Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2007-06-12
2007-06-12
Sheikh, Ayaz (Department: 2131)
Information security
Monitoring or scanning of software or data including attack...
C726S013000, C726S014000
Reexamination Certificate
active
09900001
ABSTRACT:
Outgoing data units, such as packets, from a computer system that contain data characteristic of an operating system executing on the computer system are intercepted before they are transmitted on a network and masked to impersonate a different operating system if the network is untrusted. The masking may be to re-fingerprint the data units by replacing the data characteristic of the actual operating system with data characteristic of the different operating system. Alternatively, the masking may require discarding the data unit and not transmitting it.
REFERENCES:
patent: 5606668 (1997-02-01), Shwed
patent: 5835726 (1998-11-01), Shwed et al.
patent: 6006328 (1999-12-01), Drake
patent: 6073209 (2000-06-01), Bergsten
patent: 6247148 (2001-06-01), Annicchiarico et al.
patent: 6253321 (2001-06-01), Nikander et al.
patent: 6289463 (2001-09-01), Fink
patent: 6397335 (2002-05-01), Franczek et al.
patent: 6651132 (2003-11-01), Traut
patent: 6678734 (2004-01-01), Haatainen et al.
patent: 6687762 (2004-02-01), Van Gaasbeck et al.
patent: 6757841 (2004-06-01), Gitlin et al.
patent: 6779039 (2004-08-01), Bommareddy et al.
patent: 2002/0083344 (2002-06-01), Vairavan
patent: 2006/0206892 (2006-09-01), Vega et al.
patent: 2006/0242704 (2006-10-01), Aviani et al.
Bellovin et al, Network Firewalls, 1994, IEEE, pp. 50-57.
Mazieres et al, Secure Applications Need Flexible Operating Systems, 1997, IEEE, pp. 56-61.
Epstein et al, Using Operating System Wrappers to Increase the Resiliency of Commercial Firewalls, 2000, IEEE, pp. 236-245.
Pogue, David, Making Windows More Secure, 2004, The New York Times, p. G.1.
“Falsify Your BSD OS Fingerprint”, http://www.pkcrew.org/tools.html, provided by Cthulhu, Oct. 2, 2001, 1 page.
“Network Scanning Techniques, Understanding How It Is Done”, Ofir Arkin Publication Communications Solutions, Nov. 1999, pp. 1-17.
“ICMP Stands For Trouble”, Rik Farrow, Network Magazine, Sep. 5, 2000, www.networkmagazine.com/article/NMG20000829S0003, 4 pages, Apr. 23, 2001.
“ICMP Usage In Scanning”, Ofir Arkin, Jul. 2000, pp. 1-45.
“ICMP Usage In Scanning Or Understanding Some Of The ICMP Protocol's Hazards”, Ofir Arkin, Founder—The Sys-Security Group, Version 2.5, Dec. 2000, pp. 1-9 43-45, 59, 68, 74, 77, 84, 87, 89, 107.
Johnston Brent A.
McArdle Mark J.
Hamaty Christopher J.
McAfee, Inc.
Moorthy Aravind K
Sheikh Ayaz
Zilka-Kotab, PC
LandOfFree
Prevention of operating system identification through... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Prevention of operating system identification through..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Prevention of operating system identification through... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3871977