Host-based systematic attack detection tool

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S006000, C726S008000

Reexamination Certificate

active

06993790

ABSTRACT:
A vulnerability checking tool for a host computer designed to examine security logs of attempted logins and revocations, to detect systematic attacks of a wide variety, and to generate a report file that can be examined for information concerning these types of events. Host computer files which contain data regarding attempted accesses and logins are used to create an event list based upon event criteria. The list is evaluated using a “floating period” time frame which advances by single event steps while no violation is detected within a particular floating period, and which advances by “jumps” when violations are detected in a time period so as to reduce the possibility of “over reporting” violations related to the same set of events.

REFERENCES:
patent: 5850516 (1998-12-01), Schneier
patent: 5892903 (1999-04-01), Klaus
patent: 6006328 (1999-12-01), Drake
patent: 6088804 (2000-07-01), Hill et al.
patent: 2002/0031134 (2002-03-01), Poletto et al.
patent: 2002/0143917 (2002-10-01), Stevenson et al.
Terry Escamilla, “Intrusion Detection”, 1998, Robert Ipsen.
“Computing the Moving Average of a Sequence”, 2000, [Retrieved from Internet Feb. 25, 2005], http://www.cs.mtu.edu/˜shene/COURSES/cs201/NOTES/chap08/mov-avg.html.
Evolving schedule graphs for the vehicle routing problem with time windows Ozdemir, H.T.; Mohan, C.K.;Evolutionary Computation, 2000. Proceedings of the 2000 Congress on vol. 2, Jul. 16-19, 2000 Page(s): 888-895 vol. 2.
A comparative analysis of HTML and Windows-based multimedia software-an exploratory study Zimmerman, D.E.; Muraski, M.L.; Palmquist, M.E.;Professional Communication Conference, 1996. IPCC '96 Proceedings. ‘Communication on the Fast Track’., International.
Processing reporting function views in a data warehouse environment Lehner, W.; Hummer, W.; Schlesinger, L.; Data Engineering, 2002. Proceedings. 18th International Conference on Feb. 26-Mar. 1, 2002 Page(s): 176-185 Digital Object Identifier 10.1109/ICD.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Host-based systematic attack detection tool does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Host-based systematic attack detection tool, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Host-based systematic attack detection tool will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3531307

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.