Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2003-08-18
2008-12-30
Moise, Emmanuel L (Department: 2137)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
Reexamination Certificate
active
07472418
ABSTRACT:
Inbound and outbound traffic on a computer system are intercepted and compared to determine if the presence of malicious code is indicated. Outbound traffic that is sufficiently similar to recently received inbound traffic is indicative of the presence of malicious code. In some embodiments, if the presence of malicious code is indicated, the user, as well as other individuals or systems, are notified of the detection. In some embodiments, if desired, protective actions are initiated to hinder or block the propagation of the malicious code from the host computer system to other computer systems, as well as to remove or inactivate the malicious code on the host computer system.
REFERENCES:
patent: 6925572 (2005-08-01), Amit et al.
patent: 7080408 (2006-07-01), Pak et al.
patent: 2002/0032871 (2002-03-01), Malan et al.
patent: 2003/0074578 (2003-04-01), Ford et al.
patent: 2003/0101353 (2003-05-01), Tarquini et al.
patent: 2003/0154255 (2003-08-01), Platte et al.
patent: 2004/0111531 (2004-06-01), Staniford et al.
patent: 2004/0250124 (2004-12-01), Chesla et al.
patent: 2006/0212572 (2006-09-01), Afek et al.
patent: WO 0219069 (2002-03-01), None
Hoepers et al., “Honeynets Applied to the CSIRT Scenario.” Jun. 2003. Brazillian Honeynet Project, pp. 2-7.
Williamson, Matthew M., “Throttling Viruses: Restricting propagation to defeat malicious mobile code”, Hewlett-Packard Company, unnumbered abstract page and pp. 1-6 [online]. Retrieved on Sep. 2, 2003. Retrieved from the Internet:<URL:http://www.hpl.hp.com/techreports/2002/HPL-2002-172.pdf>.
Bennett, Charles, Li, M. and Ma, B., “Linking Chain Letters”, pp. 1-7 [online]. Retrieved on Sep. 2, 2003. Retrieved from the Internet: <URL:http://www.math.uwaterloo.ca/˜mli/chain9.ps>.
Bennett, Charles H., Li, M. and Ma, B., “Chain Letters & Evolutionary Histories”, Scientific American, Jun. 2003, pp. 76-81.
McCorkendale Bruce
Sobel William E.
Gunnison McKay & Hodgson, L.L.P.
Hodgson Serge J.
Khoshnoodi Nadia
Moise Emmanuel L
Symantec Corporation
LandOfFree
Detection and blocking of malicious code does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Detection and blocking of malicious code, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detection and blocking of malicious code will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4046585