Detecting method for network intrusion

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000, C709S224000, C708S204000, C708S205000, C708S530000, C706S046000, C706S047000

Reexamination Certificate

active

08037533

ABSTRACT:
A detecting method for network intrusion includes: selecting a plurality of features contained within plural statistical data by a data-transforming module; normalizing a plurality of feature values of the selected features into the same scale to obtain a plurality of normalized feature data; creating at least one feature model by a data clustering technique incorporated with density-based and grid-based algorithms through a model-creating module; evaluating the at least one feature model through a model-identifying module to select a detecting model; and detecting whether a new packet datum belongs to an intrusion instance or not by a detecting module.

REFERENCES:
patent: 5864679 (1999-01-01), Kanai et al.
patent: 6134664 (2000-10-01), Walker
patent: 6769006 (2004-07-01), Krouglov et al.
patent: 7080250 (2006-07-01), Calvert
patent: 7089592 (2006-08-01), Adjaoute
patent: 7174344 (2007-02-01), Campos et al.
patent: 7567922 (2009-07-01), Weinberg et al.
patent: 7724963 (2010-05-01), Kravec et al.
patent: 7747624 (2010-06-01), Campos et al.
patent: 7788722 (2010-08-01), Njemanze et al.
patent: 7853542 (2010-12-01), Tsai et al.
patent: 2005/0038839 (2005-02-01), Ghosh et al.
patent: 2009/0094175 (2009-04-01), Provos et al.
patent: 2009/0292802 (2009-11-01), Popescu et al.
patent: 2010/0071061 (2010-03-01), Crovella et al.
patent: 2010/0082513 (2010-04-01), Liu
patent: 2011/0040758 (2011-02-01), Tsai et al.
patent: I268685 (1993-10-01), None
patent: WO 02/27443 (2002-04-01), None
Gao et al., “A Framework for an Adaptive Anomaly Detection System with Fuzzy Data Mining”. 2006, Wuhan University Journal of Natural Sciences, vol. 11, No. 6, pp. 1797-1800.
Kumar et al., “The use of artificial intelligence based techniques for intrusion detection: a review”. Sep. 2010, The Artificial Intelligence Review, vol. 34, Iss. 4, pp. 369-387.
Mukkamala et al., “Identifying Significant Features for Network Forensic Analysis Using Artificial Intelligent Techniques”. 2003, International Journal of Digital Evidence, vol. 1, Issue 4.
Yang et al. “Learning Vector Quantization Neural Network Method for Network Intrusion Detection.” Wuhan University Journal of Natural Sciences. vol. 12, No. 1, 2007, pp. 147-150.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Detecting method for network intrusion does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Detecting method for network intrusion, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detecting method for network intrusion will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4284496

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.