System and method for detecting and controlling a drone...

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S024000

Reexamination Certificate

active

07093294

ABSTRACT:
A system and method for detecting a drone implanted by a vandal in a network connected host device such as a computer, and controlling the output of the drone. The system includes an inbound intrusion detection system (IDS), an outbound IDS, a blocker such as a firewall, an inbound trace log for storing a trace of inbound traffic to the protected device, an outbound trace log for storing a trace of outbound traffic from the protected device, and a correlator. When the outbound IDS detects outbound distributed denial of service (DDoS) traffic, the outbound IDS instructs the blocker to block the outbound DDos traffic. The correlator then recalls the outbound trace log and the inbound trace log, correlates the logs, and deduces the source ID of a message responsible for triggering the drone. The correlator then instructs the blocker to block incoming messages that bear the source ID.

REFERENCES:
patent: 5311593 (1994-05-01), Carmi
patent: 5606668 (1997-02-01), Shwed
patent: 5623600 (1997-04-01), Ji et al.
patent: 5745686 (1998-04-01), Saito et al.
patent: 5835726 (1998-11-01), Shwed et al.
patent: 5867651 (1999-02-01), Dan et al.
patent: 5884033 (1999-03-01), Duvall et al.
patent: 5905859 (1999-05-01), Holloway et al.
patent: 5909493 (1999-06-01), Motoyama
patent: 5918008 (1999-06-01), Togawa et al.
patent: 5928363 (1999-07-01), Ruvolo
patent: 5983270 (1999-11-01), Abraham et al.
patent: 6009526 (1999-12-01), Choi
patent: 6073240 (2000-06-01), Kurtzberg et al.
patent: 6161182 (2000-12-01), Nadooshan
patent: 6304262 (2001-10-01), Maloney et al.
patent: 6487664 (2002-11-01), Kellum
patent: 2001/0043217 (2001-11-01), Maloney et al.
patent: 2002/0013911 (2002-01-01), Cordella et al.
Cheung, S. et al. “A Formal-Specification Based Approach for Protecting the Domain Name System”, Dependable Systems and Networks, 2000. DSN 2000. Proceedings International Conference, pp. 641-651.
Keating, T. “Tom vs. Hacker-A True Story”, Communications Solutions, Apr. 2000.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for detecting and controlling a drone... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for detecting and controlling a drone..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for detecting and controlling a drone... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3653729

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.