Information security – Access control or authentication – Network
Reexamination Certificate
2008-09-09
2008-09-09
Kincaid, Kristine (Department: 2139)
Information security
Access control or authentication
Network
C707S793000, C707S793000, C726S006000, C726S007000, C726S029000
Reexamination Certificate
active
10985749
ABSTRACT:
A system and method are disclosed for providing security for a computer network. Content sets are generated for a computer associated with the network. It is determined whether a user should be routed to the generated content sets. If it is determined that the user should be routed to the generated content sets, a generated content set is selected and the user is so routed. Various actions and events may be recorded in a logfile, and the logfile is analyzed using regular expressions.
REFERENCES:
patent: 4719566 (1988-01-01), Kelley
patent: 5278901 (1994-01-01), Shieh et al.
patent: 5345590 (1994-09-01), Ault et al.
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5928363 (1999-07-01), Ruvolo
patent: 5961644 (1999-10-01), Kurtzberg et al.
patent: 5991881 (1999-11-01), Conkin et al.
patent: 6321338 (2001-11-01), Porras et al.
patent: 6470384 (2002-10-01), O'Brien et al.
patent: 6484203 (2002-11-01), Porras et al.
patent: 6560611 (2003-05-01), Nine et al.
patent: 6647400 (2003-11-01), Moran
patent: 6704874 (2004-03-01), Porras et al.
patent: 6708212 (2004-03-01), Porras et al.
patent: 6711615 (2004-03-01), Porras et al.
patent: 2002/0066034 (2002-05-01), Schlossberg et al.
patent: 2002/0144156 (2002-10-01), Copeland, III
Network Associates, “Network Associates Ships Cybercop Sting”, Network Associates Incorporated, Jul. 16, 1999, (“NAI”) http://www.serverwatch.com
ews/print.php/1399041, entire article.
Cheswick, Bill, An Evening with Berferd in Which a Cracker is Lured, Endured, and Studied (1990), AT&T Bell Labs.
Cohen, Fred, “A Mathemetical Structure of Simple Defensive Network Deceptions,” http://www.all.net/journal/deception/mathdeception.html, 1999.
Cohen, Fred, “A Note on the Role of Deception in Information Protection”, http://www.all.net/journal/deception/deception.html, 1998.
“CyberCop Sting—Industry's First ‘Decoy’ Server Silently Traces and Tracks Hacker Activity,” University of Wollongong, Australia via Web site, 1999.
“IDS: RE: cybercop sting”, Michael Staggs, University of Wollongong, Australia, Oct. 8, 1999.
“Decoy Nets gain backers in battle against hackers”, Network World Mar. 6, 2001.
Messmer, Ellen Decoy Server Helps Track Down Hackers, NW Fusion Focus, Newsgroups:alt2600, news:37b88c 12.9479112@netnews.worldnet.att.net, Aug. 1999.
Cohen, Fred, “Internet Holes-Internet Lightning Rods”, Management Analytics 1996.
Even, Loras R., What is a Honeypot? Honey Pot Systems Explained, http://sans.org
ewlook/resources/IDFAQ/honeypot3.htm.
Honeynet.Org Know Your Enemy: Honeynets, Honeynet Project web site, Apr. 21, 2001, http://web.archive.org/web/20010428053525/http://project.honeynet.org.
Spitzner, Lance, “To Build a Honeypot”, http://web.archive.org/web/19991013141306/http://enteract.com/˜lspitz/honeypot.html, Jun. 28, 2002.
“Network Associates Ships Cybercop Sting—Industry's First ‘Decoy’ Server Silently Traces and Tracks Hacker Activity”, http://www.inforwar.com/P and s/99/p n s 071699d i.shtml, Jun. 28, 2002.
Neville, Alan, “IDS Logs in Forensics Investigations: An Analysis of a Compromised Honeypot”. SecurityFocus, 2004. http://www.securityfocus.com/printable/infocus/1676, entire document.
Honeynet.org, “Know Your Enemy: Defining Virtual Honeynets”, Honeynet.org, Honeynet project, Jan. 27, 2003. http://www.honeynet.org/papers/virtual/index.html, entire document.
Honeynet.org, “Know Your Enemy: Genil Honeynets”, Honeynet.org, Honeynet project, Nov. 3, 2003, http://www.honeynet.org/papers/gen2/index.html, entire document.
Lyle Michael
Maricondo James R.
Ross Robert F.
Sorkin Stephen
Baum Ronald
Kincaid Kristine
Symantec Corporation
Van Pelt & Yi & James LLP
LandOfFree
System and method for computer security using multiple cages does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for computer security using multiple cages, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for computer security using multiple cages will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3912915