Presentation of correlated events as situation classes

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S027000, C726S028000, C726S029000, C726S030000, C713S151000, C713S152000, C713S153000, C713S154000, C709S223000, C709S224000, C709S225000, C709S226000, C709S227000

Reexamination Certificate

active

07571480

ABSTRACT:
A method, computer program product, and apparatus for presenting data about security-related events that puts the data into a concise form is disclosed. Events are abstracted into a set data-type. Sets with common elements are grouped together, and summaries of the groups—“situations”—are presented to a user or administrator.

REFERENCES:
patent: 3617640 (1971-11-01), Cichanowicz
patent: 5239459 (1993-08-01), Hunt et al.
patent: 5568471 (1996-10-01), Hershey et al.
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6163257 (2000-12-01), Tracy
patent: 6347374 (2002-02-01), Drake et al.
patent: 6353385 (2002-03-01), Molini et al.
patent: 2002/0073338 (2002-06-01), Burrows et al.
patent: 2002/0078381 (2002-06-01), Farley et al.
patent: 0985995 (2000-03-01), None
patent: 11212831 (1999-08-01), None
patent: 9407339 (1994-03-01), None
patent: 9959321 (1999-11-01), None
“Dynamic Intrusion Detection for Secure Access Enclosure”, IBM Technical Disclosure Bulletin, vol. 36, No. 06B, Jun. 1993, pp. 233-235.
Ning et al., “Modeling Requests Among Cooperating Intrusion Detection Systems”, Computer Communications, vol. 23, No. 17, pp. 1702-1715, Nov. 2000, Abstract.
Perrochon et al., “Enlisting Event Patterns for Cyber Battlefield Awareness”, Proceedings DARPA Information Surviability Conference and Exposition, DISCEX'00, Pt. vol. 2, pp. 411-422, vol. 2, Published Las Alamitos CA, 1999, 2 vol. (xvi+423+425), Abstract.
Bowen et al., “Building survivable Systems: An Integrated Approach Based on Intrusion Detection and Damage Containment”, Proceedings DARPA Information Survivability Conference and Exposition, DISCEX'00 Pt. vol. 2, pp. 84-99 Published Las Alamitos CA 1999 2 vol. (xvi+423+425), Abstract.
Ming et al., “A Large Scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis”, Computer Networks, vol. 31, No. 23-24, pp. 24655-24675, Dec. 14, 1999, Abstract.
Kato et al., “A Real Time Intrusion Detection System (IDS) for Large Scale Networks and its Evaluations”, IEICE Transactions on Communications, vol. E82-B, No. 11, pp. 1817-1825, Nov. 1999, Abstract.
Sekar et al., “On Preventing Intrusions by Process Behaviour Monitoring”, Proceedings of the Workshop on Intrusion Detection and network Monitoring (ID'99), pp. 29-40, Published: Berkley CA 1999, 140 pp., Abstract.
Girardin “An Eye on Network Intruder-Administrator Shootouts”, Proceedings of the Workshop on Intrusion Detection and network Monitoring (ID'99) pp. 19-28, Published Berkley CA 1999, 140 pp., Abstract.
Vigna et al., “NetSTAT: A Network-Based Intrusion Detection System”, Journal of Computer Security, vol. 7 No. 1, pp. 37-71, 1999, Abstract.
Endler, “Intrusion Detection. Applying Machine Learning to Solaris Audit Data”, Proceedings 14th Annual Computer Security Applications Conference (Cat. No. 98EX217) pp. 268-279, Published Los Alamitos, CA, 1998, xiii+365 pp., Abstract.
Bodek et al., “The Data Mining and Analysis of Packet Data for Detecting Network Intrusions: Preliminary Results”, PADD97 Proceedings of the First international Conference on teh Practical Application of Knowledge Discovery and Data Mining, pp. 91-95, Published: Blackpool, UK 1997, 301 pp., Abstract.
White et al., “A Peer-Based Hardware Protocol for Intrusion Detection Sywstems”, MILCOM 96, Conference Proceedings (Cat No. 96CH36008) Pt. vol. 2, pp. 468-472 vol. 2, Published: New York, NY 1996, 3 vol. xxiv+1083pp., abstract.
Winkler, Jr. “A UNIX Prototype for Intrusion and Anomaly Detection in Secure Networks”, 13th National computer security Conference. Proceedings,Information systems Security Stnadards—The Key to the Future, pp. 115-124, vol. 1, Published: Gaithersburg, MD 1990, 2 vol. Xi+839 pp., Abstract.
Winkler, Jr. et al., “Intrusion and Anomaly Detection in Trusted Systems”, Fifth Annual Computer Security Applications Conference (Cat. No. 89TH0287-3), pp. 39-45, Published Los Alamitos, CA 1990, xv+357 pp., Abstract.
Vigna et al., “NetSTAT: a Network Based Intrusion Detection Approach”, Proceedings 14th Annual Computer Security Applications Conference (Cat. No. 98EX217) pp. 25-34, Published Los Alamitos, CA, 1998, xiii+365 pp., Abstract.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Presentation of correlated events as situation classes does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Presentation of correlated events as situation classes, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Presentation of correlated events as situation classes will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4072489

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.