Computer worm defense system and method

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000, C726S023000, C726S025000

Reexamination Certificate

active

08006305

ABSTRACT:
A computer worm defense system comprises multiple containment systems tied together by a management system. Each containment system is deployed on a separate communication network and contains a worm sensor and a blocking system. Computer worm identifiers generated by a worm sensor of one containment system can be provided not only to the blocking system of the same containment system, but can also be distributed by the management system to blocking systems of other containment systems.

REFERENCES:
patent: 4292580 (1981-09-01), Ott et al.
patent: 5175732 (1992-12-01), Hendel et al.
patent: 5440723 (1995-08-01), Arnold et al.
patent: 5657473 (1997-08-01), Killean et al.
patent: 5978917 (1999-11-01), Chi
patent: 6269330 (2001-07-01), Cidon et al.
patent: 6298445 (2001-10-01), Shostack
patent: 6357008 (2002-03-01), Nachenberg
patent: 6424627 (2002-07-01), Sørhaug et al.
patent: 6487666 (2002-11-01), Shanklin et al.
patent: 6493756 (2002-12-01), O'Brien et al.
patent: 6550012 (2003-04-01), Villa et al.
patent: 6775657 (2004-08-01), Baker
patent: 6832367 (2004-12-01), Choi et al.
patent: 6898632 (2005-05-01), Gordy
patent: 6981279 (2005-12-01), Arnold et al.
patent: 7007107 (2006-02-01), Ivchenko et al.
patent: 7043757 (2006-05-01), Hoefelmeyer et al.
patent: 7080408 (2006-07-01), Pak
patent: 7093239 (2006-08-01), van der Made
patent: 7100201 (2006-08-01), Izatt
patent: 7159149 (2007-01-01), Spiegel
patent: 7231667 (2007-06-01), Jordan
patent: 7240364 (2007-07-01), Branscomb et al.
patent: 7240368 (2007-07-01), Roesch
patent: 7287278 (2007-10-01), Liang
patent: 7356736 (2008-04-01), Natvig
patent: 7386888 (2008-06-01), Liang et al.
patent: 7392542 (2008-06-01), Bucher
patent: 7418729 (2008-08-01), Szor
patent: 7428300 (2008-09-01), Drew et al.
patent: 7441272 (2008-10-01), Durham
patent: 7458098 (2008-11-01), Judge et al.
patent: 7464407 (2008-12-01), Nakae et al.
patent: 7480773 (2009-01-01), Reed
patent: 7487543 (2009-02-01), Arnold et al.
patent: 7496961 (2009-02-01), Zimmer et al.
patent: 7523493 (2009-04-01), Liang
patent: 7530104 (2009-05-01), Thrower et al.
patent: 7540025 (2009-05-01), Tzadikario
patent: 7565550 (2009-07-01), Liang et al.
patent: 7603715 (2009-10-01), Costa
patent: 7644441 (2010-01-01), Schmidt et al.
patent: 7849506 (2010-12-01), Dansey
patent: 7908660 (2011-03-01), Bahl
patent: 2001/0047326 (2001-11-01), Broadbent et al.
patent: 2002/0018903 (2002-02-01), Kokubo et al.
patent: 2002/0091819 (2002-07-01), Melchione et al.
patent: 2002/0144156 (2002-10-01), Copeland, III
patent: 2002/0162015 (2002-10-01), Tang
patent: 2002/0184528 (2002-12-01), Shevenell et al.
patent: 2002/0188887 (2002-12-01), Largman et al.
patent: 2002/0194490 (2002-12-01), Halperin et al.
patent: 2003/0074578 (2003-04-01), Ford et al.
patent: 2003/0084318 (2003-05-01), Schertz
patent: 2003/0115483 (2003-06-01), Liang
patent: 2003/0188190 (2003-10-01), Aaron
patent: 2003/0200460 (2003-10-01), Morota et al.
patent: 2004/0019832 (2004-01-01), Arnold et al.
patent: 2004/0047356 (2004-03-01), Bauer
patent: 2004/0083408 (2004-04-01), Spiegel
patent: 2004/0111531 (2004-06-01), Staniford
patent: 2004/0165588 (2004-08-01), Pandya
patent: 2004/0243349 (2004-12-01), Greifeneder
patent: 2004/0249911 (2004-12-01), Alkhatib
patent: 2004/0268147 (2004-12-01), Wiederin et al.
patent: 2005/0033960 (2005-02-01), Vialen et al.
patent: 2005/0033989 (2005-02-01), Poletto
patent: 2005/0086523 (2005-04-01), Zimmer et al.
patent: 2005/0091513 (2005-04-01), Mitomo
patent: 2005/0114663 (2005-05-01), Cornell
patent: 2005/0125195 (2005-06-01), Brendel
patent: 2005/0157662 (2005-07-01), Bingham et al.
patent: 2005/0183143 (2005-08-01), Anderholm
patent: 2005/0201297 (2005-09-01), Peikari
patent: 2005/0210533 (2005-09-01), Copeland
patent: 2005/0238005 (2005-10-01), Chen et al.
patent: 2005/0265331 (2005-12-01), Stolfo
patent: 2006/0021054 (2006-01-01), Costa et al.
patent: 2006/0095968 (2006-05-01), Portolani
patent: 2006/0101516 (2006-05-01), Sudaharan
patent: 2006/0101517 (2006-05-01), Banzhof et al.
patent: 2006/0117385 (2006-06-01), Mester et al.
patent: 2006/0123477 (2006-06-01), Raghavan
patent: 2006/0161983 (2006-07-01), Cothrell
patent: 2006/0161987 (2006-07-01), Levy-Yurista
patent: 2006/0184632 (2006-08-01), Marino et al.
patent: 2006/0191010 (2006-08-01), Benjamin
patent: 2006/0221956 (2006-10-01), Narayan et al.
patent: 2007/0006288 (2007-01-01), Mayfield et al.
patent: 2007/0006313 (2007-01-01), Porras et al.
patent: 2007/0016951 (2007-01-01), Piccard
patent: 2007/0033645 (2007-02-01), Jones
patent: 2007/0064689 (2007-03-01), Shin et al.
patent: 2007/0094730 (2007-04-01), Bhikkaji et al.
patent: 2007/0192500 (2007-08-01), Lum
patent: 2007/0192858 (2007-08-01), Lum
patent: 2007/0198275 (2007-08-01), Malden et al.
patent: 2007/0250930 (2007-10-01), Aziz
patent: 2008/0080518 (2008-04-01), Hoeflin et al.
patent: 2008/0120722 (2008-05-01), Sima et al.
patent: 2008/0141376 (2008-06-01), Clausen
patent: 2008/0222729 (2008-09-01), Chen et al.
patent: 2008/0301810 (2008-12-01), Lehane
patent: 2009/0031423 (2009-01-01), Liu et al.
patent: 2009/0083369 (2009-03-01), Marmor
patent: 2009/0089879 (2009-04-01), Wang
patent: 2010/0083376 (2010-04-01), Pereira
patent: 0206928 (2002-01-01), None
patent: WO0223805 (2002-03-01), None
U.S. Appl. No. 11/096,287, Ashar Aziz, System and Method of Detecting Computer Worms, filed Mar. 31, 2005.
U.S. Appl. No. 11/151,812, Ashar Aziz, System and Method of Containing Computer Worms, filed Jun. 13, 2005.
Costa, M. et al. “Vigilante: End-to-End Containment of Internet Worms,” SOSP '05, Oct. 23-26, 2005, Association for Computing Machinery, Inc., Brighton U.K.
Chaudet, C. et al. “Optimal Positioning of Active and Passive Monitoring Devices,” International Conference on Emerging Networking Experiments and Technologies, Proceedings of the 2005 ACM Conference on Emerging Network Experiment and Technology, Oct. 2005, pp. 71-82, CoNEXT '05, Toulousse, France.
Crandall, J.R. et al., “Minos:Control Data Attack Prevention Orthognal to Memory Model,” 37th International Symposium on Microarchitecture, Dec. 2004, Portland, Oregon.
Kim, H. et al., “Autograph: Toward Automated, Distributed Worm Signature Detection,” Proceedings of the 13th Usenix Security Symposium (Security 2004), Aug. 2004, pp. 271-286, San Diego.
Kreibich, C. et al., “Honeycomb—Creating Intrusion Detection Signatures Using Honeypots,” 2nd Workshop on Hot Topics in Networks (HotNets-11), 2003, Boston, USA.
Newsome, J. et al., “Polygraph: Automatically Generating Signatures for Polymorphic Worms,” In Proceedings of the IEEE Symposium on Security and Privacy, May 2005.
Newsome, J. et al., “Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software,” In Proceedings of the 12th Annual Network and Distributed System Security, Symposium (NDSS '05), Feb. 2005.
Singh, S. et al., “Automated Worm Fingerprinting,” Proceedings of the ACM/USENIX Symposium on Operating System Design and Implementation, Dec. 2004, San Francisco, California.
Margolis, P.E., Random House Webster's “Computer & Internet Dictionary 3rd Edition,” ISBN 0375703519, Dec. 1998.
IEEE Xplore Digital Library Search results for “detection of unknown computer worms”. http://ieeexplore.ieee.org/search/searchresult.jsp?SortField=Score&SortOrder=desc&ResultC... Accessed on Aug. 28, 2009.
AltaVista Advanced Search Results. “Event Orchestrator”. http://www.altavista.com/web/results?itag=ody&pg=aq&aqmode=s&aqa=Event+Orchestrator... Accessed on Sep. 3, 2009.
AltaVista Advanced Search Results. “attack vector identifier”. http://www.altavista.com/web/results?itag=ody&pg=aq&aqmode=s&aqa=attack+vector+ide... Accessed on Sep. 15, 2009.
Whyte et al. “DNS-Based Detection of Scannin Works in an Enterprise Network,” Proceedings of the 12th Annual Network and Distributed System Security Symposium,

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computer worm defense system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computer worm defense system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer worm defense system and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2700551

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.