Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2003-08-26
2008-08-26
Moazzami, Nasser (Department: 2136)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C726S022000, C713S188000, C709S224000
Reexamination Certificate
active
07418733
ABSTRACT:
Network devices such as intrusion detection systems, routers, firewalls, servers, and other network devices are monitored to aggregate all event data generated by monitored devices to provide a threat ranking of all network activity. A threat level for a given host is determined by a threat weighting assigned to that host and a threat weighting assigned to that host's netblock. In addition, a vulnerability for a given event is determined by the event's destination threat associated with a vulnerability value indexed by the event's destination and the event's type.
REFERENCES:
patent: 6928556 (2005-08-01), Black et al.
patent: 7089428 (2006-08-01), Farley et al.
patent: 7152105 (2006-12-01), McClure et al.
patent: 2001/0039579 (2001-11-01), Trcka et al.
patent: 2002/0032871 (2002-03-01), Malan et al.
patent: 2002/0066034 (2002-05-01), Schlossberg et al.
patent: 2002/0107953 (2002-08-01), Ontiveros et al.
patent: 2002/0112185 (2002-08-01), Hodges
patent: 2003/0084349 (2003-05-01), Friedrichs et al.
patent: 2003/0177389 (2003-09-01), Albert et al.
Mukherjee, Biswanath et al., Network Intrusion Detection, IEEE Networth, May/Jun. 1994, pp. 26-41.
Ye, Nong, et al., Probabilistic Techniques for Intrusion Detection Based on Computer Audit Data, IEEE Transactions on Systems, Man, and Cybernetics—Part A: Systems and Humans, vol. 31, No. 4, Jul. 2001, pp. 266-274.
Erbacher, Robert F. et al., Intrusion and Misuse Detection in Large-Scale Systems, IEEE Computer Graphics and Applications, Jan./Feb. 2002, pp. 38-48.
Buck Darin J.
Caldwell Matthew F.
Connary Iven
Hughes Robert T.
Dreier LLP
International Business Machines - Corporation
Moazzami Nasser
Ostrow Seth H.
Yalew Fikremariam
LandOfFree
Determining threat level associated with network activity does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Determining threat level associated with network activity, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Determining threat level associated with network activity will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4011706