Method and apparatus for network deception/emulation

Electrical computers and digital processing systems: multicomput – Computer-to-computer session/connection establishing – Network resources access controlling

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S218000, C709S223000, C713S152000, C713S152000, C713S152000

Reexamination Certificate

active

07107347

ABSTRACT:
A number of innovations in the field of networking are disclosed. These techniques use multiple address translation to achieve effective deceptions, emulations, extended private networks and related goals. A further embodiment using a deception network having a number of different actual computer systems each performing emulation where deceived datagrams are routed to an actual machine that is particularly able to perform the desired emulation. The invention allows the emulation to receive a datagram just at it would appear at an external access point, operate on that datagram and return a datagram which is then passed through a deception wall using multiple address translations.

REFERENCES:
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5488715 (1996-01-01), Wainwright
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5796942 (1998-08-01), Esbensen
patent: 5966650 (1999-10-01), Hobson et al.
patent: 6070244 (2000-05-01), Orchier et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6145084 (2000-11-01), Zuili et al.
patent: 6298445 (2001-10-01), Shostack et al.
Hasenstein, M.; Diplomarbeit, IP Network Address Translation, http:www.suse.de/˜mha/HyperNews/get/linux-ip-nat.html (1997) 32 pages.
Microsoft TechNet; SNA Open Gateway Architecture, http://www.microsoft.com/TechNet/sna/technote/soga.asp, pp. 1-20.
Gateways, http://www.sohointer.net, 15 pages.
ComSoft Knowledge Share; http://www.vicomsoft.com/knowledge/reference/firewalls1.html, pp. 1-10.
Microsoft Windows 2000 Server Documentation http://www.windows.com/windows2000/en/server/help/sag—rras-ch2-adv—11.htm, 1 page.
Cisco IOS Network Address Translation (NAT) http://www.ieng.com/warp/public/701/60.html, pp. 1-9.
ENTERASYS Networks, Network Address Translation, http://www.enterasys.com/products/whitepapers/ssr
etwork-trans/ pp. 1-6.
Winkler, J.R., A Unix Prototype For Intrusiion And Anomaly Detection In Secure Networks,Proceedings, National Computer Security Conference,Washington D.C. Oct. 1990, Planning Research Corp.
Sebring, M.M, et al. Expert Systems In Intrusion Detection; A Case-Study, Proceedings of the 11thNational Computer Security Conference, 1988, pp. 74-81.
Debar, H., et al. A Neural Network Component For An Intrusion Detection System, Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, Cedex, France, 1992 pp. 240-250.
Dowell, C., et al. The ComputerWatch Data Reduction Tool, Proceedings of the 13thNational Computer Security Conference, 1990, pp. 99-108.
Snapp, S.R. et al, DIDS (Distributed Intrusion Detection System)—Motivation, Architecture, And An Early Prototype, Proceedings of the 14thNational Computer Security Conference, 1991, pp. 167-176.
Tener, William T., Discovery; An Exret System In The Commerical Data Security Environment., Originally presented at the Fourth IFIP Symposium on Information Systems Security, Monte Carlo, 1986. Also appeared inSecurity and Protection in Information Systems,ed. Andre Grissonanche, pp. 261-268. 1989 Elsevieer Science Publishers, B.V. (North Holland) pp. 45-53 as submitted.
Smapp, S.R. Signature Analysis And Communication Issues In A Distributed Intrusion Detection System, 1991, Committee in Charge, submitted in partial satisfaction of the requirements for Master of Science in Computer Science at the University of California Davis pp. 1-40.
Avritzer, A. et al., Reliability Testing Of Rule-Based Systems, 1996 International Symposium on Software Reliability Engineering, White Plains, N.Y., Oct. 30-Nov. 2, (7 pages).
Venter, H.S. et al. “Data Packet Intercepting on the Internet: How and Why? A Closer look at Existing Data Packet-Intercepting Tools” Computers & Security. International Journal Devoted to the Study of Technical and Financial Aspects of Computer Security, Elsevier Science Publishers. Amsterdam, NL vol. 17, No. 8, 1998, pp. 683-692, XP004150446 ISSN: 0167-4048.
Cohen F., “Simulating Cyber Attacks, Defences, and Consequences” Computers & Security, International Journal Devoted to the Study of Technical and Financial Aspects of Computer Security, Elsevier Science Publishers. Amsterdam, NL, vol. 18, No. 6, 1999, pp. 479-518, XP004178853 ISSN: 0167-4048.
Bellovin (1992) “There Be Dragons.” Proceedings of the Third Usenix UNIX Security Symposium. Baltimore (Sep. 1992). World Wide Web at http://www.research.att.com/˜smb/papers/dragon.pdf.
Cheswick et al. (1991) “An Evening with Berferd: In Which a Cracker is Lured, Endured and Studied”. World Wide Web at http://www.deter.com/unix/papers/berferd—cheswick.pdf.
Cisco Systems Inc. (1999) “Cisco IOS Network Address Translation (NAT)” World Wide Web at http://www.ieng.com/warp/public/701/60.html. pp. 1-9 of 9.
Cohen (1992) “Operating System Protection Through Program Evolution Computers and Security”, World Wide Web at http://all.net/books/IP/evolve.html. pp. 1-22 of 22.
Cohen (1996) “A Note on Detecting Tampering with Audit Trails IFIP-TC11” Computers and Security. World Wide Web at http://www.all.net/books/audit/audmod.html. pp. 1-10 of 10.
Cohen (1996) “A Note On Distributed Coordinated Attacks”. World Wide Web at http://www.all.net/books/dca/background.html. p. 1 of 1.
Cohen (1996) “Internet Holes—Incident at All.Net”. Network Security Magazine, Apr. 1996. World Wide Web at http://all.net/journal
etsec/1996-04.html. p. 1-11 of 11 total.
Cohen (1996) “Internet Holes—Internet Lightning Rods” Network Security Magazine, (Jul. 1996). World Wide Web at http://all.net/journal
etsec/1996-07-2.html. pp. 1-5 of 5.
Cohen (1996) “Internet Holes—The Human Element” Network Security Magazine, Mar. 1996. World Wide Web at http://all.net/journal
etsec/1996-03.html. pp. 1-5 of 5.
Cohen (1996) “National Info-Sec Technical Baseline—Intrusion Detection and Response” World Wide Web at http://www.all.net/journal
tb/ids.html. pp. 1-21 of 21.
Cohen (1996) “Why is thttpd Secure?” Computers and Security. World Wide Web at http://www.all.net/journal/white/whitepaper.html. pp. 1-11 of 11 total.
Cohen (1998) “National InfoSec Technical Baseline—At the Intersection of Security, Networking, and Management” World Wide Web at http://www.all.net/journal
tb
sm.html. pp. 1-17 of 17.
ENTERASYS Networks (2000) “Network Address Translation” World Wide Web at http://www.enterasys.com/product/whitepapers/ssr
etwork-trans/. pp. 1-6 of 6.
Hasenstein (1997) “DIPLOMARBEIT: IP Network Address Translation” World Wide Web at http://www.suse.de/˜mha/linux-ip-nat/diplom/. 32 pages.
MICROSOFT Corporation (2000) “Microsoft TechNet: SNA Open Gateway Architecture” World Wide Web at http://www.microsoft.com/TechNet/sna/technote/soga.asp. pp. 1-20.
MICROSOFT Corporation (2000) “Microsoft Windows 2000 Server Documentation” World Wide Web at http://www.windows.com/windows2000/en/server/help/sag—rras-ch2-adv—11.htm. p. 1 of 1.
Six Sigma Networks (2000) “Types of Internet Gateways” World Wide Web at http://www.sohointer.net/team/gateways.htm, pp. 1-15 of 15 total.
VICOM Technology Ltd. (2000) “ViComSoft Knowledge Share Firewall: Q & A”. World Wide Web at http://www.vicomsoft.com/knowledge/reference/firewalls1.html. pp. 1-10 of 10.
Cohen (1985) “Algorithmic Authentication of Identification.” Information Age, V7, #1 (Jan. 1985), pp. 35-41.
Cohen (1998) “Managing Network Security: The Unpredictability Defense.” Located on the World Wide Web at http://all.net/journal
etsec/1998-04.html. Fred Cohen & Associates, Apr. 1998.
Cohen et al. (1998) “A Preliminary Classification Scheme for Information System Threats, Attacks, and Defenses; A Cause and Effect Model; and Some Analysis Bas

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and apparatus for network deception/emulation does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and apparatus for network deception/emulation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for network deception/emulation will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3586302

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.