Method and system for detecting a vulnerability in a network

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S023000, C726S034000, C713S151000

Reexamination Certificate

active

07073198

ABSTRACT:
A system and method in accordance with the invention reliably and non-intrusively identifies various conditions of a network. In particular, an embodiment of the invention can identify an operating system, including version and patch level, and a service, including version and patch level, of a remote host on the network. Using this information, an embodiment of the invention can then reliably identify a vulnerability condition of the network. In some embodiments, the operating system and service information can be used to identify a trojan application, unlicensed software use, security policy violations, or even infer vulnerabilities that are yet unknown.

REFERENCES:
patent: 5136523 (1992-08-01), Landers
patent: 5278901 (1994-01-01), Shieh et al.
patent: 5388211 (1995-02-01), Hornbuckle
patent: 5440723 (1995-08-01), Arnold et al.
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5699403 (1997-12-01), Ronnen
patent: 5796942 (1998-08-01), Esbensen
patent: 5798706 (1998-08-01), Kraemer et al.
patent: 5802320 (1998-09-01), Baehr et al.
patent: 5850516 (1998-12-01), Schneier
patent: 5892903 (1999-04-01), Klaus
patent: 5919257 (1999-07-01), Trostle
patent: 5923646 (1999-07-01), Mandhyan
patent: 5925126 (1999-07-01), Hsieh
patent: 5931946 (1999-08-01), Terada et al.
patent: 5958015 (1999-09-01), Dascalu
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6006328 (1999-12-01), Drake
patent: 6088804 (2000-07-01), Hill et al.
patent: 6101606 (2000-08-01), Diersch et al.
patent: 6185689 (2001-02-01), Todd, Sr. et al.
patent: 6199181 (2001-03-01), Rechef et al.
patent: 6263444 (2001-07-01), Fujita
patent: 6269447 (2001-07-01), Maloney et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6282546 (2001-08-01), Gleichauf et al.
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6321338 (2001-11-01), Porras et al.
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6330562 (2001-12-01), Boden et al.
patent: 6343362 (2002-01-01), Ptacek et al.
patent: 6347376 (2002-02-01), Attwood et al.
patent: 6359557 (2002-03-01), Bilder
patent: 6363489 (2002-03-01), Comay et al.
patent: 6370648 (2002-04-01), Diep
patent: 6408391 (2002-06-01), Huff et al.
patent: 6415321 (2002-07-01), Gleichauf et al.
patent: 6470384 (2002-10-01), O'Brien
patent: 6473800 (2002-10-01), Jerger et al.
patent: 6477651 (2002-11-01), Teal
patent: 6484203 (2002-11-01), Porras et al.
patent: 6484315 (2002-11-01), Ziese
patent: 6490626 (2002-12-01), Edwards et al.
patent: 6502135 (2002-12-01), Munger et al.
patent: 6574737 (2003-06-01), Kingsford et al.
patent: 6578147 (2003-06-01), Shanklin et al.
patent: 6584569 (2003-06-01), Reshef et al.
patent: 6609205 (2003-08-01), Bernhard et al.
patent: 6611869 (2003-08-01), Eschelbeck et al.
patent: 6687833 (2004-02-01), Osborne et al.
patent: 6704873 (2004-03-01), Underwood
patent: 6708212 (2004-03-01), Porras et al.
patent: 6711127 (2004-03-01), Gorman et al.
patent: 6718535 (2004-04-01), Underwood
patent: 6735169 (2004-05-01), Albert et al.
patent: 6735702 (2004-05-01), Yavatkar et al.
patent: 6771597 (2004-08-01), Makansi et al.
patent: 6775657 (2004-08-01), Baker
patent: 6778524 (2004-08-01), Augart
patent: 6789216 (2004-09-01), Zagorski et al.
patent: 6816973 (2004-11-01), Gleichauf et al.
patent: 6826172 (2004-11-01), Augart
patent: 2002/0133721 (2002-09-01), Adjaoute
patent: WO 01/31420 (2001-05-01), None
patent: WO 01/84270 (2001-11-01), None
patent: WO 02/19661 (2002-03-01), None
patent: WO 02/45380 (2002-06-01), None
patent: WO02061544 (2002-08-01), None
patent: WO03084181 (2003-10-01), None
patent: WO 03/100617 (2003-12-01), None
Ristenbatt, Marllin, Methodology for Network Communication Vulnerability Analysis, 1988, IEEE, pp. 493-499.
Skaggs et al, Network Vulnerability Analysis, 2002, IEEE, pp. 493-495.
Thatcher, Michelle, Keeping your Technology Secure, 2002, Technology & Learning, pp. 38, 40, 42, and 44.
Rebecca Bace, Infidel, Inc. “An Introduction to Intrusion Detection and Assessment”, 1999, 38 pages.
Fyodor, “Remote OS detection via TCP/IP Stack FingerPrinting”, Oct. 18, 1998, 10pages.
Abstract, W. Erhard, et al., “Network Traffic Analysis and Security Monitoring With UniMon”, Proceeding of the IEEE Conference on High Performance Switching and Routing, 2000, ATM 2000, pp. 439-446 (Jun. 2000).
Abstract, Dept. of Comput. Sci., California Univ., Davis, CA, USA, “A Methodology For Testing Intrusion Detection Systems”, IEEE Transactions on Software Engineering, vol. 22, Issue 10, pp. 719-729 (Oct. 1996).
Abstract, Monji A. Le Charlier, et al., “Distributed Audit Trail Analysis”, Proceeding of the Symposium on Network and Distributed System Security, 1995, pp. 102-112 (Feb. 16-17, 1995).
Abstract, L.T. Heberlein, et al., “A Network Security Monitor” Proceeding of the 990 IEEE Computer Society Symposium on Research in Security and Privacy, pp. 296-04, (May 7-9, 1990).
Abstract, Xinzhou Quin et al., “Integrating Intrusion Detection and Network Management”, Network Operation and Management Symposium, 2002. NAOMS 2002. 2002 IEEE/IFIP, pp. 329-344 (Apr. 15-19, 2002).
Abstract, D.G. Schwartz et al., “A Case-Based Approach To Network Intrusion Detection”, Proceeding of the 5th International Conference on Information Fusion, 2002. vol. 2 pp. 1084-1089 (Jul. 8-11, 2002).
Abstract, “Open Source Security: Opportunity or Oxymoron?” Computer, vol. 35, Issue 3, pp. 18-21 (Mar. 2002).
Abstract, Liu Dihua, et al. “Data Mining For Intrusion Detection”, Proceedings ICII 2001—Beijing 2001 International Conference on Info-Tech and Info-Net, 2001, vol. 5, pp. 7-12, (Oct. 29-Nov. 2001).
Abstract, Kai Hwang & M. Gangadharan, “Micro-Firewalls for Dynamic Network Security With Distributed Intrusion Detection”, NCA 2001 IEEE International Symposium on Network Computing and Applications, 2001. pp. 68-79, (Oct. 8-10, 2001).
Abstract, Wenke Lee Stolfo, et al., “Real Time Data Mining-Based Intrusion Detection”, Proceedings DARPA Information Survivability Conference & Exposition II, 2001, DISCEX '01. vol. 1, pp. 89-100 (Jun. 12-14, 2001).
Abstract, J. Burns, et al. Automatic Management Of Network Security Policy, Proceedings DARPA Information Survivability Conference & Exposition II 2001, DISCEX '01. vol. 2, pp. 12-26, (Jun. 12-14, 2001).
Abstract, Heberlein, et al. “A Network Security Monitor”, 1990, Proceeings Research in Security & Privacy 1990 IEEE Computer Society Symposium on, pp. 296-304, (May 7-9, 1990).
“Microsoft Computer Dictionary Fifth Edition,” 2002, 6 pages.
Anderson, Teresa, “Hunting for Holes,” Security Management, Arlington, Apr. 1996, 2 pages.
Breyfogle, Stacey, “Don't Stop at Your Servers,” Software Magazine, Englewood, Jan. 1998, pp. 1-3.
Johnson, Johna Till, “Simulated Attack for Real Network Security,” Data Communications, Nov. 2, 1995, pp. 31-32.
Anonymous, Microsoft Computer Dictionary, 2002, Microsoft Press, Fifth Edition, p. 291.
Phipatanasuphorn et al., Vulnerability of Sensor Networks to Unauthorized Traversal and Monitoring, IEEE Transactions On Computers, Mar. 2004, pp. 364-369.
Yurcik, William, Controlling Intrusion Detection Systems by Generating False Positives: Squealing Proof-of-Concept, Proceedings of the 27thAnnual IEEE Conference on Local Computer Networks, 2002, pp. 134-135.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for detecting a vulnerability in a network does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for detecting a vulnerability in a network, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for detecting a vulnerability in a network will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3566443

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.