Data processing: database and file management or data structures – Database design – Data structure types
Reexamination Certificate
2011-03-08
2011-03-08
Saeed, Usmaan (Department: 2166)
Data processing: database and file management or data structures
Database design
Data structure types
C707S802000
Reexamination Certificate
active
07904479
ABSTRACT:
Computer program products and methods of inspecting a log of security records in a computer network are provided. The method includes retrieving a log record, processing the log record including deriving a key to a table, determining a data value from information in the log record and adding the data value to a list of data values associated with the key if the data value is unique. One or more entries of the table are evaluated based on predetermined criteria to detect attempted security breaches.
REFERENCES:
patent: 5418947 (1995-05-01), Hsu et al.
patent: 5430871 (1995-07-01), Jamoussi et al.
patent: 5842196 (1998-11-01), Agarwal et al.
patent: 5907848 (1999-05-01), Zaiken et al.
patent: 6061692 (2000-05-01), Thomas et al.
patent: 6233686 (2001-05-01), Zenchelsky et al.
patent: 6341130 (2002-01-01), Lakshman et al.
patent: 6374264 (2002-04-01), Bohannon et al.
patent: 6496935 (2002-12-01), Fink et al.
patent: 6546388 (2003-04-01), Edlund et al.
patent: 6651243 (2003-11-01), Berry et al.
patent: 6718324 (2004-04-01), Edlund et al.
patent: 6769074 (2004-07-01), Vaitzblit
patent: 6775831 (2004-08-01), Carrasco et al.
patent: 6816455 (2004-11-01), Goldberg et al.
patent: 7296070 (2007-11-01), Sweeney et al.
patent: 7325002 (2008-01-01), Zuk
patent: 7512810 (2009-03-01), Ryan
patent: 7779021 (2010-08-01), Smith et al.
patent: 2002/0138762 (2002-09-01), Horne
patent: 2003/0033531 (2003-02-01), Hanner
patent: 2003/0041125 (2003-02-01), Salomon
patent: 2003/0154399 (2003-08-01), Zuk et al.
patent: 2003/0154402 (2003-08-01), Pandit et al.
patent: 2003/0206100 (2003-11-01), Richman et al.
patent: 2004/0078568 (2004-04-01), Pham et al.
patent: 2004/0148382 (2004-07-01), Narad et al.
patent: 2004/0199535 (2004-10-01), Zuk
patent: 2004/0261030 (2004-12-01), Nazzai
patent: 2005/0190694 (2005-09-01), Ben-Nun et al.
patent: 2006/0106860 (2006-05-01), Dee et al.
patent: 2002-124996 (2002-04-01), None
patent: WO 02/27443 (2002-04-01), None
patent: WO 02/091700 (2002-11-01), None
PCT International Search Report, Aug. 12, 2004, 4 pages.
Solar Designer: “Designing and Attacking Port Scan Detection Tools,” Phrack Magazine, Online, vol. 8, No. 53, Jul. 8, 1998, 11 pages, XP-002291942.
R. Sedgewick: “Chapter Fourteen—Hashing,” Algorithms in C—Third Edition, 1998, pp. 573-608.
Harrity & Harrity LLP
Juniper Networks, Inc.
Saeed Usmaan
LandOfFree
Detection of network security breaches based on analysis of... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Detection of network security breaches based on analysis of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Detection of network security breaches based on analysis of... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2630731