Parallel intrusion detection sensors with load balancing for...

Electrical computers and digital processing systems: multicomput – Computer-to-computer data routing – Least weight routing

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S168000, C713S152000

Reexamination Certificate

active

06954775

ABSTRACT:
Various embodiments of a method and system for detecting unauthorized signatures to or from a local network. Multiple sensors are connected at an internetworking device, which can be a router or a switch. The sensors operate in parallel and each receives a portion of traffic through the internetworking device, at a session-based level or at a lower (packet-based) level. Depending on the type of internetworking device (router or switch) the load balancing mechanism that distributes the packets can be internal or external to the internetworking device. Also depending on the level of packet distribution (session-based or packet-based), the sensors share a network analyzer (if session-based) or both a network analyzer and a session analyzer (if packet-based).

REFERENCES:
patent: 4672572 (1987-06-01), Alsberg
patent: 4769771 (1988-09-01), Lippmann et al.
patent: 5003595 (1991-03-01), Collins et al.
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5101402 (1992-03-01), Chiu et al.
patent: 5278901 (1994-01-01), Shieh et al.
patent: 5365580 (1994-11-01), Morisaki
patent: 5375070 (1994-12-01), Hershey et al.
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5448724 (1995-09-01), Hayashi
patent: 5488715 (1996-01-01), Wainwright
patent: 5524238 (1996-06-01), Miller et al.
patent: 5555377 (1996-09-01), Christensen et al.
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5606668 (1997-02-01), Shwed
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5623601 (1997-04-01), Vu
patent: 5634008 (1997-05-01), Gaffaney et al.
patent: 5682478 (1997-10-01), Watson et al.
patent: 5699513 (1997-12-01), Feigen et al.
patent: 5751964 (1998-05-01), Ordanic et al.
patent: 5757916 (1998-05-01), MacDoran et al.
patent: 5757924 (1998-05-01), Friedman et al.
patent: 5774660 (1998-06-01), Brendel, et al.
patent: 5781550 (1998-07-01), Templin et al.
patent: 5784559 (1998-07-01), Frazier et al.
patent: 5793763 (1998-08-01), Mayes, et al.
patent: 5793951 (1998-08-01), Stein et al.
patent: 5796942 (1998-08-01), Esbensen
patent: 5798706 (1998-08-01), Kraemer et al.
patent: 5805801 (1998-09-01), Holloway et al.
patent: 5826014 (1998-10-01), Coley et al.
patent: 5828846 (1998-10-01), Kirby et al.
patent: 5864666 (1999-01-01), Shrader
patent: 5867647 (1999-02-01), Haigh et al.
patent: 5886643 (1999-03-01), Diebboll et al.
patent: 5892903 (1999-04-01), Klaus
patent: 5918021 (1999-06-01), Aditya
patent: 5919257 (1999-07-01), Trostle
patent: 5931946 (1999-08-01), Terada, et al.
patent: 5958009 (1999-09-01), Friedrich, et al.
patent: 5958053 (1999-09-01), Denker
patent: 5968176 (1999-10-01), Nessett et al.
patent: 5991881 (1999-11-01), Conklin, et al.
patent: 6003030 (1999-12-01), Kenner et al.
patent: 6009475 (1999-12-01), Shrader
patent: 6035404 (2000-03-01), Zhao
patent: 6061650 (2000-05-01), Malkin et al.
patent: 6088804 (2000-07-01), Hill et al.
patent: 6108310 (2000-08-01), Wilkinson et al.
patent: 6128642 (2000-10-01), Doraswamy et al.
patent: 6256306 (2001-07-01), Bellenger
patent: 6279113 (2001-08-01), Vaidya
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6321337 (2001-11-01), Porras, et al.
patent: 6393438 (2002-05-01), Kathrow et al.
patent: 6460082 (2002-10-01), Lumelsky et al.
patent: 6529515 (2003-03-01), Raz et al.
patent: 6550012 (2003-04-01), Villa et al.
patent: 6658565 (2003-12-01), Gupta et al.
patent: 6697103 (2004-02-01), Fernandez et al.
patent: 6738814 (2004-05-01), Cox et al.
patent: 6804778 (2004-10-01), Levi et al.
patent: 6853619 (2005-02-01), Grenot
“Introduction to Algorithms,” by Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, Chapter 34, pp. 853-885, © 1990.
Microsoft Press; Microsoft Corporation, “Microsoft Press Computer Dictionary,” 1997, 3rd Ed., pp. 415 and 454, includes two pages (printouts).
Scambray, J., Infoworld Publications, Inc., “Package Detects Most Intrusions.” Feb. 1998. vol. 20, pp. 43-48.
Millikin M., Horizon House Publications, Inc., “Managing Intranet Complexity with Open-System Tools.” Aug. 1997. vol. 31, pp. S10-S12, includes five pages (printouts).
Thomas, B., Business Wire, “Enigma Logic Introduces Safe Word As Advanced Client Server Software For Secure User Authentication.” May 1995. Section 1, includes two pages (printouts).
“The Design of GrIDS: A Graph-Based Intrusion Detection System,” S. Cheung et al., U.C. Davis Computer Science Department Technical Report SCE99-2, 1999, pp. 147, (found at http://seclab.cs.ucdavis.edu/papers.html.), Jan. 26, 1999.
“Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-Invertible”, M. Bellare, et al., Advances in Cryptology-Eurocrypt 98 Proceedings, Lecture Notes in Computer Science, vol. 1403 Springer-Verlat (1998) pp. 1-27, (found at http://seclab.cs.ucdavis.edu/papers.html.), Oct. 17, 1998.
“Detecting Disruptive Routers: A Distributed Network Monitoring Approach,” K.A. Bradley, et al., Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, CA, pp. 115-124 (found at http://seclab.cs.ucdavis.edu/papers.html.), May 1, 1998.
Abstract entitled “Teaching Computer Security” by M. Bishop, May 1, 1993.
Abstract entitled “Recent Changes to Privacy Enhanced Electronic Mail” by M. Bishop, Journal of Internetworking: Research and Experience. vol. 4, No. 1, pp. 47-59. (found at http://seclab.cs.ucdavis.edu/papers.html), Mar. 1, 1993.
“Analysis Of An Algorithm For Distributed Recognition And Accountability”, Ko et al., Proc. 1st ACM Conference on Computer and Communication Security. Fairfax, VA, Nov. 1993, 11 pages, (found at http://seclab.cs.ucdavis.edu/papers.html).
“Secure RPC Authentication (SRA) for TELNET and FTP,” D.R. Safford, et al., pp. 1-5, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), 1993.
Master Thesis entitled “Paradigms for the Reduction of Audit Trails” by B. Wetmore, pp. i-6. Unable to obtain entire thesis—portion downloaded from http://seclab.cs.ucdavis.edu/papers.html, 1993.
Master Thesis entitled “USTAT A Real-time Intrusion Detection System for UNIX”, Univeristy of California, K. Ilgun, pp. 1-204, (found at http://www.cs.purdue.edu/coast/archive/data/categ24.html), Nov. 1, 1992.
“OARnet Security Procedures”, K. Varadhan, pp. 1-14, (found at http://www.cs.purdue.edu/coast/archive/data.categ30.html), Sep. 15, 1992.
“A Best-Case Network Performance Model”, S.M. Bellovin, pp. 1-10, (found at http://www.cs.purdue.edu/coast/archive/data/categ30.html), Feb. 12, 1992.
“Anatomy of a Proactive Password Changer”, Matt Bishop, Proc. of the UNIX Security Symposium III Baltimore, MD, 15 pages. (found at http://seclab.cs.ucdavis.edu/paper.html), 1992.
Dissertation entitled “Issues in Debugging Sequential and Concurrent Programs: Methods, Techniques, and Implementation”, Univeristy of California, Wingshun Wilson Ho, 191 pages. (found at http://seclab.cs.ucdavis.edu/papers.html), 1992.
“Open System Security—an Architectural Framework”, Arto T. Karila, (found at http://www/cs.purdue.edu/coast/archive/data.categ.30.html), Jun. 30, 1991.
Abstract entitled “Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic Components” by.J. Alves-Foss, K. Levitt, Proc. of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, Oakland CA May 20-22, 1991, pp. 122-135. (found at http://seclab.cs.ucdavis.edu/papers.html), May 1, 1991.
Abstract entitled “Password Management” by M. Bishop, COMPCON Spring '91. Digest of Papers. San Francisco, CA, Feb. 25, 1991, pp. 167-169. (found at http://seclab.cs.ucdavis.edu/papers.html), Mar. 1, 1991.
Abstract entitled “An Authentication Mechanism for USENET” by M. Bishop, Proc. of the Winter 1991 USENIX Conference. Jan. 21-25, 1991, pp. 281-287, (found at http://seclab.cs.ucdavis.edu/papers.html), Jan. 1, 1991.
“DIDS (Distributed Intrusi

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Parallel intrusion detection sensors with load balancing for... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Parallel intrusion detection sensors with load balancing for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Parallel intrusion detection sensors with load balancing for... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3485656

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.