Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2001-10-31
2010-11-16
Colin, Carl (Department: 2433)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C726S022000, C726S024000, C726S025000
Reexamination Certificate
active
07836503
ABSTRACT:
A node of a network for managing an intrusion protection system, the node comprising a memory module for storing data in machine-readable format for retrieval and execution by a central processing unit and an operating system comprising a network stack comprising a protocol driver and a media access control driver and operable to execute an intrusion protection system management application, the management application operable to receive text-file input from an input device, the text-file defining a network-exploit rule and comprising at least one field is provided. A method of distributing command and security updates in a network having an intrusion protection system comprising generating a text-file defining a network-exploit rule and specifying at least one field selected from the group consisting of an ENABLED field value and a SEVERITY level field value during generation of the text-file is provided. A computer-readable medium having stored thereon a set of instructions to be executed, the set of instructions, when executed by a processor, cause the processor to perform a computer method of reading input from an input device of the computer, compiling the input into a machine-readable signature file comprising machine-readable logic representative of the network-exploit rule and a value of at least one field selected from the group consisting of an ENABLED field and a SEVERITY field, evaluating the machine-readable signature file, and determining the value of the at least one field of the machine-readable signature file is provided.
REFERENCES:
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5987611 (1999-11-01), Freund
patent: 6134664 (2000-10-01), Walker
patent: 6279113 (2001-08-01), Vaidya
patent: 6381632 (2002-04-01), Lowell
patent: 6477651 (2002-11-01), Teal
patent: 6578147 (2003-06-01), Shanklin et al.
patent: 6631473 (2003-10-01), Townsend
patent: 6728885 (2004-04-01), Taylor et al.
patent: 7085936 (2006-08-01), Moran
patent: 7116663 (2006-10-01), Liao
patent: 2002/0078381 (2002-06-01), Farley et al.
patent: 2003/0004689 (2003-01-01), Gupta et al.
Koral Ilgun, Richard A. Kemmerer, and Phillip A. Porras; “State Transition Analysis: A Rule-Based Intrusion Detection Approach”; IEEE vol. 21, No. 3, Mar. 1995; pp. 181-199.
Schertz Richard Louis
Tarquini Richard Paul
Colin Carl
Hewlett--Packard Development Company, L.P.
LandOfFree
Node, method and computer readable medium for optimizing... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Node, method and computer readable medium for optimizing..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Node, method and computer readable medium for optimizing... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4238473