Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2005-06-10
2009-11-10
Jung, David Y (Department: 2434)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C716S030000, C716S030000
Reexamination Certificate
active
07617535
ABSTRACT:
Techniques for generating an access control list to block traffic from a network device infected by malware.
REFERENCES:
Year 2006; Rungta, S.; Rentzis, A.; Sedayao, J.; Adams, R.; Brett, P., “Monitoring Internet Connectivity using PlanetLab,” Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP pp. 1-14.
New directions in covert malware modeling which exploit white-listing Wang, J.; Kesidis, G.; Miller, D.J.; Sarnoff Symposium, 2007 IEEE Apr. 30, 2007-May 2, 2007 pp. 1-7.
Siren: catching evasive malware Borders, K.; Xin Zhao; Prakash, A.; Security and Privacy, 2006 IEEE Symposium on May 21-24, 2006 p. 6 pp.
A Malware Signature Extraction and Detection Method Applied to Mobile Networks Guoning Hu; Venugopal, D.; Performance, Computing, and Communications Conference, 2007. IPCCC 2007. IEEE Internationa Apr. 11-13, 2007 pp. 19-26.
Rentzis Alex
Rungta Sanjay
Verrall Timothy
Blakely , Sokoloff, Taylor & Zafman LLP
Intel Corporation
Jung David Y
LandOfFree
Infected electronic system tracking does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Infected electronic system tracking, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Infected electronic system tracking will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4087940