Graphical user interface for an enterprise intrusion...

Data processing: presentation processing of document – operator i – Operator interface – For plural users or sites

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C715S853000, C709S224000, C719S318000

Reexamination Certificate

active

10407030

ABSTRACT:
A method for interfacing with a user of an enterprise intrusion detection system, the method comprises receiving at least one packet flow, each packet flow originating from a unique node in the intrusion detection system and comprising descriptive information and a plurality of packet headers. The descriptive information of a first subset of the received packet flows is communicated to a user based at least in part on a filtering ruleset. A second subset of the received packet flows is concealed from the user based at least in part on the filtering ruleset. In response to receiving a command from the user, the plurality of packet headers for at least one packet flow in the first subset is communicated to the user.

REFERENCES:
patent: 5020411 (1991-06-01), Rowan
patent: 5341229 (1994-08-01), Rowan
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6226589 (2001-05-01), Maeda et al.
patent: 6404380 (2002-06-01), Poore, Jr.
patent: 6744396 (2004-06-01), Stone et al.
patent: 6954775 (2005-10-01), Shanklin et al.
patent: 7058976 (2006-06-01), Dark
patent: 7127743 (2006-10-01), Khanolkar et al.
patent: 7130611 (2006-10-01), Kimura et al.
patent: 7146421 (2006-12-01), Syvanne
patent: 7185368 (2007-02-01), Copeland, III
patent: 2002/0112189 (2002-08-01), Syvanne et al.
patent: 2003/0105976 (2003-06-01), Copeland, III
patent: 2003/0145226 (2003-07-01), Bruton et al.
patent: 2003/0154399 (2003-08-01), Zuk et al.
patent: 2003/0177383 (2003-09-01), Ofek et al.
patent: 2004/0015719 (2004-01-01), Lee et al.
patent: 2004/0024855 (2004-02-01), Tsai et al.
patent: 2004/0103211 (2004-05-01), Jackson et al.
patent: 2004/0172557 (2004-09-01), Nakae et al.
patent: 2004/0193943 (2004-09-01), Angelino et al.
patent: 2005/0044406 (2005-02-01), Stute
patent: 2006/0209836 (2006-09-01), Ke et al.
Jiang et al., “Compressing N-Dimensional Data”, U.S. Appl. No. 11/559,786, 31 pages, 3 pages of drawings, filed Nov. 14, 2006.
Gersho, et al., entitled “Vector Quantization and Signal Compression,” Academic Publisher, 737 pages, 1992.
Dasgupta; Experiments with Random Projection; Proc. 16th Conference Uncertainty in Artificial Intelligence (UAI), 9 pages, 2000.
Arnold, “Kernel Based Anomaly Detection,” Intrusion Detection Systems, Machine Learning Group, Columbia University, 2 pages, Apr. 26, 2001.
Bace and P. Mell, “NIST Special Publication on Intrusion Detection Systems,” 51 pages, Feb. 2001.
Boeckman, “Getting Closer to Policy-Based Intrusion Detection.” Information Security Bulletin, pp. 13-20, May 2000.
Cisco System, Inc., “NetRanger User Guide 2.2.1,” Chapters 1-9 and Appendices A-C, 2000.
Commonwealth of Australia, “Handbook 13, Intrusion Detection and Audit Analysis v. 1.0,” Australian Communications-Electronic Security Instruction 33 (ACSI 33), Apr. 4, 2003.
Curry, and H. Debar, “Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition,” Intrusion Detection Working Group, 116 pages, Jan. 2003.
Jansen, P. Mell, et al., “Mobile Agents in Intrusion Detection and Response.” National Institute for Standards and Technology, 12 pages, Jun. 2000.
Symantec, “Intrusion Detection,” 4 pages, 2002.
Intrusion.com, Inc., “Network Intrusion Detection System Product Overview,” SecureNet Series, 6 pages, Jul. 2001.
Phung, “Data Mining in Intrusion Detection,” Sans.org, 3 pages, Jan. 24, 2000.
Power, “CSI Roundtable: Experts discuss present and future intrusion detection systems,.” Computer Security Journal vol. XIV, #1, 2001.
Raghudharan, “Intrusion Detection Systems: Beyond the first line of defense,” Network Magazine, 7 pages, Sep. 2001.
ISS Corporation, “ISS RealSecure© Protection System,” 5 pages, Apr. 1, 2003.
Stick, “A Potential Denial of Service Against IDS Systems,” Internet Security Systems Security Alert, 2 pages, Mar. 2001.
Northcutt, and J. Novak, “Network Intrusion Detection: An Analyst's Handbook,” 2ndEd., 18 pages, Sep. 2000.
Yocom, K. Brown, and D. Van Derveer, “Intrusion Detection Products Grow Up,” Network World, 12 pages, Oct. 2001.
Jou, F. Gong, C. Sargor, X Wu, S.F. Wu, H.Y. Chang and F. Wang, “Design and implementation of a scalable intrusion detection system for protection of network infrastructure,” DARPA Information Survivability Conference and Exposition (DISCEX), 15 pages, Jan. 2000.
Li and G. Eschelbeck, “Multi-Tier Intrusion Detection System,” 11 pages, Apr. 4, 2003.
Wang, F. Gong, C. Sargor, K. Goseva-Popstojanova, K. Trivedi and F. Jou, “SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services,” IEEE Workshop on Information Assurance and Security, pp. 38-45, Jun. 2001.
Wu et al., “JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Protocol,” pp. 0-23, Feb. 24, 1999.
A. Arnold, “Kernel Based Anomaly Detection,” Intrusion Detection Systems, Machine Learning Group, Columbia University, 2 pages, Apr. 26, 2001.
R. Bace and P. Mell, “NIST Special Publication on Intrusion Detection Systems,” 51 pages, Feb. 2001.
C. Boeckman, “Getting Closer to Policy-Based Intrusion Detection.” Information Security Bulletin, pp. 13-20, May 2000.
Commonwealth of Australia, “Handbook 13, Intrusion Detection and Audit Analysis v. 1.0,” Australian Communications-Electronic Security Instruction 33 (ACSI 33), Apr. 4, 2003.
D. Curry, and H. Debar, “Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition,” Intrusion Detection Working Group, 116 pages, Jan. 2003.
W. Jansen, P. Mell, et al., “Mobile Agents in Intrusion Detection and Response.” National Institute for Standards and Technology, 12 pages, Jun. 2000.
R. Power, “CSI Roundable: Experts discuss present and future intrusion detection systems,.” Computer Security Journal vol. XIV, #1, 2001.
R. Raghudharan, “Intrusion Detection Systems: Beyond the first line of defense,” Network Magazine, 7 pages, Sep. 2001.
S. Northcutt, and J. Novak, “Network Intrusion Detection: An Analyst's Handbook,” 2ndEd., 18 pages, Sep. 2000.
B. Yocom, K. Brown, and D. Van Derveer, “Intrusion Detection Products Grow Up,” Network World, 12 pages, Oct. 2001.
Y.F. Jou, F. Gong, C. Sargor, X Wu, S.F. Wu, H.Y. Chang and F. Wang, “Design and implementation of a scalable intrusion system for protection of network infrastructure,” DARPA Information Survivability Conference and Exposition (DISCEX), 15 pages, Jan. 2000.
J. Li and G. Eschelbeck, “Multi-Tier Intrusion Detection System,” 11 pages, Apr. 4, 2003.
F. Wang, F. Gong, C. Sargor, K. Goseva-Popstojanova, K. Trivedi and F. Jou, “SITAR: A Scalable Intrusion-Tolerant Architecture for Distributed Services,” IEEE Workshop on Information Assurnace and Security, pp. 38-45, Jun. 2001.
S.F. Wu, H.C. Chang, F. Jou, F. Wang, F. Gong, C. Sargor, D. Qu and R. Cleaveland, “JiNao: Design and Implementation of a Scalable Intrusion Detection System for the OSPF Routing Protocol,” pp. 0-23, Feb. 24, 1999.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Graphical user interface for an enterprise intrusion... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Graphical user interface for an enterprise intrusion..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Graphical user interface for an enterprise intrusion... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3812837

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.