Determining a source of malicious computer element in a...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000, C726S024000, C726S025000

Reexamination Certificate

active

07958557

ABSTRACT:
In certain embodiments, a method for tagging communications from a user system, such that a source of a malicious computer element in a computer network may be determined, includes determining tag information for a user system in the computer network, the tag information physically identifying the user system. The method further includes detecting an attempt to send a communication from the user system and, in response to detecting the attempt to send a communication from the user system, attaching the tag information to the communication prior to sending the communication from the user system. The attachment of the tag information to the communication allows the source of the communication to be determined in response to determining that the communication is associated with a malicious computer element, the source comprising the user system.

REFERENCES:
patent: 6477648 (2002-11-01), Schell et al.
patent: 7152105 (2006-12-01), McClure et al.
patent: 7672293 (2010-03-01), Gooch et al.
patent: 7752324 (2010-07-01), Hamadeh et al.
patent: 2003/0110379 (2003-06-01), Ylonen et al.
patent: 2005/0177868 (2005-08-01), Kwan
patent: 2005/0182959 (2005-08-01), Petry et al.
patent: 2006/0015584 (2006-01-01), Ocko et al.
patent: 2006/0098654 (2006-05-01), Tingle et al.
patent: 2006/0137009 (2006-06-01), Chesla
patent: 2006/0184632 (2006-08-01), Marino et al.
patent: 2006/0184690 (2006-08-01), Milliken
patent: 2006/0256729 (2006-11-01), Chen et al.
patent: 2007/0192862 (2007-08-01), Vermeulen et al.
patent: 2008/0127338 (2008-05-01), Cho et al.
patent: 2009/0013043 (2009-01-01), Tan
Stefan Savage, David, Wetherall, Anna Karlin and Tom Anderson; Practical Network Support for IP Traceback; Year 2000, ACM.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Determining a source of malicious computer element in a... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Determining a source of malicious computer element in a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Determining a source of malicious computer element in a... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2741829

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.