Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2006-08-15
2006-08-15
Wright, Norman M. (Department: 2134)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C726S024000
Reexamination Certificate
active
07093294
ABSTRACT:
A system and method for detecting a drone implanted by a vandal in a network connected host device such as a computer, and controlling the output of the drone. The system includes an inbound intrusion detection system (IDS), an outbound IDS, a blocker such as a firewall, an inbound trace log for storing a trace of inbound traffic to the protected device, an outbound trace log for storing a trace of outbound traffic from the protected device, and a correlator. When the outbound IDS detects outbound distributed denial of service (DDoS) traffic, the outbound IDS instructs the blocker to block the outbound DDos traffic. The correlator then recalls the outbound trace log and the inbound trace log, correlates the logs, and deduces the source ID of a message responsible for triggering the drone. The correlator then instructs the blocker to block incoming messages that bear the source ID.
REFERENCES:
patent: 5311593 (1994-05-01), Carmi
patent: 5606668 (1997-02-01), Shwed
patent: 5623600 (1997-04-01), Ji et al.
patent: 5745686 (1998-04-01), Saito et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5867651 (1999-02-01), Dan et al.
patent: 5884033 (1999-03-01), Duvall et al.
patent: 5905859 (1999-05-01), Holloway et al.
patent: 5909493 (1999-06-01), Motoyama
patent: 5918008 (1999-06-01), Togawa et al.
patent: 5928363 (1999-07-01), Ruvolo
patent: 5983270 (1999-11-01), Abraham et al.
patent: 6009526 (1999-12-01), Choi
patent: 6073240 (2000-06-01), Kurtzberg et al.
patent: 6161182 (2000-12-01), Nadooshan
patent: 6304262 (2001-10-01), Maloney et al.
patent: 6487664 (2002-11-01), Kellum
patent: 2001/0043217 (2001-11-01), Maloney et al.
patent: 2002/0013911 (2002-01-01), Cordella et al.
Cheung, S. et al. “A Formal-Specification Based Approach for Protecting the Domain Name System”, Dependable Systems and Networks, 2000. DSN 2000. Proceedings International Conference, pp. 641-651.
Keating, T. “Tom vs. Hacker-A True Story”, Communications Solutions, Apr. 2000.
Lingafelt Charles Steven
Yell Nigel Birkbeck
International Buisiness Machines Corporation
Irvin David R.
Pivnichny John R.
Wright Norman M.
LandOfFree
System and method for detecting and controlling a drone... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for detecting and controlling a drone..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for detecting and controlling a drone... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3653729