Method and system for managing computer security information

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000

Reexamination Certificate

active

07089428

ABSTRACT:
A security management system includes a fusion engine which “fuses” or assembles information from multiple data sources and analyzes this information in order to detect relationships between raw events that may indicate malicious behavior and to provide an organized presentation of information to consoles without slowing down the processing performed by the data sources. The multiple data sources can comprise sensors or detectors that monitor network traffic or individual computers or both. The sensors can comprise devices that may be used in intrusion detection systems (IDS). The data sources can also comprise firewalls, audit systems, and other like security or IDS devices that monitor data traffic in real-time. The present invention can identify relationships between one or more real-time, raw computer events as they are received in real-time. The fusion engine can also assess and rank the risk of real-time raw events as well as mature correlation events.

REFERENCES:
patent: 4819234 (1989-04-01), Huber
patent: 5278901 (1994-01-01), Shieh et al.
patent: 5345595 (1994-09-01), Johnson et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5475839 (1995-12-01), Watson et al.
patent: 5586260 (1996-12-01), Hu
patent: 5590331 (1996-12-01), Lewis et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5623601 (1997-04-01), Vu
patent: 5630061 (1997-05-01), Richter et al.
patent: 5761504 (1998-06-01), Corrigan et al.
patent: 5764887 (1998-06-01), Kells et al.
patent: 5764890 (1998-06-01), Glasser et al.
patent: 5787177 (1998-07-01), Leppek
patent: 5796942 (1998-08-01), Esbensen
patent: 5798706 (1998-08-01), Kraemer et al.
patent: 5815574 (1998-09-01), Fortinsky
patent: 5828833 (1998-10-01), Belville et al.
patent: 5832208 (1998-11-01), Chen et al.
patent: 5832211 (1998-11-01), Blakley, III et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5838903 (1998-11-01), Blakely, III et al.
patent: 5857191 (1999-01-01), Blackwell, Jr. et al.
patent: 5864665 (1999-01-01), Tran
patent: 5875296 (1999-02-01), Shi et al.
patent: 5881236 (1999-03-01), Dickey
patent: 5884033 (1999-03-01), Duvall et al.
patent: 5950012 (1999-09-01), Shiell et al.
patent: 5964839 (1999-10-01), Johnson et al.
patent: 5983270 (1999-11-01), Abraham et al.
patent: 5983348 (1999-11-01), Ji
patent: 5987606 (1999-11-01), Cirasole et al.
patent: 5987611 (1999-11-01), Freund
patent: 6014645 (2000-01-01), Cunningham
patent: 6016553 (2000-01-01), Schneider et al.
patent: 6026442 (2000-02-01), Lewis et al.
patent: 6035423 (2000-03-01), Hodges et al.
patent: 6041347 (2000-03-01), Harsham et al.
patent: 6061795 (2000-05-01), Dircks et al.
patent: 6085224 (2000-07-01), Wagner
patent: 6088803 (2000-07-01), Tso et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6098173 (2000-08-01), Elgressy et al.
patent: 6119234 (2000-09-01), Aziz et al.
patent: 6266774 (2001-07-01), Sampath et al.
patent: 6275938 (2001-08-01), Bond et al.
patent: 6405318 (2002-06-01), Rowland
patent: 6453345 (2002-09-01), Trcka et al.
patent: 6606744 (2003-08-01), Mikurak
patent: 0 985 995 (2001-03-01), None
patent: WO 00/54458 (2000-09-01), None
patent: WO 01/84285 (2001-11-01), None
patent: WO 02/06928 (2002-01-01), None
patent: WO 02/056152 (2002-07-01), None
Hiverworld Continuous Adaptive Risk Management, Hiverworld, Inc., 1999-2000, pp. 1-14.
Jagannathan et al., “System Design Document: Next-Generation Intrusion Detection Expert System (NIDES),” Internet Citation, Mar. 9, 1993, #XP002136082, pp. 1-66.
Juanita Koilpillai, “Adaptive Network Sccurity Management,” Darpa NGI PI Conference, Oct. 26-29, 1998, pp. 1-27.
Essex, David,E-Sleuths Make Net Safe for E-Commerce, ComputerWorld, Jun. 2000, see p. 1-2.
Newman, David,Intrusion Detection Systems, Data Communications, 1998, see p. 1-9.
International Search Report dated Dec. 31, 2002 for PCT/US02/17161.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for managing computer security information does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for managing computer security information, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for managing computer security information will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3625288

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.