Real-time network attack pattern detection system for...

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S024000, C726S025000, C713S188000, C713S189000, C709S224000, C709S225000, C709S229000

Reexamination Certificate

active

07571477

ABSTRACT:
In a real-time network attack pattern detection system and method, a common pattern is detected in real time from packets, which are suspected to be a network attack such as Worm, to effectively block the attack. The system includes: a suspicious packet detector for classifying a suspicious attack packet from all input packets; a first data delaying unit for receiving the input packet from the suspicious packet detector to output an one-clock delayed data; a second data delaying unit for receiving an output signal from the first data delaying unit to output an one-clock delayed data; a hash key generator for receiving an output data of the suspicious packet detector, an output data of the first data delaying unit and an output data of the second data delaying unit to generate a hash key; a hash table for storing a lookup result obtained by the hash key generated from the hash key generator; and an existence & hit checker for checking the lookup result of the hash table.

REFERENCES:
patent: 7134143 (2006-11-01), Stellenberg et al.
patent: 2003/0145225 (2003-07-01), Bruton et al.
patent: 2004/0003284 (2004-01-01), Campbell et al.
patent: 2004/0098623 (2004-05-01), Scheidell
patent: 2004/0117478 (2004-06-01), Triulzi et al.
patent: 2007/0094728 (2007-04-01), Julisch et al.
patent: 1020040008375 (2004-01-01), None
Yu et al., “Gigabit Rate Packet Pattern-Matching Using TCAM”, 2004, Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP '04).
Cho et al., “Programmable Hardware for Deep Packet Filtering on a Large Signature Set”, 2004, EE Department, University of CA, www.arl.wustl.edu/˜young/pub/pac204.pdf.
Desai N., “Increasing Performance in HIgh Speed NIDS, a look at Snort's Internal”, Feb. 2002.
Hyang-Ah Kim, et al.; “Autograph: Toward Automated, Distributed Worm Signature Detection”, 2004.
Lok-Lam Cheng, et al.; “Approximate String Matching in DNA Sequences”, Mar. 2003.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Real-time network attack pattern detection system for... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Real-time network attack pattern detection system for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Real-time network attack pattern detection system for... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4113780

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.