Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2005-03-24
2009-08-04
Tran, Tongoc (Department: 2434)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C726S024000, C726S025000, C713S188000, C713S189000, C709S224000, C709S225000, C709S229000
Reexamination Certificate
active
07571477
ABSTRACT:
In a real-time network attack pattern detection system and method, a common pattern is detected in real time from packets, which are suspected to be a network attack such as Worm, to effectively block the attack. The system includes: a suspicious packet detector for classifying a suspicious attack packet from all input packets; a first data delaying unit for receiving the input packet from the suspicious packet detector to output an one-clock delayed data; a second data delaying unit for receiving an output signal from the first data delaying unit to output an one-clock delayed data; a hash key generator for receiving an output data of the suspicious packet detector, an output data of the first data delaying unit and an output data of the second data delaying unit to generate a hash key; a hash table for storing a lookup result obtained by the hash key generated from the hash key generator; and an existence & hit checker for checking the lookup result of the hash table.
REFERENCES:
patent: 7134143 (2006-11-01), Stellenberg et al.
patent: 2003/0145225 (2003-07-01), Bruton et al.
patent: 2004/0003284 (2004-01-01), Campbell et al.
patent: 2004/0098623 (2004-05-01), Scheidell
patent: 2004/0117478 (2004-06-01), Triulzi et al.
patent: 2007/0094728 (2007-04-01), Julisch et al.
patent: 1020040008375 (2004-01-01), None
Yu et al., “Gigabit Rate Packet Pattern-Matching Using TCAM”, 2004, Proceedings of the 12th IEEE International Conference on Network Protocols (ICNP '04).
Cho et al., “Programmable Hardware for Deep Packet Filtering on a Large Signature Set”, 2004, EE Department, University of CA, www.arl.wustl.edu/˜young/pub/pac204.pdf.
Desai N., “Increasing Performance in HIgh Speed NIDS, a look at Snort's Internal”, Feb. 2002.
Hyang-Ah Kim, et al.; “Autograph: Toward Automated, Distributed Worm Signature Detection”, 2004.
Lok-Lam Cheng, et al.; “Approximate String Matching in DNA Sequences”, Mar. 2003.
Jang Jong Soo
Kim Ki Young
Oh Jintae
Shin Seung Won
Sohn Sung Won
Electronics and Telecommunications Research Institute
Lowe Hauptman & Ham & Berner, LLP
Tran Tongoc
LandOfFree
Real-time network attack pattern detection system for... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Real-time network attack pattern detection system for..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Real-time network attack pattern detection system for... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4113780