System and method for computer security using multiple cages

Information security – Access control or authentication – Network

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C707S793000, C707S793000, C726S006000, C726S007000, C726S029000

Reexamination Certificate

active

10985749

ABSTRACT:
A system and method are disclosed for providing security for a computer network. Content sets are generated for a computer associated with the network. It is determined whether a user should be routed to the generated content sets. If it is determined that the user should be routed to the generated content sets, a generated content set is selected and the user is so routed. Various actions and events may be recorded in a logfile, and the logfile is analyzed using regular expressions.

REFERENCES:
patent: 4719566 (1988-01-01), Kelley
patent: 5278901 (1994-01-01), Shieh et al.
patent: 5345590 (1994-09-01), Ault et al.
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5928363 (1999-07-01), Ruvolo
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 5991881 (1999-11-01), Conkin et al.
patent: 6321338 (2001-11-01), Porras et al.
patent: 6470384 (2002-10-01), O'Brien et al.
patent: 6484203 (2002-11-01), Porras et al.
patent: 6560611 (2003-05-01), Nine et al.
patent: 6647400 (2003-11-01), Moran
patent: 6704874 (2004-03-01), Porras et al.
patent: 6708212 (2004-03-01), Porras et al.
patent: 6711615 (2004-03-01), Porras et al.
patent: 2002/0066034 (2002-05-01), Schlossberg et al.
patent: 2002/0144156 (2002-10-01), Copeland, III
Network Associates, “Network Associates Ships Cybercop Sting”, Network Associates Incorporated, Jul. 16, 1999, (“NAI”) http://www.serverwatch.com
ews/print.php/1399041, entire article.
Cheswick, Bill, An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied (1990), AT&T Bell Labs.
Cohen, Fred, “A Mathemetical Structure of Simple Defensive Network Deceptions,” http://www.all.net/journal/deception/mathdeception.html, 1999.
Cohen, Fred, “A Note on the Role of Deception in Information Protection”, http://www.all.net/journal/deception/deception.html, 1998.
“CyberCop Sting—Industry's First ‘Decoy’ Server Silently Traces and Tracks Hacker Activity,” University of Wollongong, Australia via Web site, 1999.
“IDS: RE: cybercop sting”, Michael Staggs, University of Wollongong, Australia, Oct. 8, 1999.
“Decoy Nets gain backers in battle against hackers”, Network World Mar. 6, 2001.
Messmer, Ellen Decoy Server Helps Track Down Hackers, NW Fusion Focus, Newsgroups:alt2600, news:37b88c 12.9479112@netnews.worldnet.att.net, Aug. 1999.
Cohen, Fred, “Internet Holes-Internet Lightning Rods”, Management Analytics 1996.
Even, Loras R., What is a Honeypot? Honey Pot Systems Explained, http://sans.org
ewlook/resources/IDFAQ/honeypot3.htm.
Honeynet.Org Know Your Enemy: Honeynets, Honeynet Project web site, Apr. 21, 2001, http://web.archive.org/web/20010428053525/http://project.honeynet.org.
Spitzner, Lance, “To Build a Honeypot”, http://web.archive.org/web/19991013141306/http://enteract.com/˜lspitz/honeypot.html, Jun. 28, 2002.
“Network Associates Ships Cybercop Sting—Industry's First ‘Decoy’ Server Silently Traces and Tracks Hacker Activity”, http://www.inforwar.com/P and s/99/p n s 071699d i.shtml, Jun. 28, 2002.
Neville, Alan, “IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot”. SecurityFocus, 2004. http://www.securityfocus.com/printable/infocus/1676, entire document.
Honeynet.org, “Know Your Enemy: Defining Virtual Honeynets”, Honeynet.org, Honeynet project, Jan. 27, 2003. http://www.honeynet.org/papers/virtual/index.html, entire document.
Honeynet.org, “Know Your Enemy: Genil Honeynets”, Honeynet.org, Honeynet project, Nov. 3, 2003, http://www.honeynet.org/papers/gen2/index.html, entire document.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for computer security using multiple cages does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for computer security using multiple cages, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for computer security using multiple cages will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3912915

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.