Attack defending system and attack defending method

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S013000, C726S021000

Reexamination Certificate

active

07958549

ABSTRACT:
An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall device and a decoy device are provided. The firewall device refers to the header of an input IP packet and, when it is determined that the input IP packet is suspicious, it is guided into the decoy device. The decoy device monitors a process providing a service to detect the presence or absence of attacks. When an attack has been detected, an alert including the attack-source IP address is sent to the firewall device so as to reject subsequent packets from attack source.

REFERENCES:
patent: 7010698 (2006-03-01), Sheymov
patent: 7272625 (2007-09-01), Hannel et al.
patent: 2002/0166063 (2002-11-01), Lachman et al.
patent: 60-110001 (1985-06-01), None
patent: 07-306794 (1995-11-01), None
patent: 844642 (1996-02-01), None
patent: 09-204385 (1997-08-01), None
patent: 9224053 (1997-08-01), None
patent: 10-164064 (1998-06-01), None
patent: 2000-261483 (2000-09-01), None
patent: 2000261483 (2000-09-01), None
patent: 2000-354034 (2000-12-01), None
patent: 2001-057554 (2001-02-01), None
patent: 2001350678 (2001-12-01), None
patent: 2002-152281 (2002-05-01), None
patent: 2003173300 (2003-06-01), None
patent: 2003-258910 (2003-09-01), None
patent: 2003264595 (2003-09-01), None
patent: 2003-309607 (2003-10-01), None
patent: 2003-531430 (2003-10-01), None
patent: 2004-507978 (2004-03-01), None
patent: 2004229091 (2007-07-01), None
patent: 01/80480 (2001-10-01), None
patent: WO 01/84285 (2001-11-01), None
patent: 02/19661 (2002-03-01), None
Takada et al., 98-CSEC-1-9, Concerning the System Log Collection Function Which Considers Inappropriate Access, Information Processing Academic Research Report, May 29, 1998, vol. 98, No. 54, pp. 47-52.
Asaka et al., “Remote Attack Detection Method in IDA: MLSI-Based Intrusion Detection with Discriminant Analysis”, Electronic Information Communication Academic Treatise Journal (J85-B), Jan. 1, 2002, No. 1, pp. 60-74.
Andou et al., “Increasing Security with Free Software”, Nikkei Internet Technology, May 22, 1999, No. 23, pp. 125-143.
Taguchi et al., 6G-4, Investigation of the Log Collection Function which Focused on Traces, 57th(2ndhalf of 1998), National Symposium Treatise Collection (3), Oct. 7, 1998, pp. 3-514 to 3-515.
Japanese Patent Office issued a Japanese Office Action dated Jan. 19, 2010, Application No. 2007-179436.
Japanese Patent Office issued a Japanese Office Action dated Aug. 26, 2009, Application No. 2007-179436.
Japanese Patent Office issued a Japanese Office Action dated Jun. 17, 2009, Application No. 2007-179435.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Attack defending system and attack defending method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Attack defending system and attack defending method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Attack defending system and attack defending method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2692321

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.