Information security – Access control or authentication – Network
Reexamination Certificate
2011-06-07
2011-06-07
Brown, Christopher J (Department: 2439)
Information security
Access control or authentication
Network
C726S013000, C726S021000
Reexamination Certificate
active
07958549
ABSTRACT:
An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall device and a decoy device are provided. The firewall device refers to the header of an input IP packet and, when it is determined that the input IP packet is suspicious, it is guided into the decoy device. The decoy device monitors a process providing a service to detect the presence or absence of attacks. When an attack has been detected, an alert including the attack-source IP address is sent to the firewall device so as to reject subsequent packets from attack source.
REFERENCES:
patent: 7010698 (2006-03-01), Sheymov
patent: 7272625 (2007-09-01), Hannel et al.
patent: 2002/0166063 (2002-11-01), Lachman et al.
patent: 60-110001 (1985-06-01), None
patent: 07-306794 (1995-11-01), None
patent: 844642 (1996-02-01), None
patent: 09-204385 (1997-08-01), None
patent: 9224053 (1997-08-01), None
patent: 10-164064 (1998-06-01), None
patent: 2000-261483 (2000-09-01), None
patent: 2000261483 (2000-09-01), None
patent: 2000-354034 (2000-12-01), None
patent: 2001-057554 (2001-02-01), None
patent: 2001350678 (2001-12-01), None
patent: 2002-152281 (2002-05-01), None
patent: 2003173300 (2003-06-01), None
patent: 2003-258910 (2003-09-01), None
patent: 2003264595 (2003-09-01), None
patent: 2003-309607 (2003-10-01), None
patent: 2003-531430 (2003-10-01), None
patent: 2004-507978 (2004-03-01), None
patent: 2004229091 (2007-07-01), None
patent: 01/80480 (2001-10-01), None
patent: WO 01/84285 (2001-11-01), None
patent: 02/19661 (2002-03-01), None
Takada et al., 98-CSEC-1-9, Concerning the System Log Collection Function Which Considers Inappropriate Access, Information Processing Academic Research Report, May 29, 1998, vol. 98, No. 54, pp. 47-52.
Asaka et al., “Remote Attack Detection Method in IDA: MLSI-Based Intrusion Detection with Discriminant Analysis”, Electronic Information Communication Academic Treatise Journal (J85-B), Jan. 1, 2002, No. 1, pp. 60-74.
Andou et al., “Increasing Security with Free Software”, Nikkei Internet Technology, May 22, 1999, No. 23, pp. 125-143.
Taguchi et al., 6G-4, Investigation of the Log Collection Function which Focused on Traces, 57th(2ndhalf of 1998), National Symposium Treatise Collection (3), Oct. 7, 1998, pp. 3-514 to 3-515.
Japanese Patent Office issued a Japanese Office Action dated Jan. 19, 2010, Application No. 2007-179436.
Japanese Patent Office issued a Japanese Office Action dated Aug. 26, 2009, Application No. 2007-179436.
Japanese Patent Office issued a Japanese Office Action dated Jun. 17, 2009, Application No. 2007-179435.
Nakae Masayuki
Yamagata Masaya
Brown Christopher J
NEC Corporation
Young & Thompson
LandOfFree
Attack defending system and attack defending method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Attack defending system and attack defending method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Attack defending system and attack defending method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2692321