Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2008-01-29
2011-10-11
Flynn, Nathan (Department: 2431)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C726S022000, C709S224000, C708S204000, C708S205000, C708S530000, C706S046000, C706S047000
Reexamination Certificate
active
08037533
ABSTRACT:
A detecting method for network intrusion includes: selecting a plurality of features contained within plural statistical data by a data-transforming module; normalizing a plurality of feature values of the selected features into the same scale to obtain a plurality of normalized feature data; creating at least one feature model by a data clustering technique incorporated with density-based and grid-based algorithms through a model-creating module; evaluating the at least one feature model through a model-identifying module to select a detecting model; and detecting whether a new packet datum belongs to an intrusion instance or not by a detecting module.
REFERENCES:
patent: 5864679 (1999-01-01), Kanai et al.
patent: 6134664 (2000-10-01), Walker
patent: 6769006 (2004-07-01), Krouglov et al.
patent: 7080250 (2006-07-01), Calvert
patent: 7089592 (2006-08-01), Adjaoute
patent: 7174344 (2007-02-01), Campos et al.
patent: 7567922 (2009-07-01), Weinberg et al.
patent: 7724963 (2010-05-01), Kravec et al.
patent: 7747624 (2010-06-01), Campos et al.
patent: 7788722 (2010-08-01), Njemanze et al.
patent: 7853542 (2010-12-01), Tsai et al.
patent: 2005/0038839 (2005-02-01), Ghosh et al.
patent: 2009/0094175 (2009-04-01), Provos et al.
patent: 2009/0292802 (2009-11-01), Popescu et al.
patent: 2010/0071061 (2010-03-01), Crovella et al.
patent: 2010/0082513 (2010-04-01), Liu
patent: 2011/0040758 (2011-02-01), Tsai et al.
patent: I268685 (1993-10-01), None
patent: WO 02/27443 (2002-04-01), None
Gao et al., “A Framework for an Adaptive Anomaly Detection System with Fuzzy Data Mining”. 2006, Wuhan University Journal of Natural Sciences, vol. 11, No. 6, pp. 1797-1800.
Kumar et al., “The use of artificial intelligence based techniques for intrusion detection: a review”. Sep. 2010, The Artificial Intelligence Review, vol. 34, Iss. 4, pp. 369-387.
Mukkamala et al., “Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques”. 2003, International Journal of Digital Evidence, vol. 1, Issue 4.
Yang et al. “Learning Vector Quantization Neural Network Method for Network Intrusion Detection.” Wuhan University Journal of Natural Sciences. vol. 12, No. 1, 2007, pp. 147-150.
Tsai Cheng-Fa
Yen Chia-Chen
Flynn Nathan
Kamrath Alan
Kamrath & Associates PA
National Pingtung University of Science and Technology
Su Sarah
LandOfFree
Detecting method for network intrusion does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Detecting method for network intrusion, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting method for network intrusion will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4284496