Data processing: structural design – modeling – simulation – and em – Simulating electronic device or electrical system
Reexamination Certificate
2008-01-01
2008-01-01
Rodriguez, Paul (Department: 2123)
Data processing: structural design, modeling, simulation, and em
Simulating electronic device or electrical system
C709S224000
Reexamination Certificate
active
07315801
ABSTRACT:
A network security modeling system which simulates a network and analyzes security vulnerabilities of the network. The system includes a simulator which includes a network vulnerabilities database and a network configuration module having network configuration data. The simulator determines vulnerabilities of the simulated network based on the network configuration data and the vulnerabilities database.
REFERENCES:
patent: 4937825 (1990-06-01), Ballard et al.
patent: 4942573 (1990-07-01), Woodward
patent: 5558339 (1996-09-01), Perlman
patent: 5662478 (1997-09-01), Smith, Jr.
patent: 5684957 (1997-11-01), Kondo et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 6014697 (2000-01-01), Lewis et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6253337 (2001-06-01), Maloney et al.
patent: 6282546 (2001-08-01), Gleichauf et al.
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6321338 (2001-11-01), Porras et al.
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6343362 (2002-01-01), Ptacek et al.
patent: 6352479 (2002-03-01), Sparks, II
patent: 6370648 (2002-04-01), Diep
patent: 6393386 (2002-05-01), Zager et al.
patent: 6408391 (2002-06-01), Huff et al.
patent: 6442694 (2002-08-01), Bergman et al.
patent: 6535227 (2003-03-01), Fox et al.
patent: 6574737 (2003-06-01), Kingsford et al.
Ghosh, S.; Robinson, P. “A framework for investigating security attacks in ATM networks,” IEEE Military Communications Conference Proceedings. MILCOM 1999. vol. 1□□pp. 724-728.
Smith, R.N.; Bhattacharya, S. “A protocol and simulation for distributed communicating firewalls,” Proceedings of the Twenty-Third Annual International Computer Software and Applications Conference, COMPSAC ′99. pp. 74-79.
Samfat, D.; Devernay, V.; Bonnet, C. “A GSM simulation platform for intursion detection,” IEEE International Conference on Communications, ICC ′95 Seattle, ‘Gateway to Globalization’, vol. 2, pp. 766-770.
Steve Jackson, “Hacker, The Computer Crime and Card Game”, Steve Jackson Games Incorporated, ISBN 1-55634-222-5, 1992, pp. 1-8 and Hacker Card List (one page).
Johna Till Johnson, “Simulated Attack for Real Netwrok Security”, Data Communications Nov. 21, 1995; 24, 16 ABI/FORM Global, pp. 31 and 32.
Bart Farkas “Prima's Official Strategy Guide” StarCraft Expansion Set Brood War Prima Publishing, 1998, pp. 215-222.
Apostal David
Dowd Alan
Foote-Lennox Tomo
Lu Raymond
Markham Thomas R.
Craig Dwin McTaggart
Rodriguez Paul
Schwegman Lundberg & Woessner, P.A.
Secure Computing Corporation
LandOfFree
Network security modeling system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Network security modeling system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network security modeling system and method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2814832