Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2006-04-18
2006-04-18
Sheikh, Ayaz (Department: 2131)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C726S027000
Reexamination Certificate
active
07032244
ABSTRACT:
An intruder on a server is identified by providing files having attractive names in a subdirectory of the server. An agent is provided within one or more of the files. The agent is launched on an intruder's processor after the file containing the agent is downloaded. The agent locates various files and data on the intruder's processor and sends copies of the files and data to the server thus allowing a network administrator at the server to identify the intruder.
REFERENCES:
patent: 5412723 (1995-05-01), Canetti et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6119236 (2000-09-01), Shipley
patent: 6151679 (2000-11-01), Friedman et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6408391 (2002-06-01), Huff et al.
patent: 2002/0087882 (2002-07-01), Schneier et al.
patent: 0938046 (1999-08-01), None
patent: 9960462 (1999-11-01), None
“Cell Directory Service—A Single Clerk per System on MVS/OS400 Distributed Computing Environment,” IBM TDB vol. 38, No. 8, Aug. 1995, pp. 299-303.
“Luring Killer Bees with Honey,” Network Computing, vol. 11, No. 16, Aug. 2000, pp. 100, 102-103.
“Selecting a Site for the Software Sentry,” Security Management, vol. 43, No. 12, Dec. 1999 (abstract only).
“Domain and Type Enforcement Access Control Model in Firewall Systems,” Proc. 20 Intl. Scientific School, Wroclaw, Poland 1998 (abstract only).
“Verifying the Secure Setup of Unix Client/Servers and Detection of Network Intrusion,” SPIE Proc. vol. 2616, 1996 (abstract only).
“Automated System Monitoring and Notification with Swatch,” Proc. 7th Systems Admin. Conf., Berkeley, CA, 1993 (abstract only).
“How to Securely Replicate Services,” ACM Trans on Prog. Lang., vol. 16, No. 3, May 1994 (abstract only).
“Intrusion and Defense of DDoS in TCP/IP Network,” J. Nanjing Univ., vol. 32, No. 6, Dec. 2000 (abstract only).
“Countermeasure of WWW Security,” J. Infor. Proc. and Mgmt., vol. 43, No. 4, Jul. 2000 (abstract only).
“Building Intrusion Tolerant Applications,” Proc. 8th USENIX Security Symposium, Berkeley, CA, 1999 (abstract only).
“A System for Distributed Intrusion Detection,” COMPCON Spring 91, Los Alamitos, CA (abstract only).
“Intrusion Tolerance in Distributed Computing Systems,” Proc., 1991 IEEE Comp. soc. Symposium, Los Alamitos, CA (abstract only).
International Business Machines - Corporation
Pivnichny John R.
Sheikh Ayaz
Sherkat Arezoo
LandOfFree
Identifying potential intruders on a server does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Identifying potential intruders on a server, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identifying potential intruders on a server will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3579130