Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2011-01-25
2011-01-25
Nguyen, Minh Dieu (Department: 2438)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C709S223000, C709S224000, C726S001000, C726S022000
Reexamination Certificate
active
07877804
ABSTRACT:
A computer system and method for detecting and monitoring network intrusion events from log data received from network service devices in a computer network, the computer system having discrete modules associated with a function performed on the log data received. An event parser in communication with at least one network service device is able to receive log data in real time from the device, and create an event object. An event manager in communication with the event parser is able to receive the event object and evaluate the event object according to at least one predetermined threshold condition such that, when the event object satisfies the predetermined threshold condition, the event manager designates the event object to be broadcast in real time. An event broadcaster in communication with the event manager receives event objects designated by the event manager for broadcast. The event broadcaster transmits the event object in real time as an intrusion alarm.
REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5805801 (1998-09-01), Holloway et al.
patent: 5809497 (1998-09-01), Freund et al.
patent: 5958012 (1999-09-01), Battat et al.
patent: 5987611 (1999-11-01), Freund
patent: 6070244 (2000-05-01), Orchier et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6119236 (2000-09-01), Shipley
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6321338 (2001-11-01), Porras et al.
patent: 6324647 (2001-11-01), Bowman-Amuah
patent: 6347374 (2002-02-01), Drake et al.
patent: 6385609 (2002-05-01), Barshefsky et al.
patent: 6405318 (2002-06-01), Rowland
patent: 6453345 (2002-09-01), Trcka et al.
patent: 6484203 (2002-11-01), Porras et al.
patent: 6553336 (2003-04-01), Johnson et al.
patent: 6704874 (2004-03-01), Porras et al.
patent: 6708212 (2004-03-01), Porras et al.
patent: 6711615 (2004-03-01), Porras et al.
patent: 6839850 (2005-01-01), Campbell et al.
patent: 7143444 (2006-11-01), Porras et al.
patent: 2002/0093527 (2002-07-01), Sherlock et al.
patent: 2005/0185673 (2005-08-01), Campbell et al.
SRI International, “News: SRI International Introduces EMERALD: A Novel Approach to Network Surveillance and Intrusion Detection”, http://www.sdl.sri.com/projects/emerald
ews.html, May 9, 2000.
Kelly Jackson Higgins, “Security Strategies—A Welcome Intrusion- Network managers are taking advantage of the move by security companies to pack intrusion detection into a suite of managed services,” InternetWeek. Manhasset: May 29, 2000., Iss. 815; p. 39.
Scott Blake, Protecting the network neighborhood, Security Management, Arlington: Apr. 2000, vol. 44, Iss. 4; p. 65, 5 pgs.
Amaratunge Dhani
Asthana Rishi
Azim Ozakil
Ghildiyal Amit
Hamid Araf Karsh
DLA Piper (LLP) US
Netforensics, Inc.
Nguyen Minh Dieu
LandOfFree
Comprehensive security structure platform for network managers does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Comprehensive security structure platform for network managers, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Comprehensive security structure platform for network managers will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2661634