Automated change detection within a network environment

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S012000, C713S153000, C709S223000, C709S246000

Reexamination Certificate

active

07810151

ABSTRACT:
A correlation database stores profiling data that describes packet flows within a network. A network device presents a user interface by which a user defines a database trigger to detect database operations that change to the profiling data stored within the correlation database. The network device may maintain a log to record the detected database operations. The database trigger may specify a combination of low-level network elements associated with the packet flows and application-layer elements extracted from application-layer communications reassembled from the packet flows.

REFERENCES:
patent: 5787253 (1998-07-01), McCreery et al.
patent: 6219786 (2001-04-01), Cunningham et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6499107 (2002-12-01), Gleichauf et al.
patent: 6507834 (2003-01-01), Kabra et al.
patent: 6751728 (2004-06-01), Gunter et al.
patent: 6772345 (2004-08-01), Shetty
patent: 6789116 (2004-09-01), Sarkissian et al.
patent: 6918034 (2005-07-01), Sengodan et al.
patent: 7007301 (2006-02-01), Crosbie et al.
patent: 7017186 (2006-03-01), Day
patent: 7065657 (2006-06-01), Moran
patent: 7076803 (2006-07-01), Bruton, III et al.
patent: 7089428 (2006-08-01), Farley et al.
patent: 7100201 (2006-08-01), Izatt
patent: 7174566 (2007-02-01), Yadav
patent: 7222366 (2007-05-01), Bruton, III et al.
patent: 7234168 (2007-06-01), Gupta et al.
patent: 7240368 (2007-07-01), Roesch et al.
patent: 7277404 (2007-10-01), Tanzella et al.
patent: 7308715 (2007-12-01), Gupta et al.
patent: 7322044 (2008-01-01), Hrastar
patent: 7324447 (2008-01-01), Morford
patent: 7324804 (2008-01-01), Hrastar et al.
patent: 7331061 (2008-02-01), Ramsey et al.
patent: 7383577 (2008-06-01), Hrastar et al.
patent: 2002/0078370 (2002-06-01), Tahan
patent: 2002/0144156 (2002-10-01), Copeland, III
patent: 2002/0198981 (2002-12-01), Corl, Jr. et al.
patent: 2003/0065953 (2003-04-01), Lehmann et al.
patent: 2003/0105976 (2003-06-01), Copeland, III
patent: 2003/0154399 (2003-08-01), Zuk et al.
patent: 2003/0182580 (2003-09-01), Lee
patent: 2003/0204632 (2003-10-01), Willebeek-LeMair et al.
patent: 2003/0212903 (2003-11-01), Porras et al.
patent: 2003/0217289 (2003-11-01), Ammon et al.
patent: 2003/0236990 (2003-12-01), Hrastar et al.
patent: 2004/0025044 (2004-02-01), Day
patent: 2004/0034800 (2004-02-01), Singhal et al.
patent: 2004/0044912 (2004-03-01), Connary et al.
patent: 2004/0083299 (2004-04-01), Dietz et al.
patent: 2004/0151382 (2004-08-01), Stellenberg et al.
patent: 2004/0255167 (2004-12-01), Knight
patent: 2005/0044406 (2005-02-01), Stute
patent: 2006/0117386 (2006-06-01), Gupta et al.
www.ethereal.com, retrieved from the Internet Archive WayBackMachine, indexed Jan. 1, 2004.
U.S. Patent Applicaton entitled “Application-Layer Monitoring and Profiling Network Traffic”, U.S. Appl. No. 11/044,619, filed Jan. 27, 2005.
U.S. Patent Application entitled “Compound Attack Detection in a Computer Network”, U.S. Appl. No. 11/045,572, filed Jan. 27, 2005.
U.S. Patent Application entitled “Detection and Prevention of Encapsulated Network Attacks Using an Intermediate Device”, U.S. Appl. No. 11/049,620, filed Feb. 2, 2005.
U.S. Patent Application entitled “Remote Aggregation of Network Traffic Profiling Data”, U.S. Appl. No. 11/044,481, filed Jan. 27, 2005.
U.S. Patent Application entitled “Identification of Network Policy Violations”, U.S. Appl. No. 11/044,332, filed Jan. 27, 2005.
“Norton Internet Security™ 2003 User's Guide,” 2002, Symantec Corporation.
Office Action for U.S. Appl. No. 11/044,481, dated Nov. 9, 2009, 15 pp.
Response to Office Action dated Nov. 9, 2009, for U.S. Appl. No. 11/044,481, filed Feb. 9, 2010, 13 pp.
Reflex Security, Reflex Interceptor 500, Jan 29, 2004 http://web.archive.org/web/20040605205639/http://reflexsecurity.com/documents/ReflexInterceptor-500V32004-01-29.pdf, 2 pp.
Reflex Security, Reflex Intrusion Prevention System, May 7, 2004, 11 pp.
Brugger, “Data Mining Methods for Network Intrusion Detection,” Jun. 9, 2004, 65 pp.
Office Action for U.S. Appl. No. 11/045,572, dated Nov. 12, 2009, 25 pp.
Response to Office Action dated Nov. 12, 2009, for U.S. Appl. No. 11/045,572, filed Feb. 12, 2010, 15 pp.
Notice of Allowance in U.S. Appl. No. 11/044,619, mailed Dec. 15, 2009, 8 pp.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Automated change detection within a network environment does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Automated change detection within a network environment, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Automated change detection within a network environment will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4228512

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.