Information security – Access control or authentication – Network
Reexamination Certificate
2006-01-31
2006-01-31
Jung, David (Department: 2134)
Information security
Access control or authentication
Network
C726S006000, C726S008000
Reexamination Certificate
active
06993790
ABSTRACT:
A vulnerability checking tool for a host computer designed to examine security logs of attempted logins and revocations, to detect systematic attacks of a wide variety, and to generate a report file that can be examined for information concerning these types of events. Host computer files which contain data regarding attempted accesses and logins are used to create an event list based upon event criteria. The list is evaluated using a “floating period” time frame which advances by single event steps while no violation is detected within a particular floating period, and which advances by “jumps” when violations are detected in a time period so as to reduce the possibility of “over reporting” violations related to the same set of events.
REFERENCES:
patent: 5850516 (1998-12-01), Schneier
patent: 5892903 (1999-04-01), Klaus
patent: 6006328 (1999-12-01), Drake
patent: 6088804 (2000-07-01), Hill et al.
patent: 2002/0031134 (2002-03-01), Poletto et al.
patent: 2002/0143917 (2002-10-01), Stevenson et al.
Terry Escamilla, “Intrusion Detection”, 1998, Robert Ipsen.
“Computing the Moving Average of a Sequence”, 2000, [Retrieved from Internet Feb. 25, 2005], http://www.cs.mtu.edu/˜shene/COURSES/cs201/NOTES/chap08/mov-avg.html.
Evolving schedule graphs for the vehicle routing problem with time windows Ozdemir, H.T.; Mohan, C.K.;Evolutionary Computation, 2000. Proceedings of the 2000 Congress on vol. 2, Jul. 16-19, 2000 Page(s): 888-895 vol. 2.
A comparative analysis of HTML and Windows-based multimedia software-an exploratory study Zimmerman, D.E.; Muraski, M.L.; Palmquist, M.E.;Professional Communication Conference, 1996. IPCC '96 Proceedings. ‘Communication on the Fast Track’., International.
Processing reporting function views in a data warehouse environment Lehner, W.; Hummer, W.; Schlesinger, L.; Data Engineering, 2002. Proceedings. 18th International Conference on Feb. 26-Mar. 1, 2002 Page(s): 176-185 Digital Object Identifier 10.1109/ICD.
Godwin Debbie Ann
Walters Rodney Eldon
Frantz Robert H.
Jung David
Mims Jr. David A.
LandOfFree
Host-based systematic attack detection tool does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Host-based systematic attack detection tool, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Host-based systematic attack detection tool will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3531307