Method and system for network intrusion detection, related...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000, C713S153000

Reexamination Certificate

active

08042182

ABSTRACT:
A system for providing intrusion detection in a network wherein data flows are exchanged using associated network ports and application layer protocols. The system includes a monitoring module configured for monitoring data flows in the network, a protocol identification engine configured for detecting information on the application layer protocols involved in the monitored data flows, and an intrusion detection module configured for operating based on the information on application layer protocols detected. Intrusion detection is thus provided independently of any predefined association between the network ports and the application layer protocols.

REFERENCES:
patent: 6182146 (2001-01-01), Graham-Cumming, Jr.
patent: 6415321 (2002-07-01), Gleichauf et al.
patent: 6499107 (2002-12-01), Gleichauf et al.
patent: 7237264 (2007-06-01), Graham et al.
patent: 7305708 (2007-12-01), Norton et al.
patent: 7620988 (2009-11-01), Hernacki
patent: 7660248 (2010-02-01), Duffield et al.
patent: 7716742 (2010-05-01), Roesch et al.
patent: 2002/0032717 (2002-03-01), Malan et al.
patent: 2003/0014662 (2003-01-01), Gupta et al.
patent: 2003/0145226 (2003-07-01), Bruton et al.
patent: 2003/0172291 (2003-09-01), Judge et al.
patent: 2004/0098617 (2004-05-01), Sekar
patent: 2004/0107361 (2004-06-01), Redan et al.
patent: WO-02/061510 (2002-08-01), None
patent: WO-2005/015370 (2005-02-01), None
Abbes, Tarek et al. “Protocol Analysis in Intrusion Detection Using Decision Tree”, 2004.
Kruegel, Christopher et al. “Service Specific Anomaly Detection for Network Intrusion Detection”, 2002.
Roesch, Martin. “Snort—Lightweight Intrusion Detection for Networks”, 1999.
Yang, Wu et al. “Intrusion detection system for high-speed network”, 2004.
Norton et al.; “The New Snort”; Computer Security Journal Computer Security, vol. 19, No. 3, pp. 37-47, (2003).
Freiss et al.; “Einbrecheralarm Intrusion Detection MIT Snort”; CT Magazin Fuer Computer Technik, vol. 1, No. 8, pp. 212-219, (2001).
Frederick; “Network Intrusion Detection Signatures, Part 5”; Security Focus HOME Infocus, retrieved on Nov. 25, 2004 from http://securityfocus.com/infocus/1569>, pp. 1-4, (2002).
Zhang et al.; “Detecting Backdoors”; retrieved on Nov. 24, 2004 from http://citeseer.ist.psu.edu/rd/0%2C296649%2C1%2CO.25%CDownload/http://citeseer.ist.psu.edu/cache/papers/cs/14185/http:zSzzSzwww.aciri.orgzSzvernzSzpaperszSzbackdoor-sec00.pdf/zhang00detecting.pdf>, pp. 1-11, (2000).
Sun et al.; “Statistical Identification of Encrypted Web Browsing Traffic”; Proc. of IEEE Symposium on Security and Privacy, 13 pages(2002).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method and system for network intrusion detection, related... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method and system for network intrusion detection, related..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and system for network intrusion detection, related... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4273978

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.