Detection of network security breaches based on analysis of...

Data processing: database and file management or data structures – Database design – Data structure types

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S802000

Reexamination Certificate

active

07904479

ABSTRACT:
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record, processing the log record including deriving a key to a table, determining a data value from information in the log record and adding the data value to a list of data values associated with the key if the data value is unique. One or more entries of the table are evaluated based on predetermined criteria to detect attempted security breaches.

REFERENCES:
patent: 5418947 (1995-05-01), Hsu et al.
patent: 5430871 (1995-07-01), Jamoussi et al.
patent: 5842196 (1998-11-01), Agarwal et al.
patent: 5907848 (1999-05-01), Zaiken et al.
patent: 6061692 (2000-05-01), Thomas et al.
patent: 6233686 (2001-05-01), Zenchelsky et al.
patent: 6341130 (2002-01-01), Lakshman et al.
patent: 6374264 (2002-04-01), Bohannon et al.
patent: 6496935 (2002-12-01), Fink et al.
patent: 6546388 (2003-04-01), Edlund et al.
patent: 6651243 (2003-11-01), Berry et al.
patent: 6718324 (2004-04-01), Edlund et al.
patent: 6769074 (2004-07-01), Vaitzblit
patent: 6775831 (2004-08-01), Carrasco et al.
patent: 6816455 (2004-11-01), Goldberg et al.
patent: 7296070 (2007-11-01), Sweeney et al.
patent: 7325002 (2008-01-01), Zuk
patent: 7512810 (2009-03-01), Ryan
patent: 7779021 (2010-08-01), Smith et al.
patent: 2002/0138762 (2002-09-01), Horne
patent: 2003/0033531 (2003-02-01), Hanner
patent: 2003/0041125 (2003-02-01), Salomon
patent: 2003/0154399 (2003-08-01), Zuk et al.
patent: 2003/0154402 (2003-08-01), Pandit et al.
patent: 2003/0206100 (2003-11-01), Richman et al.
patent: 2004/0078568 (2004-04-01), Pham et al.
patent: 2004/0148382 (2004-07-01), Narad et al.
patent: 2004/0199535 (2004-10-01), Zuk
patent: 2004/0261030 (2004-12-01), Nazzai
patent: 2005/0190694 (2005-09-01), Ben-Nun et al.
patent: 2006/0106860 (2006-05-01), Dee et al.
patent: 2002-124996 (2002-04-01), None
patent: WO 02/27443 (2002-04-01), None
patent: WO 02/091700 (2002-11-01), None
PCT International Search Report, Aug. 12, 2004, 4 pages.
Solar Designer: “Designing and Attacking Port Scan Detection Tools,” Phrack Magazine, Online, vol. 8, No. 53, Jul. 8, 1998, 11 pages, XP-002291942.
R. Sedgewick: “Chapter Fourteen—Hashing,” Algorithms in C—Third Edition, 1998, pp. 573-608.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Detection of network security breaches based on analysis of... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Detection of network security breaches based on analysis of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detection of network security breaches based on analysis of... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2630731

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.