Method, computer program element and a system for processing...

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S023000, C726S024000, C709S224000, C709S225000

Reexamination Certificate

active

07437762

ABSTRACT:
A method and system is designed for processing alarms, that have been triggered by a monitoring system such as an intrusion detection system, a firewall, or a network management system, comprising the steps of entering the triggered alarms into an alarm log, evaluating similarity between alarms, grouping similar alarms into alarm clusters, summarizing alarm clusters by means of generalized alarms, counting the covered alarms for each generalized alarm and forwarding generalized alarms for further processing if the number of alarms covered satisfies a predetermined criterion.

REFERENCES:
patent: 6691231 (2004-02-01), Lloyd et al.
patent: 6804701 (2004-10-01), Muret et al.
patent: 6918124 (2005-07-01), Novik et al.
patent: 2002/0012011 (2002-01-01), Roytman et al.
patent: 2003/0028631 (2003-02-01), Rhodes
patent: 2003/0070084 (2003-04-01), Satomaa et al.
patent: 2003/0108042 (2003-06-01), Skillicorn et al.
patent: 2004/0034794 (2004-02-01), Mayer et al.
patent: 2008/0016569 (2008-01-01), Hammer et al.
Sinclair, C.; Pierce, L.; Matzner, S. “An application of machine learning to network intrusion detection”. In Proceedings of the 15th Annual Computer Security Applications Conference, 1999. (ACSAC ′99). Dec. 6-10, 1999, pp. 371-377.
Perrochon, L.; Eunhei Jang; Kasriel, S.; Luckham, D.C. “Enlisting event patterns for cyber battlefield awareness”. In Proceedings of DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00. vol. 2, Jan. 25-27, 2000 pp. 411-422 vol. 2.
F. Cuppens, “Managing Alerts in a Multi-Intrusion Detection Environment,” acsac, p. 0022, 17th Annual Computer Security Applications Conference (ACSAC'01), 2001.
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle. GrIDS—a graph based intrusion detection system for large networks. In Proceedings of the 19th National Information Systems Security Conference, vol. 1, pp. 361-370, Oct. 1996. http://citeseer.ist.psu.edu/article/staniford.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Method, computer program element and a system for processing... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Method, computer program element and a system for processing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method, computer program element and a system for processing... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4018461

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.