Binary state machine system and method for REGEX processing...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S164000, C713S188000, C714S039000, C714S819000

Reexamination Certificate

active

06880087

ABSTRACT:
A binary state machine system and method for REGEX processing of a data stream in an intrusion detection system are disclosed. The method comprises maintaining a state table. The state table is indexed such that inputs comprising a current state and a current character yield an output of a new state. The new state is related to an indication of an attack on a computer network. The method further includes maintaining the current state. An input stream comprising a plurality of characters is received. A first character of the input stream is selected as the current character. The current character and the current state are compared to the state table to generate a new state.

REFERENCES:
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5101402 (1992-03-01), Chiu et al.
patent: 5278901 (1994-01-01), Shieh et al.
patent: 5319776 (1994-06-01), Hile et al.
patent: 5375248 (1994-12-01), Lemay et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5448724 (1995-09-01), Hayashi
patent: 5452442 (1995-09-01), Kephart
patent: 5488715 (1996-01-01), Wainwright
patent: 5488719 (1996-01-01), Kaplan et al.
patent: 5524238 (1996-06-01), Miller et al.
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5586266 (1996-12-01), Hershey et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5699513 (1997-12-01), Feigen et al.
patent: 5793763 (1998-08-01), Mayes et al.
patent: 5796942 (1998-08-01), Esbensen
patent: 5798706 (1998-08-01), Kraemer et al.
patent: 5805801 (1998-09-01), Holloway et al.
patent: 5826014 (1998-10-01), Coley et al.
patent: 5919257 (1999-07-01), Trostle
patent: 5931946 (1999-08-01), Terada et al.
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6078924 (2000-06-01), Ainsbury et al.
patent: 6205551 (2001-03-01), Grosse
“Preliminary Report on Advanced Security Audit Trail Analysis on UNIX,” N. Habra et al., pp. 1-34 (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Sep. 1994.
“IDIOT-Users Guide,” M. Crosbie, et al., pp. 1-63, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Sep. 1996.
“An Introduction to Intrusion Detection,” A. Sundaram, pp. 1-10, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Apr. 1996.
“Use of A Taxonomy of Security Faults,” T. Aslam, et al., pp. 1-10, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Sep. 1996.
“Artificial Intelligence and Intrusion Detection: Current and Future Directions,” Jeremy Frank, pp. 1-12, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Jun. 1994.
“ASAX Conceptual Overview,” ASAX Brochure, A. Mounji, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), 1992.
“GrlDS-A Graph Based Intrusion Detection System For Large Networks,” S. Staniford-Chen, et al., 10 pages, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), 1996.
“A Pattern Matching Model For Misuse Intrusion Detection,” S. Kumar, et al., pp. 1-11, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Jun. 1994.
“An Application of Pattern Matching in Intrusion Detection”, S. Kumar, et al., pp. 1-55, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Mar. 1994.
“A Software Architecture to Support Misuse Intrusion Detection”, S. Kumar, et al., pp. 1-17, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), 1995.
“Applying Genetic Programming to Intrusion Detection”, M. Crosbie, et al., pp. 1-8, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Nov. 1995.
“Defending a Computer System Using Autonomous Agents”, M. Crosbie, et al., pp. 1-11, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Mar. 1994.
“Analysis Of An Algorithm For Distributed Recognition And Accountability”, C. Ko, et al., pp. 1-11, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), 1993.
“A Standard Audit Trail Format”, Matt Bishop, Proc. of the 1995 NISSC, Baltimore, MD., (found at http://www.seclab.cs.ucdavis.edu/papers.html), 1995.
Master Thesis entitled USTAT A Real-time Intrusion Detection System for UNIX, University of California, K. Ilgun, pp. 1-204, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Nov. 1992.
“A Weakness in the 4.2BSD Unix TCP/IP Software”, R. Morris, 4 pages, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Feb. 1985.
“The Architecture and Implementation of Network-Layer Security Under Unix”, J. Ioannidis, et al., 11 pages, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Oct. 1993.
“A Best-Case Network Performance Model”, S.M. Bellovin, pp. 1-10, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Feb. 1992.
“OARnet Security Procedures”, K. Varadhan, pp. 1-14, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Sep. 1992.
“Paving The Road To Network Security Or The Value Of Small Cobblestones”, H. Orman, et al., pp. 1-17, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), May 1994.
“Packets Found on an Internet”, S. Bellovin, pp. 1-6, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Aug. 1993.
“Security Problems in the TCP/IP Protocol Suite”, S.M. Bellovin, (reprinted from Computer Communication Review, vol. 19, No. 2, pp. 32-48) pp. 1-17, Apr. 1989.
“A Security Analysis of the NTP Protocol”, Matt Bishop, pp. 1-20, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), 1990.
“WAN-hacking with AutoHack-Auditing Security Behind the Firewall”, Alec Muffett, 14 pages, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Jun. 1995.
“ACMAINT: An Account Creation and Maintenance System for Distributed UNIX Systems”, D.A. Curry, et al., pp. 1-9, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Oct. 1990.
“NFS Tracing By Passive Network Monitoring”, Matt Blaze, 11 pages, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), 1992.
“Pseudo-Network Drivers and Virtual Networks”, S.M. Bellovin, 15 pages, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Jan. 1990.
Masters Thesis entitled “Addressing Weaknesses In The Domain Name System Protocol”, Purdue University, Christoph Schuba, pp. 1-87., (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Aug. 1993.
“Countering Abuse of Name-Based Authentication”, C.L. Schuba, et al., pp. 1-21., (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Apr. 1994.
“The ‘Session Tty’ Manager”, S.M. Bellovin, pp. 1-16, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Summer 1988.
“Secure RPC Authentication (SRA) for Telnet and FTP”, D.R. Safford, et al., pp. 1-5 (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), 1993.
“A Reliable and Secure UNIX Connection Service”, D. Draheim, et al., pp. 1-12, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), 1987.
“TCP Wrapper Network Monitoring, Access Control, and Booby Traps”, Wietse Venema, 8 pages., (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), 1992.
“Characteristics of Wide-Area TCP/IP Conversations”, R. Cáceres, et al., pp. 1-12, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Sep. 1991.
“A Unix Network Protocol Security Study: Network Information Service”, D.K. Hess, et al., 5 pages, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), 1992.
“Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection”, T.H. Ptacek et al., pp. 1-63, Jan. 1998.
“A Method to De

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Binary state machine system and method for REGEX processing... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Binary state machine system and method for REGEX processing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Binary state machine system and method for REGEX processing... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3439642

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.