Information security – Access control or authentication – Network
Reexamination Certificate
2005-01-27
2010-10-05
Vu, Kimyen (Department: 2435)
Information security
Access control or authentication
Network
C726S002000, C726S012000, C713S153000, C709S223000, C709S246000
Reexamination Certificate
active
07810151
ABSTRACT:
A correlation database stores profiling data that describes packet flows within a network. A network device presents a user interface by which a user defines a database trigger to detect database operations that change to the profiling data stored within the correlation database. The network device may maintain a log to record the detected database operations. The database trigger may specify a combination of low-level network elements associated with the packet flows and application-layer elements extracted from application-layer communications reassembled from the packet flows.
REFERENCES:
patent: 5787253 (1998-07-01), McCreery et al.
patent: 6219786 (2001-04-01), Cunningham et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6499107 (2002-12-01), Gleichauf et al.
patent: 6507834 (2003-01-01), Kabra et al.
patent: 6751728 (2004-06-01), Gunter et al.
patent: 6772345 (2004-08-01), Shetty
patent: 6789116 (2004-09-01), Sarkissian et al.
patent: 6918034 (2005-07-01), Sengodan et al.
patent: 7007301 (2006-02-01), Crosbie et al.
patent: 7017186 (2006-03-01), Day
patent: 7065657 (2006-06-01), Moran
patent: 7076803 (2006-07-01), Bruton, III et al.
patent: 7089428 (2006-08-01), Farley et al.
patent: 7100201 (2006-08-01), Izatt
patent: 7174566 (2007-02-01), Yadav
patent: 7222366 (2007-05-01), Bruton, III et al.
patent: 7234168 (2007-06-01), Gupta et al.
patent: 7240368 (2007-07-01), Roesch et al.
patent: 7277404 (2007-10-01), Tanzella et al.
patent: 7308715 (2007-12-01), Gupta et al.
patent: 7322044 (2008-01-01), Hrastar
patent: 7324447 (2008-01-01), Morford
patent: 7324804 (2008-01-01), Hrastar et al.
patent: 7331061 (2008-02-01), Ramsey et al.
patent: 7383577 (2008-06-01), Hrastar et al.
patent: 2002/0078370 (2002-06-01), Tahan
patent: 2002/0144156 (2002-10-01), Copeland, III
patent: 2002/0198981 (2002-12-01), Corl, Jr. et al.
patent: 2003/0065953 (2003-04-01), Lehmann et al.
patent: 2003/0105976 (2003-06-01), Copeland, III
patent: 2003/0154399 (2003-08-01), Zuk et al.
patent: 2003/0182580 (2003-09-01), Lee
patent: 2003/0204632 (2003-10-01), Willebeek-LeMair et al.
patent: 2003/0212903 (2003-11-01), Porras et al.
patent: 2003/0217289 (2003-11-01), Ammon et al.
patent: 2003/0236990 (2003-12-01), Hrastar et al.
patent: 2004/0025044 (2004-02-01), Day
patent: 2004/0034800 (2004-02-01), Singhal et al.
patent: 2004/0044912 (2004-03-01), Connary et al.
patent: 2004/0083299 (2004-04-01), Dietz et al.
patent: 2004/0151382 (2004-08-01), Stellenberg et al.
patent: 2004/0255167 (2004-12-01), Knight
patent: 2005/0044406 (2005-02-01), Stute
patent: 2006/0117386 (2006-06-01), Gupta et al.
www.ethereal.com, retrieved from the Internet Archive WayBackMachine, indexed Jan. 1, 2004.
U.S. Patent Applicaton entitled “Application-Layer Monitoring and Profiling Network Traffic”, U.S. Appl. No. 11/044,619, filed Jan. 27, 2005.
U.S. Patent Application entitled “Compound Attack Detection in a Computer Network”, U.S. Appl. No. 11/045,572, filed Jan. 27, 2005.
U.S. Patent Application entitled “Detection and Prevention of Encapsulated Network Attacks Using an Intermediate Device”, U.S. Appl. No. 11/049,620, filed Feb. 2, 2005.
U.S. Patent Application entitled “Remote Aggregation of Network Traffic Profiling Data”, U.S. Appl. No. 11/044,481, filed Jan. 27, 2005.
U.S. Patent Application entitled “Identification of Network Policy Violations”, U.S. Appl. No. 11/044,332, filed Jan. 27, 2005.
“Norton Internet Security™ 2003 User's Guide,” 2002, Symantec Corporation.
Office Action for U.S. Appl. No. 11/044,481, dated Nov. 9, 2009, 15 pp.
Response to Office Action dated Nov. 9, 2009, for U.S. Appl. No. 11/044,481, filed Feb. 9, 2010, 13 pp.
Reflex Security, Reflex Interceptor 500, Jan 29, 2004 http://web.archive.org/web/20040605205639/http://reflexsecurity.com/documents/ReflexInterceptor-500V32004-01-29.pdf, 2 pp.
Reflex Security, Reflex Intrusion Prevention System, May 7, 2004, 11 pp.
Brugger, “Data Mining Methods for Network Intrusion Detection,” Jun. 9, 2004, 65 pp.
Office Action for U.S. Appl. No. 11/045,572, dated Nov. 12, 2009, 25 pp.
Response to Office Action dated Nov. 12, 2009, for U.S. Appl. No. 11/045,572, filed Feb. 12, 2010, 15 pp.
Notice of Allowance in U.S. Appl. No. 11/044,619, mailed Dec. 15, 2009, 8 pp.
Juniper Networks, Inc.
Schwartz Darren
Shumaker & Sieffert P.A.
Vu Kimyen
LandOfFree
Automated change detection within a network environment does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Automated change detection within a network environment, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automated change detection within a network environment will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4228512