Identification of network policy violations

Information security – Monitoring or scanning of software or data including attack...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S023000, C726S024000, C726S025000, C709S223000, C709S224000, C709S225000

Reexamination Certificate

active

07937755

ABSTRACT:
A correlation database stores profiling data that describes packet flows within a network. A network device stores a set of rules for permissible packet flows within the network. The network device queries the correlation database and identifies any of the packet flows within the correlation database that are exceptions to the rules. Each of the rules may specify network elements and application-layer elements to define permissible traffic characteristics for the network.

REFERENCES:
patent: 5787253 (1998-07-01), McCreery et al.
patent: 6154775 (2000-11-01), Coss et al.
patent: 6219786 (2001-04-01), Cunningham et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6499107 (2002-12-01), Gleichauf et al.
patent: 6507834 (2003-01-01), Kabra et al.
patent: 6751728 (2004-06-01), Gunter et al.
patent: 6772345 (2004-08-01), Shetty
patent: 6789116 (2004-09-01), Sarkissian et al.
patent: 6845452 (2005-01-01), Roddy et al.
patent: 6918034 (2005-07-01), Sengodan et al.
patent: 6954775 (2005-10-01), Shanklin et al.
patent: 7007301 (2006-02-01), Crosbie et al.
patent: 7016980 (2006-03-01), Mayer et al.
patent: 7065657 (2006-06-01), Moran
patent: 7076803 (2006-07-01), Bruton, III et al.
patent: 7089428 (2006-08-01), Farley et al.
patent: 7100201 (2006-08-01), Izatt
patent: 7174566 (2007-02-01), Yadav
patent: 7222366 (2007-05-01), Bruton, III et al.
patent: 7240368 (2007-07-01), Roesch et al.
patent: 7277404 (2007-10-01), Tanzella et al.
patent: 7320142 (2008-01-01), Kasper et al.
patent: 7322044 (2008-01-01), Hrastar
patent: 7324447 (2008-01-01), Morford
patent: 7324804 (2008-01-01), Hrastar et al.
patent: 7331061 (2008-02-01), Ramsey et al.
patent: 7383577 (2008-06-01), Hrastar et al.
patent: 7424744 (2008-09-01), Wu et al.
patent: 7441267 (2008-10-01), Elliott
patent: 7509380 (2009-03-01), Motoyama
patent: 7526541 (2009-04-01), Roese et al.
patent: 2002/0046275 (2002-04-01), Crosbie et al.
patent: 2002/0053033 (2002-05-01), Cooper et al.
patent: 2002/0055998 (2002-05-01), Riddle et al.
patent: 2002/0078370 (2002-06-01), Tahan
patent: 2002/0124187 (2002-09-01), Lyle et al.
patent: 2002/0143939 (2002-10-01), Riddle et al.
patent: 2002/0144156 (2002-10-01), Copeland, III
patent: 2002/0198981 (2002-12-01), Corl et al.
patent: 2003/0004689 (2003-01-01), Gupta et al.
patent: 2003/0065953 (2003-04-01), Lehmann et al.
patent: 2003/0084319 (2003-05-01), Tarquini et al.
patent: 2003/0105976 (2003-06-01), Copeland, III
patent: 2003/0131263 (2003-07-01), Keane et al.
patent: 2003/0149766 (2003-08-01), Syvanne et al.
patent: 2003/0149887 (2003-08-01), Yadav
patent: 2003/0154399 (2003-08-01), Zuk et al.
patent: 2003/0182580 (2003-09-01), Lee
patent: 2003/0204632 (2003-10-01), Willebeek-LeMair et al.
patent: 2003/0212903 (2003-11-01), Porras et al.
patent: 2003/0217289 (2003-11-01), Ammon et al.
patent: 2003/0236990 (2003-12-01), Hrastar et al.
patent: 2004/0015579 (2004-01-01), Cooper et al.
patent: 2004/0015719 (2004-01-01), Lee et al.
patent: 2004/0025044 (2004-02-01), Day
patent: 2004/0034800 (2004-02-01), Singhal et al.
patent: 2004/0083299 (2004-04-01), Dietz et al.
patent: 2004/0098623 (2004-05-01), Scheidell
patent: 2004/0151382 (2004-08-01), Stellenberg et al.
patent: 2004/0181690 (2004-09-01), Rothermel et al.
patent: 2004/0255167 (2004-12-01), Knight
patent: 2004/0268150 (2004-12-01), Aaron
patent: 2005/0018618 (2005-01-01), Mualem et al.
patent: 2005/0044406 (2005-02-01), Stute
patent: 2006/0095968 (2006-05-01), Portolani et al.
patent: 2006/0117386 (2006-06-01), Gupta et al.
patent: 2006/0137009 (2006-06-01), Chesla
patent: 2009/0064333 (2009-03-01), Saurabh et al.
“Norton Internet Security(TM) 2003 User's Guide,” 2002, Symantec Corporation.
U.S. Patent Application entitled “Application-Layer Monitoring and Profiling Network Traffic”, U.S. Appl. No. 11/044,619, filed Jan. 27, 2005.
U.S. Patent Application entitled “Compound Attack Detection in a Computer Network”, U.S. Appl. No. 11/045,572, filed on Jan. 27, 2005.
U.S. Patent Application entitled “Detection and Prevention of Encapsulated Network Attacks Using an Intermediate Device”, U.S. Appl. No. 11/049,620, filed on Feb. 2, 2005.
U.S. Patent Application entitled “Remote Aggregation of Network Traffic Profiling Data”, U.S. Appl. No. 11/044,481, filed on Jan. 27, 2005.
U.S. Patent Application entitled “Automated Change Detection Within a Network Environment”, U.S. Appl. No. 11/044,240, filed on Jan. 27, 2005.
“Ethereal 0.10.0 has been released”, Dec. 12, 2003, www.ethereal.com, retrieved from the Internet Archive WayBackMachine, indexed Jan. 1, 2004, 23 pgs.
Yannakakis, Perspectives on Database Theory, IEEE, Proceedings of 36thAnnual Symposium on Foundations of Computer Science, Milwaukee, Wisconsin, Oct. 23-25, 1995, 25 pgs.
Roelker, (Snort User Manual, HTTP inspect readme), Aug. 11, 2004, see §§ 2.1.7, 2.1.8, 2.1.10, 7 pgs.
Bitpipe, Reflex Interceptor Management Console Product Description, May 25, 2004, 1 pg.
Reflex Security, Reflex Interceptor Management Console Whitepaper, Jan. 29, 2004, 2 pgs.
Wikipedia, Cisco PIX, Apr. 9, 2009, 11 pgs.
“Intrusion Detection and Prevention,” OneSecure, Inc., 2001 p. 1-6.
Notice of Allowance in U.S. Appl. No. 11/044,619, mailed Dec. 15, 2009, 8 pp.
Office Action from U.S. Appl. No. 11/044,240, dated Jan. 27, 2010, 17 pp.
Response to Office Action from U.S. Appl. No. 11/044,240, filed Apr. 27, 2010, 10 pp.
Office Action in U.S. Appl. No. 11/045,572, mailed May 14, 2010, 46 pp.
Response to Office Action in U.S. Appl. No. 11/045,572, dated Aug. 16, 2010, 19 pp.
Notice of Allowance in U.S. Appl. No. 11/049,620, mailed Dec. 9, 2009, 21 pp.
Notice of Allowance in U.S. Appl. No. 11/044,481, mailed May 28, 2010, 18 pp.
Notice of Allowance in U.S. Appl. No. 11/044,240, mailed Jun. 1, 2010, 12 pp.
Campos, et al., “Creation and Deployment of Data Mining-Based Intrusion Detection Systems in Oracle Database 10g”, In Proceedings of the Fourth International Conference on Machine Learning and Applications, Sep. 2005, 8 pp.
Warshaw et al., “Monitoring Network Logs for Anomalous Activity”, Applied Research Laboratories, Department of Computer Sciences, University of Texas at Austin, Oct. 9, 1998, 6 pp.
Warshaw et al., “VenusIDS: An Active Database Component for Intrusion Detection”, Applied Research Laboratories, Department of Computer Sciences, University of Texas at Austin, Jun. 11, 1999, 12 pp.
Jain et al., “A Wakeup Call for Internet Monitoring Systems: The Case for Distributed Triggers”, 2004, 6 pp.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Identification of network policy violations does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Identification of network policy violations, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identification of network policy violations will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2635344

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.