Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2003-09-10
2008-12-30
Moazzami, Nasser (Department: 2136)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
Reexamination Certificate
active
07472422
ABSTRACT:
A system uses automatic feedback and control to secure a network infrastructure by iterative convergence of the network's security structure to meet a security policy. Following initialization, a security feedback control system of the security management system makes dynamic adjustments to the system using bi-directional services that are controlled via policy decision components, without user intervention.
REFERENCES:
patent: 5317741 (1994-05-01), Schwanke
patent: 5440742 (1995-08-01), Schwanke
patent: 5649200 (1997-07-01), Leblang et al.
patent: 5862386 (1999-01-01), Joseph et al.
patent: 5893083 (1999-04-01), Eshghi et al.
patent: 5898872 (1999-04-01), Richley
patent: 6134706 (2000-10-01), Carey et al.
patent: 6182286 (2001-01-01), Sigal et al.
patent: 6223342 (2001-04-01), George
patent: 6257774 (2001-07-01), Stack
patent: 6266773 (2001-07-01), Kisor et al.
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6321338 (2001-11-01), Porras et al.
patent: 6484203 (2002-11-01), Porras et al.
patent: 6601234 (2003-07-01), Bowman-Amuah
patent: 6604110 (2003-08-01), Savage et al.
patent: 6718535 (2004-04-01), Underwood
patent: 6925470 (2005-08-01), Sangudi et al.
patent: 6986102 (2006-01-01), Baer et al.
patent: 7127700 (2006-10-01), Large
patent: 7194730 (2007-03-01), Pramberger
patent: 7272815 (2007-09-01), Eldridge et al.
patent: 2002/0019945 (2002-02-01), Houston et al.
patent: 2004/0193912 (2004-09-01), Li et al.
Schill, A. et al., “Configuration Management for Distributed Object-Oriented Applications”, IEEE CHI pp. 577-581, 1990.
D'Adderio, L. “Configuring software, reconfiguring memories: the influence of integrated systems on knowledge storage, retrieval and reuse”, ACM SAC pp. 726-731, 2002.
Render, H. et al., “An Object-Oriented Model of Software Configuration Management”, ACM pp. 127-139, 1991.
Nguyen, T. et al., “An Infrastructure for Development of Object-Oriented Multi-level Configuration Management Services”, ACM ICSE, pp. 215-224, 2005.
Barrus, J., “Intrusion Detection in Real Time in a Multi-Node, Multi-Host Environment”, Master's Thesis, Naval Postgraduate School, Monterey, CA, i-xii, pp. 1-79, Sep. 1997.
“SNIA CIM Interoperability Demonstration Backgrounder”, Storage Networking Industry Association, pp. 1-2, 2002.
“SNIA Storage Management Initiative CIM/WBEM Technology Backgrounder”, Storage Networking Industry Association, pp. 1-2, 2002.
Hughes, K. and Wohlferd, D., “Say Goodbye to Quirky APIs: Building a WMI Provider to Expose Your Object Info”, pp. 1-16 [online]. Retrieved on Dec. 24, 2002. Retrieved from the internet: URL:http://msdn.microsoft.com/msdnmag/issues/0500/wmiprov/print.asp.
“Common Information Model(CIM)Specification”, Version 2.2, Distributed Management Task Force, Inc., Portland, OR, pp. I-VI, 1-97, Jun. 14, 1999.
Davis, J., “WBEM Services Specification JSR-0048”, Java One, Sun's 2001 Worldwide Java Developer Conference, pp. 1-19, 2001.
Bhat, G., “WBEM Services API and Examples”, Java One, Sun's 2001 Worldwide Java Developer Conference, pp. 20-29, 2001.
Westerinen, A., “Modeling Information In CIM”, Java One, Sun's 2001 Worldwide Java Developer Conference, pp. 31-43, 2001.
Ptacek, T. and Newsham, T., “Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection”, Secure Networks, Inc., pp. 1-63, Jan. 1998.
Yang, J., Ning, P., Wang, X., and Jajodia, S., “Cards: A Distributed System For Detecting Coordinated Attacks”, Center for Secure Information Systems, George Mason University, Fairfax, VA, pp. 1-10, no date.
Magers, D., “Packet Sniffing: An Integral Part of Network Defense”, 9 pgs., May 9, 2002.
King, N. and Weiss, E., “Network Forensics Analysis Tools(NFATs)Reveal Insecurities, Turn Sysadmins Into Systems Detectives”, Information Security, 8 pgs., Feb. 2002.
Trenum, G., “Practical Requirement for Level 2 IDIC Exam”, 15 pgs., no date.
Shimomura, T., “Tsutomu Shimomura's Newsgroup Posting With Technical Detail of the Attack Described by Markoff in NYT”,Random Access,10 pgs., Oct. 12, 1997.
“Dragon 5, An Intrusion Detection System for the Enterprise”, 5 pgs., no date.
Stevens, W.,The Protocols, TCP/IP Illustrated, vol. 1, Addison Wesley Longman, Inc., Reading, MA, pp. vii-xii, 7, 8, 1994.
Sinclair, C., Pierce, L., and Matzner, S., “An Application of Machine Learning to Network Intrusion Detection”, The University of Texas at Austin, Austin, TX, pp. 1-7, no date.
Butterworth, J., “Practical Portion Of Intrusion Detection Immersion Curriculum”, 10 pgs., no date.
Kobi, H., “Beyond SNMP: The Benefits of Collecting Network Event Logs”, Technical White Paper, Network Intelligence® Corporation, Walpole, MA, pp. 1-10, Jun. 2002.
Harp, S., Geib, C., Goldman, R., Heimerdinger, W., Thomas, V., and R.A. Kemmerer Associates, “Argus: An Architecture for Cooperating Intrusion Detection and Mitigation Applications”, Honeywell Technology Center, 18 pgs., no date.
Barrus, J. and Rowe, N., “Distributed Autonomous-Agent Network-Intrusion Detection and Response System”, Proceedings of the 1998 Command and Control Research and Technology Symposium, Monterey, CA, Jun.-Jul. 1998, 12 pgs.
Frincke, D., Tobin, D., McConnell, J., Marconi, J., and Polla, D., “A Framework for Cooperative Intrusion Detection”, Center for Secure and Dependable Software, University of Idaho, Moscow, ID, 13 pgs, 1998.
“Managing Your Network With HP OpenView Network Node Manager”, Hewlett-Packard Company, Fort Collins, CO, pp. 1-675, May 2002.
“HP OpenView Communications Event Correlation Services Developer's Guide and Reference”, Hewlett-Packard Company, Fort Collins, CO, pp. 1-150, Apr. 2001.
“HP OpenView Communications Event Correlation Services SNMP Module”, Hewlett-Packard Company, Fort Collins, CO, pp. 1-62, Apr. 2001.
“HP OpenView Communications Event Correlation Services Administrator's Guide”, Hewlett-Packard Company, Fort Collins, CO, pp. 1-121, Apr. 2001.
Agbabian, P. et al., U.S. Appl. No. 10/660,422, filed Sep. 10, 2003, entitled “Configuration System and Methods Including Configuration Inheritance and Revisioning”, 124 pgs.
Gunnison McKay & Hodgson, L.L.P.
Hoffman Brandon S
Moazzami Nasser
Symantec Corporation
LandOfFree
Security management system including feedback and control does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Security management system including feedback and control, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security management system including feedback and control will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4045807