Identifying potential intruders on a server

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S027000

Reexamination Certificate

active

07032244

ABSTRACT:
An intruder on a server is identified by providing files having attractive names in a subdirectory of the server. An agent is provided within one or more of the files. The agent is launched on an intruder's processor after the file containing the agent is downloaded. The agent locates various files and data on the intruder's processor and sends copies of the files and data to the server thus allowing a network administrator at the server to identify the intruder.

REFERENCES:
patent: 5412723 (1995-05-01), Canetti et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6119236 (2000-09-01), Shipley
patent: 6151679 (2000-11-01), Friedman et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6408391 (2002-06-01), Huff et al.
patent: 2002/0087882 (2002-07-01), Schneier et al.
patent: 0938046 (1999-08-01), None
patent: 9960462 (1999-11-01), None
“Cell Directory Service—A Single Clerk per System on MVS/OS400 Distributed Computing Environment,” IBM TDB vol. 38, No. 8, Aug. 1995, pp. 299-303.
“Luring Killer Bees with Honey,” Network Computing, vol. 11, No. 16, Aug. 2000, pp. 100, 102-103.
“Selecting a Site for the Software Sentry,” Security Management, vol. 43, No. 12, Dec. 1999 (abstract only).
“Domain and Type Enforcement Access Control Model in Firewall Systems,” Proc. 20 Intl. Scientific School, Wroclaw, Poland 1998 (abstract only).
“Verifying the Secure Setup of Unix Client/Servers and Detection of Network Intrusion,” SPIE Proc. vol. 2616, 1996 (abstract only).
“Automated System Monitoring and Notification with Swatch,” Proc. 7th Systems Admin. Conf., Berkeley, CA, 1993 (abstract only).
“How to Securely Replicate Services,” ACM Trans on Prog. Lang., vol. 16, No. 3, May 1994 (abstract only).
“Intrusion and Defense of DDoS in TCP/IP Network,” J. Nanjing Univ., vol. 32, No. 6, Dec. 2000 (abstract only).
“Countermeasure of WWW Security,” J. Infor. Proc. and Mgmt., vol. 43, No. 4, Jul. 2000 (abstract only).
“Building Intrusion Tolerant Applications,” Proc. 8th USENIX Security Symposium, Berkeley, CA, 1999 (abstract only).
“A System for Distributed Intrusion Detection,” COMPCON Spring 91, Los Alamitos, CA (abstract only).
“Intrusion Tolerance in Distributed Computing Systems,” Proc., 1991 IEEE Comp. soc. Symposium, Los Alamitos, CA (abstract only).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Identifying potential intruders on a server does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Identifying potential intruders on a server, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Identifying potential intruders on a server will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3579130

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.