Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2003-08-20
2008-12-09
Brown, Christopher J (Department: 2134)
Information security
Monitoring or scanning of software or data including attack...
C726S011000, C713S182000, C713S187000, C713S188000
Reexamination Certificate
active
07464407
ABSTRACT:
An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall device and a decoy device are provided. The firewall device refers to the header of an input IP packet and, when it is determined that the input IP packet is suspicious, it is guided into the decoy device. The decoy device monitors a process providing a service to detect the presence or absence of attacks. When an attack has been detected, an alert including the attack-source IP address is sent to the firewall device so as to reject subsequent packets from attack source.
REFERENCES:
patent: 7010698 (2006-03-01), Sheymov
patent: 2002/0166063 (2002-11-01), Lachman et al.
patent: A 8-44642 (1996-02-01), None
patent: A 9-224053 (1997-08-01), None
patent: 10-164064 (1998-06-01), None
patent: A 2000-261483 (2000-09-01), None
patent: A 2001-350678 (2001-12-01), None
patent: A 2002-7234 (2002-01-01), None
patent: 2002-155281 (2002-05-01), None
patent: 2003-173300 (2003-06-01), None
patent: 2003-258910 (2003-09-01), None
patent: 2003-264595 (2003-09-01), None
patent: 2004-229091 (2004-08-01), None
patent: WO 01/84285 (2001-11-01), None
Takada et al., 98-CSEC-1-9, Concerning the System Log Collection Function Which Considers Inappropriate Access, Information Processing Academic Research Report, May 29, 1998, vol. 98, No. 54, pp. 47-52, Abstract Only.
LM-020, Masayuki Nakae et al., “An Intrusion Prevention System Model via Access Redirection and Behavior Monitoring”, Internet Systems Res. Labs., NEC Corp., 2003, pp. 369-370.
Statement of Relevance Only.
Takada et al., 98-CSEC-1-9, Concerning the System Log Collection Function Which Considers Inappropriate Access, Information Processing Academic Research Report, May 29, 1998, vol. 98, No. 54, pp. 47-52.
Asaka et al., “Remote Attack Detection Method in IDA: MLSI-Based Intrusion Detection with Discriminant Analysis”, Electronic Information Communication Academic Treatise Journal (J85-B), Jan. 1, 2002, No. 1, pp. 60-74. Statement of Revelance Only.
Andou et al., “Increasing Security with Free Software”, Nikkei Internet Technology, May 22, 1999, No. 23, pp. 125-143.
Taguchi et al., 6G-4, Investigation of the Log Collection Function which Focused on Traces, 57th(2thhalf of 1998), National Symposium Treatise Collection (3), Oct. 7, 1998, pp. 3-514 to 3-515. Statement of Relevance Only.
Nakae Masayuki
Yamagata Masaya
Brown Christopher J
NEC Corporation
Young & Thompson
LandOfFree
Attack defending system and attack defending method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Attack defending system and attack defending method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Attack defending system and attack defending method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4042506