Electrical computers and digital processing systems: multicomput – Computer network managing – Computer network monitoring
Reexamination Certificate
2005-03-25
2009-10-27
Caldwell, Andrew (Department: 2442)
Electrical computers and digital processing systems: multicomput
Computer network managing
Computer network monitoring
C726S023000
Reexamination Certificate
active
07610375
ABSTRACT:
An intrusion detection system (IDS) is capable of identifying the source of traffic, filtering the traffic to classify it as either safe or suspect and then applying sophisticated detection techniques such as stateful pattern recognition, protocol parsing, heuristic detection or anomaly detection either singularly or in combination based on the traffic type. In a network environment, each traffic source is provided with at least one IDS sensor that is dedicated to monitoring a specific type of traffic such as RPC, HTTP, SMTP, DNS, or others. Traffic from each traffic source is filtered to remove known safe traffic to improve efficiency and increase accuracy by keeping each IDS sensor focused on a specific traffic type.
REFERENCES:
patent: 2001/0055274 (2001-12-01), Hegge et al.
patent: 2002/0021791 (2002-02-01), Heilmann et al.
patent: 2002/0035639 (2002-03-01), Xu
patent: 2002/0194342 (2002-12-01), Lu et al.
patent: 2003/0009699 (2003-01-01), Gupta et al.
patent: 2003/0172167 (2003-09-01), Judge et al.
patent: 2004/0034800 (2004-02-01), Singhal et al.
patent: 2004/0205188 (2004-10-01), Ahlard et al.
patent: 2006/0075093 (2006-04-01), Frattura et al.
Edwards, Simon. “Vulnerabilities of Network Intrusion Detection Systems: Realizing and Overcoming the Risks.” May 1, 2002, SecurityTechNet.com: <http://www.securitytechnet.com/resource/security/ids/IDSB—White—Papera.pdf>. pp. 1-18.
“Catalyst 6500 Series Cisco IOS Software Configuration Guide, 12.2 SX.” Cisco Systems. Aug. 10, 2003. pp. 1-21. <http://web.archive.org/web/20030810211146/www.cisco.com/en/US/products/hw/switches/ps708/products—configuration—guide—book09186a00801609ea.html>.
Guthrie, Jeremy M. “IDS Load Balancing HOWTO.” Jul. 27, 2005. pp. 1-14. <http://lwn.net/Articles/145406/>.
Cisco Systems, Inc., “SAFE: IDS Deployment, Tuning, and Logging in Depth”, Copyright © 1992-2004, 58 pages.
Cisco Systems, Inc., “Networking Solutions—Safe Blueprint—Safe: IDS Deployment, Tuning, and Logging in Depth”, Copyright © 1992-2005, 45 pages.
Cisco Systems, Inc. “Configuring the Catalyst Switched Port Analyzer (SPAN) Feature—Document ID: 10570”, Copyright © 1992-2004, 34 pages.
Cisco Systems, Inc., “Cisco Threat Defense System Guide—How to Provide Effective Worm Mitigation”, Apr. 2004, Copyright © 1992-2004, 23 pages.
Cisco Systems, Inc., “Products & Services—Cisco IPS 4200 Series Sensors—Cisco IOS Intrusion Detection System Software App Overview”, Copyright © 1991-2005, 5 pages.
Cisco Systems, Inc., “Products & Services—Cisco IPS 4200 Series Sensors—The Science of IDS Attack Identification—White Paper”, Copyright © 1992-2005, 5 pages.
Cisco Systems, Inc.; “Products & Services—Cisco IPS 4200 Series Sensors—Mitigating Attacks in VoIP Environments—White Paper”, Copyright © 1992-2005, 5 pages.
Cisco Systems, Inc., “Products & Services—Cisco IPS 4200 Series Sensors—Cisco Intrusion Prevention System Solution—Data Sheet”, Copyright © 1992-2005, 5 pages.
Arregoces Mauricio
Portolani Maurizio
Stevenson Timothy W.
Biagini Christopher
Caldwell Andrew
Cisco Technology Inc.
Trellis IP Law Group, PC
Young Brian N.
LandOfFree
Intrusion detection in a data center environment does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Intrusion detection in a data center environment, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Intrusion detection in a data center environment will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4136256