Dynamic network protection

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S011000, C726S023000

Reexamination Certificate

active

07836496

ABSTRACT:
A method for protecting a network from an attack includes measuring a property of traffic entering the network, and analyzing the property using at least one fuzzy logic algorithm in order to detect the attack.

REFERENCES:
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5638490 (1997-06-01), Eckert et al.
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6321338 (2001-11-01), Porras et al.
patent: 6370648 (2002-04-01), Diep
patent: 6453345 (2002-09-01), Trcka et al.
patent: 6487666 (2002-11-01), Shanklin et al.
patent: 6519703 (2003-02-01), Joyce
patent: 6538490 (2003-03-01), Yoshizawa et al.
patent: 6622135 (2003-09-01), Imbert De Tremiolles et al.
patent: 6715084 (2004-03-01), Aaron et al.
patent: 6795402 (2004-09-01), Richardson et al.
patent: 6816910 (2004-11-01), Ricciulli
patent: 7017186 (2006-03-01), Day
patent: 7028179 (2006-04-01), Anderson et al.
patent: 7058976 (2006-06-01), Dark
patent: 7222366 (2007-05-01), Bruton et al.
patent: 7308715 (2007-12-01), Gupta et al.
patent: 7370357 (2008-05-01), Sekar
patent: 7454499 (2008-11-01), Cantrell et al.
patent: 2002/0083175 (2002-06-01), Afek et al.
patent: 2002/0103916 (2002-08-01), Chen et al.
patent: 2002/0107953 (2002-08-01), Ontiveros et al.
patent: 2002/0133586 (2002-09-01), Shanklin et al.
patent: 2003/0014665 (2003-01-01), Anderson et al.
patent: 2003/0145232 (2003-07-01), Poletto et al.
patent: 2004/0025044 (2004-02-01), Day
patent: 2004/0093513 (2004-05-01), Cantrell et al.
patent: 2004/0098617 (2004-05-01), Sekar
patent: 2004/0162994 (2004-08-01), Cohen et al.
patent: 2004/0196792 (2004-10-01), Davies et al.
patent: 2005/0111460 (2005-05-01), Sahita
patent: 2003218949 (2003-07-01), None
Stevens, W. Richard et al. TCP/IP Illustrated, vol. 2: The Implementation. © 1995 Addison Wesley Professional. excerpt from pp. 758-760.
Mguyen HT et al., A First Course in Fuzzy Logic, Second Edition, CRC Press (Jul. 1999).
Fuzzy Logic Toolbox for Use with MATLABÒ, User's Guide Version 2, The Math Works, Inc., Natick, MA (Jul. 2002).
Hines JW, Fuzzy and Neural Approaches in Engineering, Wile-Interscience (Jan. 1997).
J.E. Dickerson, et al.; Fuzzy Network Profiling for Intrusion Detection; Proc. of NAFIPS 10th Int. Conf. of the North American Fuzzy Information Processing Society; pp. 301-306; Jul. 2000.
Milos Manic, et al., Fuzzy Preference Approach for Computer Network Attack Detection; IEEE, pp. 1345-1349, 2001.
Levent Ertoz, et al., Detection and Summarization of Novel Network Attacks Using Data Mining, pp. 1-20; AHPCRC Technical Report 2003.
German Florez, et al., An Improved Algorithm for Fuzzy Data Mining for Intrusion Detection; Proc. of the 2002 North American Fuzzy Information Processing Society (NAPIPS) Jun. 2002.
L.J. Kohut, et al., Activity Profiles for Intrusion Detection, 2002 Annual Meeting of the North American Fuzzy Information Processing Society Proceedings; Jun. 2002.
Cynthia S. Hood, et al., Proactive Network Fault Detection, INFOCOM'97, Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies Proceedings IEEE; pp. 1147-1155, Apr. 1997.
Dr. Myron L. Cramer, et al., New Methods Intrusion Detection using Control-Loop Measurement; Fourth Technology for Information Security Conf. 1996, Houston, Texas, pp. 1-8.
http://www.www.phrack.org/phrack, 2005, pp. 1-21.
Paul Barford, et al., A Signal Analysis of Network Traffic Anomalies; Proc. of the 2nd ACM SIGCOMM Workshop on internet measurement, Session 3, pp. 71-82, 2002.
R. Sekar, et al., Specification-based Anomaly Detection: A New Approach for Detecting Network Intrusions, CCS '02, Nov. 18-22, 2002, Washington, USA.
Steven T. Eckmann, et al., STATL; An Attack Language for State-based Intrusion Detection; J. Comput. Secur. Vo. 10, No. 1-2, 2002.
Ho-Yen Chang, et al., Real-Time Protocol Analysis for Detecting Link-State Routing Protocol Attacks, ACM Trans. on Information and System Security, vol. 4, Issue 1, 2001.
C.C. Michael et al., Simple State-bases approaches to Program-bases Anomaly Detection, ACM Trans. On Information and System Security, vol. 5, Issue 3, Aug. 2002.
Koral Ilgun, et al., State Transition Analysis: A Rule-Based Intrusion Detection Approach, IEEE Trans. On Software Engineering, vol. XX, No. Y, Month 1995.
Philip Andrew Porras; A State Transition Analysis Tool for Intrusion Detection; University of California, 1992.
“Characterizing and Tracing Packet Floods Using Cisco Routers” (C)1999 Cisco Systems Inc. Publication date of Oct. 13, 1999 verfied by the Internet Archieve at http://www.archive.org. Full URL at http://web.archive.org/ web/19991013090842/http://cisco.com/warp/public/707/22.html.
“CERT Coordination Center Denial of Service Attacks” (C) 1997, 1999 Carnegie Mellon University. Full URL at http://www.cert.org/tech—tips/denial—of—service.html.
Web page “Fuzzy Firewalls” published Aug. 13, 2002 pp. 1-9 http://lists.netfilter.org/pipermail
etfilter-devel/2002-August/008999.html.
Web page “netfilter/iptables—Home” Publication date of Mar. 28, 2002 verified by the Internet Archieve http://web. archieve.org/web/200203281812656://www.netfilter.org/.
Google Code Search: source code to patch-2.4.21-bk-1.1141-pom-20030429-base (published Apr. 29, 2003) http://www.google.com/codesearch?h1=en&q=t+ipt—fuzzy.c+show:1tR9P—jh6Qg:-SXb2hm1P3E:pMIwdk—xmjo$sa=N&cd=12&ct=rc&cs—p=http://linux.1wt.eu@cs—f=kernel/patches-2.4.20-wt17/in/patch-2.4.21-bk-1.1141-pom-20030429-base#a0.
Red Hat Linux 8.0 Official Security Guide, Chapter 7: Firewalls. Published Dec. 16, 2002 as verified by Internet Archive http://web.archive.org/web/20021216100349/http://www.redhat.com/docs/manuals/linux/RHL-8/0-Manual/security-guide/ch-fw.html.
Irwin, Barry. “Reclaiming One's Bandwidth: Dynamic Filtering of Traffic Based on Packet Payload Content.” Jun. 2000. (http://homes.cs.ru.ac.za/B.Irwin/research/Barry—irwin-dynamic-filtering—SACLA2002.pdf).
“Netfilter/iptables—security/2002-04/02-icmp-dnat.body” web page dated Apr. 2, 2002 (8 pages), http://web.archive.org/web/2002061145514/http://www.netfilter.org/security/2002-04-02-icmp-dnat.html.
An Office Action dated May 28, 2009, which issued during the prosecution of Applicant's U.S. Appl. No. 10/441,971.
A Notice of Allowance dated Jun. 8, 2009, which issued during the prosecution of Applicant's U.S. Appl. No. 11/018,255.
An Office Action dated Apr. 6, 2007, which issued during the prosecution of Applicant's U.S. Appl. No. 10/441,971.
An Office Action dated Sep. 20, 2007, which issued during the prosecution ofApplicant's U.S. Appl. No. 10/441,971.
An Office Action dated Mar. 4, 2008, which issued during the prosecution of Applicant's U.S. Appl. No. 10/441,971.
An Office Action dated Sep. 30, 2008, which issued during the prosecution ofApplicant's U.S. Appl. No. 10/441,971.
“PacketShaper Freatures (for Packwise 5.2)” Document Version dated Feb. 20, 2002. http://www.packetshaper.com/documentation/packetguide/5.3.0/documents/psFeatures.pdf.
Wang, Haining et at, “Detecting SYN Flooding Attacks”. 2002.
Mirlcovic. Jelena, “D-WARD: DDoS Network Attack Recognition and Defense”, Jan. 2002.
Tzerefos, P. et al. “A Comparative Study of Simple Mail Transfer Protocol (SMfP), Post Office Protocol (POP) andXAOOElectronic Mail Protocols”, 1997 IEEE.
Ohsita, Yuichi. et at. “Detecting Distributed Denial-of-Service Attacks by Analvzing TCP SYN Packets Statistically”, Nov.-Dec. 2004.
Peng, Tas, et al., “Detecting Distributed Denial of Service Attacks Using source IP Address Monitoring”, Nov. 2002.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Dynamic network protection does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Dynamic network protection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Dynamic network protection will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4178867

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.