Network security modeling system and method

Data processing: structural design – modeling – simulation – and em – Simulating electronic device or electrical system

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S224000

Reexamination Certificate

active

07315801

ABSTRACT:
A network security modeling system which simulates a network and analyzes security vulnerabilities of the network. The system includes a simulator which includes a network vulnerabilities database and a network configuration module having network configuration data. The simulator determines vulnerabilities of the simulated network based on the network configuration data and the vulnerabilities database.

REFERENCES:
patent: 4937825 (1990-06-01), Ballard et al.
patent: 4942573 (1990-07-01), Woodward
patent: 5558339 (1996-09-01), Perlman
patent: 5662478 (1997-09-01), Smith, Jr.
patent: 5684957 (1997-11-01), Kondo et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5864683 (1999-01-01), Boebert et al.
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 6014697 (2000-01-01), Lewis et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6253337 (2001-06-01), Maloney et al.
patent: 6282546 (2001-08-01), Gleichauf et al.
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6321338 (2001-11-01), Porras et al.
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6343362 (2002-01-01), Ptacek et al.
patent: 6352479 (2002-03-01), Sparks, II
patent: 6370648 (2002-04-01), Diep
patent: 6393386 (2002-05-01), Zager et al.
patent: 6408391 (2002-06-01), Huff et al.
patent: 6442694 (2002-08-01), Bergman et al.
patent: 6535227 (2003-03-01), Fox et al.
patent: 6574737 (2003-06-01), Kingsford et al.
Ghosh, S.; Robinson, P. “A framework for investigating security attacks in ATM networks,” IEEE Military Communications Conference Proceedings. MILCOM 1999. vol. 1□□pp. 724-728.
Smith, R.N.; Bhattacharya, S. “A protocol and simulation for distributed communicating firewalls,” Proceedings of the Twenty-Third Annual International Computer Software and Applications Conference, COMPSAC ′99. pp. 74-79.
Samfat, D.; Devernay, V.; Bonnet, C. “A GSM simulation platform for intursion detection,” IEEE International Conference on Communications, ICC ′95 Seattle, ‘Gateway to Globalization’, vol. 2, pp. 766-770.
Steve Jackson, “Hacker, The Computer Crime and Card Game”, Steve Jackson Games Incorporated, ISBN 1-55634-222-5, 1992, pp. 1-8 and Hacker Card List (one page).
Johna Till Johnson, “Simulated Attack for Real Netwrok Security”, Data Communications Nov. 21, 1995; 24, 16 ABI/FORM Global, pp. 31 and 32.
Bart Farkas “Prima's Official Strategy Guide” StarCraft Expansion Set Brood War Prima Publishing, 1998, pp. 215-222.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Network security modeling system and method does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Network security modeling system and method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Network security modeling system and method will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2814832

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.