Attack defending system and attack defending method

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S011000, C713S182000, C713S187000, C713S188000

Reexamination Certificate

active

07464407

ABSTRACT:
An attack defending system allows effective defense against attacks from external networks even when a communication system uses a communication path encryption technique such as SSL. A firewall device and a decoy device are provided. The firewall device refers to the header of an input IP packet and, when it is determined that the input IP packet is suspicious, it is guided into the decoy device. The decoy device monitors a process providing a service to detect the presence or absence of attacks. When an attack has been detected, an alert including the attack-source IP address is sent to the firewall device so as to reject subsequent packets from attack source.

REFERENCES:
patent: 7010698 (2006-03-01), Sheymov
patent: 2002/0166063 (2002-11-01), Lachman et al.
patent: A 8-44642 (1996-02-01), None
patent: A 9-224053 (1997-08-01), None
patent: 10-164064 (1998-06-01), None
patent: A 2000-261483 (2000-09-01), None
patent: A 2001-350678 (2001-12-01), None
patent: A 2002-7234 (2002-01-01), None
patent: 2002-155281 (2002-05-01), None
patent: 2003-173300 (2003-06-01), None
patent: 2003-258910 (2003-09-01), None
patent: 2003-264595 (2003-09-01), None
patent: 2004-229091 (2004-08-01), None
patent: WO 01/84285 (2001-11-01), None
Takada et al., 98-CSEC-1-9, Concerning the System Log Collection Function Which Considers Inappropriate Access, Information Processing Academic Research Report, May 29, 1998, vol. 98, No. 54, pp. 47-52, Abstract Only.
LM-020, Masayuki Nakae et al., “An Intrusion Prevention System Model via Access Redirection and Behavior Monitoring”, Internet Systems Res. Labs., NEC Corp., 2003, pp. 369-370.
Statement of Relevance Only.
Takada et al., 98-CSEC-1-9, Concerning the System Log Collection Function Which Considers Inappropriate Access, Information Processing Academic Research Report, May 29, 1998, vol. 98, No. 54, pp. 47-52.
Asaka et al., “Remote Attack Detection Method in IDA: MLSI-Based Intrusion Detection with Discriminant Analysis”, Electronic Information Communication Academic Treatise Journal (J85-B), Jan. 1, 2002, No. 1, pp. 60-74. Statement of Revelance Only.
Andou et al., “Increasing Security with Free Software”, Nikkei Internet Technology, May 22, 1999, No. 23, pp. 125-143.
Taguchi et al., 6G-4, Investigation of the Log Collection Function which Focused on Traces, 57th(2thhalf of 1998), National Symposium Treatise Collection (3), Oct. 7, 1998, pp. 3-514 to 3-515. Statement of Relevance Only.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Attack defending system and attack defending method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Attack defending system and attack defending method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Attack defending system and attack defending method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4042506

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.