Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2007-11-27
2007-11-27
Sheikh, Ayaz (Department: 2131)
Information security
Monitoring or scanning of software or data including attack...
C726S034000, C713S153000, C713S176000, C380S002000, C709S221000, C709S229000
Reexamination Certificate
active
09596009
ABSTRACT:
A method of operating a network (120) is provided in a communications system for communications among a plurality of routers in the network. The network receives verifiable information identifying at least one compromised router (D). The method includes a step to excise the compromised router (D) from the network. The method also includes steps to verify that messages transmitted between routers (A, B, C, D, E and F) are from non-compromised routers (A, B, C, E and F), and to reinstate the compromised router (D) when it becomes non-compromised.
REFERENCES:
patent: 4718002 (1988-01-01), Carr
patent: 4947430 (1990-08-01), Chaum
patent: 5093824 (1992-03-01), Coan et al.
patent: 5243592 (1993-09-01), Perlman et al.
patent: 5473599 (1995-12-01), Li et al.
patent: 5541912 (1996-07-01), Choudhury et al.
patent: 5621884 (1997-04-01), Beshears et al.
patent: 5649119 (1997-07-01), Kondoh et al.
patent: 5850592 (1998-12-01), Ramanathan
patent: 5881246 (1999-03-01), Crawley et al.
patent: 5913921 (1999-06-01), Tosey et al.
patent: 5968176 (1999-10-01), Nessett et al.
patent: 5974327 (1999-10-01), Agrawal et al.
patent: 5987011 (1999-11-01), Toh
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6000011 (1999-12-01), Freerksen et al.
patent: 6028857 (2000-02-01), Poor
patent: 6047330 (2000-04-01), Stracke, Jr.
patent: 6049834 (2000-04-01), Khabardar et al.
patent: 6067301 (2000-05-01), Aatresh
patent: 6094435 (2000-07-01), Hoffman et al.
patent: 6134587 (2000-10-01), Okanoue
patent: 6272567 (2001-08-01), Pal et al.
patent: 6282577 (2001-08-01), Okanoue et al.
patent: 6304556 (2001-10-01), Haas
patent: 6397260 (2002-05-01), Wils et al.
patent: 6424629 (2002-07-01), Rubino et al.
patent: 6425004 (2002-07-01), Hardjono
patent: 6456599 (2002-09-01), Elliott
patent: 6529515 (2003-03-01), Raz et al.
patent: 6535498 (2003-03-01), Larsson et al.
patent: 6577634 (2003-06-01), Tsukakoshi et al.
patent: 6580981 (2003-06-01), Masood et al.
patent: 6618377 (2003-09-01), Miriyala
patent: 6662229 (2003-12-01), Passman et al.
patent: 6683874 (2004-01-01), Nagami et al.
patent: 6721273 (2004-04-01), Lyon
patent: 6754220 (2004-06-01), Lamberton et al.
patent: 6977895 (2005-12-01), Shi et al.
patent: 7035223 (2006-04-01), Burchfiel et al.
Schneier, Bruce, Applied Cryptography, J1996, ohn Wiley & Sons Inc., Second Edition, pp. 461-462.
Ramanujan et al, Intrusion-Resistant Ad Hoc Wireless Networks, 2002, IEEE pp. 890-894.
Bhandare et al, Comparison of two wireless ad hoc routing protocols on a hardware test-bed, 2003, IEEE, pp. 1168-1173.
Dewan et al, Trusting Routers and Relays in Ad Hoc Networks, 2003, IEEE, pp. 1-8.
Gonzales et al, Let's Go Wireless, Nov. 2003, Tech Directions, pp. 30-35.
Vijayan, Jaikumar, Network Routers Vulnerable to denial-of-service attacks, 2001, Computerworld, p. 8.
Fulp et al, Preventing Denial of Service Attacks on Quality of Service, 2001, IEEE, pp. 159-172.
Zhao et al, Detection of Invalid Routing Annoucement in the Internet, 2002, IEEE, pp. 1-10.
Paruchuri et al, Authenticated Autonomous System Traceback, 2004, IEEE, pp. 406-413.
“Link-State Routing,” John Moy, Ch. 5, “Routing in Communications Networks,” ed. Martha Steenstrup, Prentice Hall, 1995.
“Packet Radio Routing,” Gregory S. Lauer, Ch. 11, “Routing in Communications Networks,” ed. Martha Steenstrup, Prentice Hall, 1995.
“Packet Radio Network Routing Algorithms: A Survey,” J.J. Hahn et al., IEEE Communications Magazine, vol. 22, No. 11, Nov. 1984, pp. 41-47.
“The Organization of Computer Resources into a Packet Radio Network,” R.E. Kahn, IEEE Trans. On Communications vol. COM-25, No. 1, Jan. 1977, pp. 169-178.
“Analysis of Routing Strategies for Packet Radio Networks,” J.J. Garcia Lune Acves et al., Proc. Of the IEEE INFOCOM '85, Washington, DC, Mar. 1985, 292-302.
“The DARPA Packet Radio Network Protocols,” J. Jubin et al., Proc. Of the IEEE, vol. 75, N .1, Jan. 1987, pp. 21-32.
“Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C,” Bruce Schneier, John Wiley & Sons, Inc. (1996), Chapters 2-4, 8 and 18-23.
BBN Technologies Corp
Moorthy Aravind K
Ropes & Gray LLP
Sheikh Ayaz
LandOfFree
Excising compromised routers from an ad-hoc network does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Excising compromised routers from an ad-hoc network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Excising compromised routers from an ad-hoc network will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3846068