Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2008-05-06
2008-05-06
Barron, Gilberto (Department: 2132)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
Reexamination Certificate
active
07370358
ABSTRACT:
A computer security system uses a plurality of co-operating software agents to protect a network against attack. Individual agents at each node the network co-operatively act to detect attacks and to share attack signatures and solutions via a message exchange mechanism. A global internal measurement of the overall health of the group of agents may be used as an indicator of a possible attack. In larger networks, the agents may be formed a plurality of separate autonomous groups, with a common group identity being automatically maintained by the message passing mechanism. Individual groups may be located by a system designer in separate cells or domains within the network, so that if one cell becomes compromised the rest of the network is not affected.
REFERENCES:
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 6393386 (2002-05-01), Zager et al.
patent: 6684329 (2004-01-01), Epstein et al.
patent: 7131142 (2006-10-01), Kay
patent: 0 985 995 (2000-03-01), None
patent: WO 99/57625 (1999-11-01), None
patent: WO 00/38034 (2000-06-01), None
patent: WO 00/54458 (2000-09-01), None
patent: WO 00/70463 (2000-11-01), None
Crosbie et al, “Defending a Computer Using Autonomous Agents”, National Information Systems Security Conference, XX, XX, Oct. 1995, pp. 549-558, XP001059892.
Balasubramaniyan et al, “An Architectur for Intrusion Detection Using Autonomous Agents”, Coast Laboratory, Purdue University, West Lafayette, IN 47907-1398.
Carver, Jr. et al, “A Methodology for Using Intelligent Agents to provide Automated Intrusion Response”, Proceedings of the 2000 IEEE, Workshop on Information Assurance and Security, United States Military Academy, West Point, NY, Jun. 6-7, 2000.
Helmer et al, “Intelligent Agents for Intrusion Detection”, Iowa State University, Ames, Iowa 50011.
He et al, “A Solution to Open Standard of PKI”, Feb. 11, 1998.
Asaka et al, “A Method of Tracing Intruders by Use of Mobile Agents”.
Hofmeyr et al, “Immunity by Design: An Artificial Immune System”.
Carver, Jr. et al, “Adaptation Techniques for Intrusion Detection and Intrusion Response Systems”.
Carver, Jr. et al, A Methodolgy for.
Crosbie et al, “Defending a Computer System Using Autonomous Agents”, National Information Systems Security Conference, Oct. 1995, pp. 549-558.
Barron Gilberto
British Telecommunications public limited company
Lemma Samson
Nixon & Vanderhye P.C.
LandOfFree
Agent-based intrusion detection system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Agent-based intrusion detection system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Agent-based intrusion detection system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2810712