Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2005-06-14
2005-06-14
Moise, Emmanuel L. (Department: 2136)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C707S793000, C707S793000
Reexamination Certificate
active
06907533
ABSTRACT:
A system and method are disclosed for providing security for a computer network. Content sets are generated for a computer associated with the network. It is determined whether a user should be routed to the generated content sets. If it is determined that the user should be routed to the generated content sets, a generated content set is selected and the user is so routed. Various actions and events may be recorded in a logfile, and the logfile is analyzed using regular expressions.
REFERENCES:
patent: 4719566 (1988-01-01), Kelley
patent: 5278901 (1994-01-01), Shieh et al.
patent: 5345590 (1994-09-01), Ault et al.
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5928363 (1999-07-01), Ruvolo
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6470384 (2002-10-01), O'Brien et al.
patent: 6560611 (2003-05-01), Nine et al.
patent: 6647400 (2003-11-01), Moran
patent: 2002/0066034 (2002-05-01), Schlossberg
patent: 2002/0144156 (2002-10-01), Copeland, III
Neville, Alan, “IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot,” SecurityFocus, 2004, http://www.securityfocus.com/printable/infoucs/1676, entire document.
Honeynet.org, “Know Your Enemy: Defining Virtual Honeynets”, Honeynet.org, Honeynet project, Jan. 27, 2003, http://www.honeynet.org/papers/virtual/index.html, entire document.
Honeynet.org, “Know Your Enemy: Genll Honeynets”, Honeynet.org, Honeynet project, Nov. 3, 2003, http://www.honeynet.org/papers/gen2/index.html, entire document.
Cheswick, Bill, An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied (1990), AT&T Bell Labs.
Cohen, Fred, “A Mathematical Structure of Simple Defensive Network Deceptions,” http://www.all.net/journal/deception/mathdeception.html, 1999.
Cohen, Fred, “A Note on the Role of Deception in Information Protection”, http://www.all.net/journal/deception/deception.html, 1998.
“CyberCop Sting-Industry's First ‘Decoy’ Server Silently Traces and Tracks Hacker Activity,” University of Wollongong, Australia via Web site, 1999.
“IDS: RE: cybercob sting”, Michael Staggs, University of Wollongong, Australia, Oct. 8, 1999.
“Decoy Nets gain backers in battle against hackers”, Network World Mar. 6, 2001.
Messmer, Ellen Decoy Server Helps Track Down Hackers, NW Fusion Focus, Newsgroups:alt2600, news:37b88c 12.9479112@netnews.worldnet.att.net, Aug. 1999.
Cohen, Fred, “Internet Holes-Internet Lightning Rods”, Management Analytics 1996.
Even, Loras R., What is a Honeypot? Honey Pot Systems Explained, http://sans.org
ewlook/resources/IDFAQ/honeypot3.htm.
Honeynet.Org Know Your Enemy: Honeynets, Honeynet Project web site, Apr. 21, 2001, http://web.archive.org/web/20010428053525/http://project.honeynet.org.
Spitzner, Lance, “To Build a Honeypot”, http://web.archive.org/web/19991013141306/http://enteract.com/˜Ispitz/honeypot.html, Jun. 28, 2002.
“Network Associates Ships Cybercop Sting—Industry's First ‘Decoy’ Server Silently Traces and Tracks Hacker Activity”, http://www.inforwar.com/P and s/99/p n s 071699d i.shtml, Jun. 28, 2002.
Lyle Michael
Maricondo James R.
Ross Robert F.
Sorkin Stephen
Baum Ronald
Moise Emmanuel L.
Symantec Corporation
Van Pelt & Yi LLP
LandOfFree
System and method for computer security using multiple cages does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for computer security using multiple cages, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for computer security using multiple cages will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3478877