Switching network employing virus detection

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000, C726S023000

Reexamination Certificate

active

07895657

ABSTRACT:
In a digital communication infrastructure, intermediate network nodes compare packets from end-point devices with pluralities of virus templates. Upon detecting matches, virus service functions are invoked which interrupt the packet flow. Network wide template and service functionality updating is provided to service pluralities of virus service software vendors. Non-repetitive detection processing minimizes network load. Virus service functions may execute locally and/or remotely. Servicing may include dropping packets containing virus codes or, processing and routing the packets. Pop-up messages revealing underlying template matches are delivered with human challenge mechanism. The network nodes may be routers, packet switching exchanges, switches, access points, Internet service provider equipment, etc. External vendor servers and server clusters may assist network nodes in detecting and processing packets for virus codes.

REFERENCES:
patent: 6195698 (2001-02-01), Lillibridge
patent: 6393568 (2002-05-01), Ranger
patent: 6678272 (2004-01-01), Tzeng
patent: 2002/0007453 (2002-01-01), Nemovicher
patent: 2002/0032880 (2002-03-01), Poletto et al.
patent: 2002/0069370 (2002-06-01), Mack
patent: 2002/0087885 (2002-07-01), Peled
patent: 2002/0129140 (2002-09-01), Peled
patent: 2002/0129237 (2002-09-01), Radatti
patent: 2003/0041259 (2003-02-01), Vignoles et al.
patent: 2003/0172262 (2003-09-01), Curry
patent: 2005/0050338 (2005-03-01), Liang
patent: 2005/0050362 (2005-03-01), Peles
patent: 2005/0210533 (2005-09-01), Copeland
patent: 2005/0232262 (2005-10-01), Toumura
patent: 2005/0238005 (2005-10-01), Chen et al.
patent: 2005/0251486 (2005-11-01), Nair
patent: 2005/0278784 (2005-12-01), Gupta
patent: 2006/0072582 (2006-04-01), Bronnimann
patent: 2006/0075494 (2006-04-01), Bertman
patent: 2006/0085528 (2006-04-01), Thomas
patent: 2006/0095971 (2006-05-01), Costea
patent: 2006/0174345 (2006-08-01), Flanagan
patent: 2006/0248575 (2006-11-01), Levow
patent: 1063833 (2000-12-01), None
patent: 1335559 (2003-08-01), None
patent: 1560398 (2005-01-01), None
patent: 1699204 (2006-09-01), None
patent: 2004 0102907 (2004-12-01), None
patent: WO 97/12321 (1997-04-01), None
patent: WO 0219639 (2002-03-01), None
patent: WO 2004/091158 (2004-10-01), None
patent: WO 2005/017708 (2005-02-01), None
patent: WO 2005/064498 (2005-07-01), None
Gentoo Linux, “Firewalls” http://www.gentoo.org/doc/en/security/security-handbook.xml?part=1&chap=12 Internet Archive Wayback Machine used. Apr. 2006, pp. 1-13.
GFi “Why One Virus Engine is Not Enough” white paper. http://www.gfi.com/whitepapers/why-one-virus-engine-is-not-enough.pdf Internet Archive Wayback Machine Used. Jul. 2004. pp. 1-4.
Yoo, “Adaptive Firewall Model to Detect Email Viruses”, Security Technology 2004 38th Annual 2004 International Carnahan Congerence, Oct. 2004, pp. 1-2.
Maya Gokhale et al; “Granidt: Towards Gigabit Rate network Intrusion Detection Technology”; FPL 2002, Montpellier,France.
Dharmapurikar S. et al; “Deep Packet Inspection Using Parallel Bloom Filters”; IEEE Micro, IEEE Service Center Los Alamitos, CA,US Jan. 2004.
Steve White, et al; “Anatomy of a Commercial-Grade Immune System”; Internet Citation, Jun. 1999 (XP-002310183).
Young H. Cho, et al; “A Pattern Matching Co-processor for Network Security”; DAC 05; Proceedings of the 42nd Annual Conf. on Design Automation Jun. 13, 2005.
Shanmugasundaram Kulesh et al; “Payload Attribution via Hierarchical Bloom Filters”; Proc ACM Conf Computer Commun Secur; Proceedings of the ACM Conf on Computer & Comm. 2004 (XP002453251).
Cisco; “Committed Access Rate”; Internet Citation 1999 (XP-002375164).
Cisco ISP Essentials; Internet Citation Jun. 6, 2001 (XP-002217477).
David Whyte, et al; “DNS-Based Detection of Scanning Worms in an Enterprise Network”;Security Symposium, Feb. 4, 2005 (XP-002412148).

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Switching network employing virus detection does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Switching network employing virus detection, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Switching network employing virus detection will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2622136

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.