receiving a plurality of proximity limits that define a portion of n-dimensional space surrounding the target point. The method concludes by identifying a plurality of detected events wherein the points defined by the attribute values of the identified detected events are within the portion of n-dimensional space defined by the proximity limits.

REFERENCES:
patent: 5020411 (1991-06-01), Rowan
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6226589 (2001-05-01), Maeda et al.
patent: 6404380 (2002-06-01), Poore, Jr.
patent: 6744396 (2004-06-01), Stone et al.
patent: 6954775 (2005-10-01), Shanklin et al.
patent: 7058976 (2006-06-01), Dark
patent: 7127743 (2006-10-01), Khanolkar et al.
patent: 7130611 (2006-10-01), Kimura et al.
patent: 7146421 (2006-12-01), Syvanne
patent: 7185368 (2007-02-01), Copeland, III
patent: 2003/0145226 (2003-07-01), Bruton et al.
patent: 2003/0154399 (2003-08-01), Zuk et al.
patent: 2003/0177383 (2003-09-01), Ofek et al.
patent: 2004/0015719 (2004-01-01), Lee et al.
patent: 2004/0024855 (2004-02-01), Tsai et al.
patent: 2004/0103211 (2004-05-01), Jackson et al.
patent: 2004/0172557 (2004-09-01), Nakae et al.
patent: 2004/0193943 (2004-09-01), Angelino et al.
Pending U.S. Appl. No. 10/407,513, entitled “Vertically Extensible Intrusion Detection System and Method”, inventors Jon-Michael C. Brook, et al., 44 pages plus 7 pages of drawings, filed Apr. 4, 2003.
Pending U.S. Appl. No. 10/407,700, entitled “Dynamic Rule Generation for an Enterprise Instrusion Detection System”, inventors Jon-Michael C. Brook, 38 pages plus 7 pages of drawings, filed Apr. 4, 2003.
Pending U.S. Appl. No. 10/407,030, entitled “Graphical User Interface for an Enterprise Intrusion Detection System”, inventors Jon-Michael C. Brook, et al., 34 pages plus 7 pages of drawings, filed Apr. 4, 2003.
Patent Pending Application (serial no. not yet assigned), entitled “System and Method for Active Data Collection in a Network Security System”, inventor Troy D. Rockwood, 23 pages plus 2 pages of drawings, filed Jul. 6, 2005.
New Patent Application (serial no. not yet assigned), entitled System and Method for Collaborative Information Security Correlation in Low Bandwidth Environments, inventor Troy D. Rockwood, 44 pages plus 7 pages of drawings, filed Sep. 1, 2005.
New Patent Application (serial No. not yet assigned), entitled “System and Method for Interactive Correlation Rule Design in a Network Security System”, inventor Troy D. Rockwood, 31 pages plus 4 pages of drawings, filed Sep. 1, 2005.
Li et al., “Multi-Tier Intrusion Detection System,” pp. 1-11, 2000.
Wu et al., “JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Protocol,” pp. 0-23, Feb. 24, 1999.
Dasgupta; “Experiments with Random Projection,” Proc. 16th Conference Uncertainity in Artificial Intelligence (UAI), 9 pages, 2000.
Cisco Systems, Inc., “NetRanger User Guide 2.2.1,” Chapters 1-9 and Appendices A-C, 2000.
Jou et al., “Design and Implementation of a Scalable Intrusion Detection System for the Protection of Network Infrastructure,” DARPA Information Survivability Conference and Exposition (DISCEX), 15 pages, Jan. 2000.
Boeckman, “Getting Closer to Policy-Based Intrusion Detection,” Information Security Bulletin, pp. 13-20, May 2000.
Jansen et al., “Mobile Agents in Intrusion Detection and Response,” National Institute for Standards and Technology, 12 pages, Jun. 2000.
Northcutt et al., “Network Intrusion Detection: An Analyst's Handbook,” 2ndEd., 19 pages, Sep. 2000.
Phung, “Intrusion Detection FAQ; Data Mining in Intrusion Detection,” SANS.org, 3 pages, Oct. 24, 2000.
Power, “CSI Roundtable: Experts Discuss Present and Future Intrusion Detection Systems,” Computer Security Journal vol. XIV, #1, 15 pages, 2001.
Bace et al., “Intrusion Detection Systems,” NIST Special Publication on Intrusion Detection System, 51 pages, Feb. 2001.
“Stick—A Potential Denial of Service Against IDS Systems,” Internet Security Systems Security Alert, 2 pages, Mar. 14, 2001.
Arnold, “Kernel Based Anomaly Detection,” Intrusion Detection Systems, Machine Learning Group, Columbia University, 2 pages, Apr. 26, 2001.
Wang et al., “SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services,” IEEE Workshop on Information Assurance and Security, pp. 38-45, Jun. 5-6, 2001.
Intrusion.com, Inc., “Network Intrusion Detection System,” SecureNet Series, 6 pages, Jul. 2001.
Raghudharan, “Intrusion Detection Systems: Beyond the first line of defense,” Network Magazine, 7 pages, Sep. 2001.
Yocom et al., “Intrusion Detection Products Grow Up,” Network World, pp. 1-10/12, Oct. 8, 2001.
Symantec, “Symantec™ ManHunt: Reducing the Risk of Compromise,” Enterprise Security Technology, 4 pages, 2002.
ISS Corporation, “ISS RealSecure© Protection System,” 5 pages, Apr. 1, 2003.
Curry et al., “Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition,” Intrusion Detection Working Group, 116 pages, Jan. 30, 2003.
Jiang et al., “CompressingN-Dimensional Data”, U.S. Appl. No. 11/559,786, 31 pages, 3 pages of drawings, filed Nov. 14, 2006.
Gersho et al., “Vector Quantization and Signal Compression,” Kluwar Academic Publishers, 737 pages, 1992.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for intruder tracking using advanced... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for intruder tracking using advanced..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for intruder tracking using advanced... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3910565

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.