Detecting and countering malicious code in enterprise networks

Electrical computers and digital processing systems: support – Computer virus detection by cryptography

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S002000, C726S003000, C726S014000, C726S022000, C726S023000, C726S024000, C726S025000, C713S164000

Reexamination Certificate

active

07934103

ABSTRACT:
A system and method for detecting and countering malicious code in an enterprise network are provided. A pattern recognition processor monitors local operations on a plurality of local machines connected through an enterprise network, to detect irregular local behavior patterns. An alert may be generated after an irregularity in behavior pattern on a local machine is detected. Irregular behavior alerts from a plurality of local machines are analyzed. If similar alerts are received from at least a threshold number of local machines over a corresponding period of time, one or more countermeasure operations are selected based on the analysis of the irregular behavior alerts. The selected countermeasure operations are communicated to the local machines and performed by the local machines.

REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6711615 (2004-03-01), Porras et al.
patent: 6714513 (2004-03-01), Joiner et al.
patent: 6789202 (2004-09-01), Ko et al.
patent: 6792546 (2004-09-01), Shanklin et al.
patent: 6892227 (2005-05-01), Elwell et al.
patent: 6910134 (2005-06-01), Maher et al.
patent: 7269851 (2007-09-01), Ackroyd
patent: 7389539 (2008-06-01), Kouznetsov
patent: 2003/0140253 (2003-07-01), Crosbie et al.
patent: 2003/0163729 (2003-08-01), Buchegger
patent: 2003/0188189 (2003-10-01), Desai et al.
patent: 2007/0234426 (2007-10-01), Khanolkar et al.
patent: 2010/0122317 (2010-05-01), Yadav
patent: WO 02/06928 (2002-01-01), None
patent: WO0206928 (2002-01-01), None
Savage, Locking The Doors—Denial of Service Attacks and Viruses, CRN 2000, n 913, p. 72.
Bassham Lawrence E. et al., Threat Assessment of Malicious Code and Human Computer Threats, (Japanese Polymer Science and (Japanese Polymer Science and Technology), Society of Polymer Science, No. 4939, Oct. 1992, pp. 1-2.
EPO Communication pursuant to Article 94(3) EPC; Ref. HCD/J00046984EP; Application No. 03 719 797.7-2413, Nov. 10, 2008.
Bassham L E et al: “Threat Assessment of Malicious Code and Human Computer Threats” Kobunshi Ronbunshu (Japanese Polymer Science and Technology), Society of Polymer Science. Tokyo, JP No. 4939, Oct. 1992, pp. 1-12, XP002952539 ISSN: 0386-2186.
Communication pursuant to Article 96(2) EPC, Application No. 03 719 797.7-2413, 4 pages, Feb. 6, 2007.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Detecting and countering malicious code in enterprise networks does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Detecting and countering malicious code in enterprise networks, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting and countering malicious code in enterprise networks will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2624955

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.