Information security – Access control or authentication – Network
Reexamination Certificate
2007-10-24
2010-11-16
Vu, Kimyen (Department: 2435)
Information security
Access control or authentication
Network
C726S011000, C726S023000
Reexamination Certificate
active
07836496
ABSTRACT:
A method for protecting a network from an attack includes measuring a property of traffic entering the network, and analyzing the property using at least one fuzzy logic algorithm in order to detect the attack.
REFERENCES:
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5638490 (1997-06-01), Eckert et al.
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6321338 (2001-11-01), Porras et al.
patent: 6370648 (2002-04-01), Diep
patent: 6453345 (2002-09-01), Trcka et al.
patent: 6487666 (2002-11-01), Shanklin et al.
patent: 6519703 (2003-02-01), Joyce
patent: 6538490 (2003-03-01), Yoshizawa et al.
patent: 6622135 (2003-09-01), Imbert De Tremiolles et al.
patent: 6715084 (2004-03-01), Aaron et al.
patent: 6795402 (2004-09-01), Richardson et al.
patent: 6816910 (2004-11-01), Ricciulli
patent: 7017186 (2006-03-01), Day
patent: 7028179 (2006-04-01), Anderson et al.
patent: 7058976 (2006-06-01), Dark
patent: 7222366 (2007-05-01), Bruton et al.
patent: 7308715 (2007-12-01), Gupta et al.
patent: 7370357 (2008-05-01), Sekar
patent: 7454499 (2008-11-01), Cantrell et al.
patent: 2002/0083175 (2002-06-01), Afek et al.
patent: 2002/0103916 (2002-08-01), Chen et al.
patent: 2002/0107953 (2002-08-01), Ontiveros et al.
patent: 2002/0133586 (2002-09-01), Shanklin et al.
patent: 2003/0014665 (2003-01-01), Anderson et al.
patent: 2003/0145232 (2003-07-01), Poletto et al.
patent: 2004/0025044 (2004-02-01), Day
patent: 2004/0093513 (2004-05-01), Cantrell et al.
patent: 2004/0098617 (2004-05-01), Sekar
patent: 2004/0162994 (2004-08-01), Cohen et al.
patent: 2004/0196792 (2004-10-01), Davies et al.
patent: 2005/0111460 (2005-05-01), Sahita
patent: 2003218949 (2003-07-01), None
Stevens, W. Richard et al. TCP/IP Illustrated, vol. 2: The Implementation. © 1995 Addison Wesley Professional. excerpt from pp. 758-760.
Mguyen HT et al., A First Course in Fuzzy Logic, Second Edition, CRC Press (Jul. 1999).
Fuzzy Logic Toolbox for Use with MATLABÒ, User's Guide Version 2, The Math Works, Inc., Natick, MA (Jul. 2002).
Hines JW, Fuzzy and Neural Approaches in Engineering, Wile-Interscience (Jan. 1997).
J.E. Dickerson, et al.; Fuzzy Network Profiling for Intrusion Detection; Proc. of NAFIPS 10th Int. Conf. of the North American Fuzzy Information Processing Society; pp. 301-306; Jul. 2000.
Milos Manic, et al., Fuzzy Preference Approach for Computer Network Attack Detection; IEEE, pp. 1345-1349, 2001.
Levent Ertoz, et al., Detection and Summarization of Novel Network Attacks Using Data Mining, pp. 1-20; AHPCRC Technical Report 2003.
German Florez, et al., An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection; Proc. of the 2002 North American Fuzzy Information Processing Society (NAPIPS) Jun. 2002.
L.J. Kohut, et al., Activity Profiles for Intrusion Detection, 2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings; Jun. 2002.
Cynthia S. Hood, et al., Proactive Network Fault Detection, INFOCOM'97, Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies Proceedings IEEE; pp. 1147-1155, Apr. 1997.
Dr. Myron L. Cramer, et al., New Methods Intrusion Detection using Control-Loop Measurement; Fourth Technology for Information Security Conf. 1996, Houston, Texas, pp. 1-8.
http://www.www.phrack.org/phrack, 2005, pp. 1-21.
Paul Barford, et al., A Signal Analysis of Network Traffic Anomalies; Proc. of the 2nd ACM SIGCOMM Workshop on internet measurement, Session 3, pp. 71-82, 2002.
R. Sekar, et al., Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusions, CCS '02, Nov. 18-22, 2002, Washington, USA.
Steven T. Eckmann, et al., STATL; An Attack Language for State-based Intrusion Detection; J. Comput. Secur. Vo. 10, No. 1-2, 2002.
Ho-Yen Chang, et al., Real-Time Protocol Analysis for Detecting Link-State Routing Protocol Attacks, ACM Trans. on Information and System Security, vol. 4, Issue 1, 2001.
C.C. Michael et al., Simple State-bases approaches to Program-bases Anomaly Detection, ACM Trans. On Information and System Security, vol. 5, Issue 3, Aug. 2002.
Koral Ilgun, et al., State Transition Analysis: A Rule-Based Intrusion Detection Approach, IEEE Trans. On Software Engineering, vol. XX, No. Y, Month 1995.
Philip Andrew Porras; A State Transition Analysis Tool for Intrusion Detection; University of California, 1992.
“Characterizing and Tracing Packet Floods Using Cisco Routers” (C)1999 Cisco Systems Inc. Publication date of Oct. 13, 1999 verfied by the Internet Archieve at http://www.archive.org. Full URL at http://web.archive.org/ web/19991013090842/http://cisco.com/warp/public/707/22.html.
“CERT Coordination Center Denial of Service Attacks” (C) 1997, 1999 Carnegie Mellon University. Full URL at http://www.cert.org/tech—tips/denial—of—service.html.
Web page “Fuzzy Firewalls” published Aug. 13, 2002 pp. 1-9 http://lists.netfilter.org/pipermail
etfilter-devel/2002-August/008999.html.
Web page “netfilter/iptables—Home” Publication date of Mar. 28, 2002 verified by the Internet Archieve http://web. archieve.org/web/200203281812656://www.netfilter.org/.
Google Code Search: source code to patch-2.4.21-bk-1.1141-pom-20030429-base (published Apr. 29, 2003) http://www.google.com/codesearch?h1=en&q=t+ipt—fuzzy.c+show:1tR9P—jh6Qg:-SXb2hm1P3E:pMIwdk—xmjo$sa=N&cd=12&ct=rc&cs—p=http://linux.1wt.eu@cs—f=kernel/patches-2.4.20-wt17/in/patch-2.4.21-bk-1.1141-pom-20030429-base#a0.
Red Hat Linux 8.0 Official Security Guide, Chapter 7: Firewalls. Published Dec. 16, 2002 as verified by Internet Archive http://web.archive.org/web/20021216100349/http://www.redhat.com/docs/manuals/linux/RHL-8/0-Manual/security-guide/ch-fw.html.
Irwin, Barry. “Reclaiming One's Bandwidth: Dynamic Filtering of Traffic Based on Packet Payload Content.” Jun. 2000. (http://homes.cs.ru.ac.za/B.Irwin/research/Barry—irwin-dynamic-filtering—SACLA2002.pdf).
“Netfilter/iptables—security/2002-04/02-icmp-dnat.body” web page dated Apr. 2, 2002 (8 pages), http://web.archive.org/web/2002061145514/http://www.netfilter.org/security/2002-04-02-icmp-dnat.html.
An Office Action dated May 28, 2009, which issued during the prosecution of Applicant's U.S. Appl. No. 10/441,971.
A Notice of Allowance dated Jun. 8, 2009, which issued during the prosecution of Applicant's U.S. Appl. No. 11/018,255.
An Office Action dated Apr. 6, 2007, which issued during the prosecution of Applicant's U.S. Appl. No. 10/441,971.
An Office Action dated Sep. 20, 2007, which issued during the prosecution ofApplicant's U.S. Appl. No. 10/441,971.
An Office Action dated Mar. 4, 2008, which issued during the prosecution of Applicant's U.S. Appl. No. 10/441,971.
An Office Action dated Sep. 30, 2008, which issued during the prosecution ofApplicant's U.S. Appl. No. 10/441,971.
“PacketShaper Freatures (for Packwise 5.2)” Document Version dated Feb. 20, 2002. http://www.packetshaper.com/documentation/packetguide/5.3.0/documents/psFeatures.pdf.
Wang, Haining et at, “Detecting SYN Flooding Attacks”. 2002.
Mirlcovic. Jelena, “D-WARD: DDoS Network Attack Recognition and Defense”, Jan. 2002.
Tzerefos, P. et al. “A Comparative Study of Simple Mail Transfer Protocol (SMfP), Post Office Protocol (POP) andXAOOElectronic Mail Protocols”, 1997 IEEE.
Ohsita, Yuichi. et at. “Detecting Distributed Denial-of-Service Attacks by Analvzing TCP SYN Packets Statistically”, Nov.-Dec. 2004.
Peng, Tas, et al., “Detecting Distributed Denial of Service Attacks Using source IP Address Monitoring”, Nov. 2002.
Chesla Avi
Elboim Abraham
Medvedovsky Lev
Fish & Richardson P.C.
Gyorfi Thomas
Radware Ltd.
Vu Kimyen
LandOfFree
Dynamic network protection does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Dynamic network protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Dynamic network protection will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4178867