System and method for detecting computer intrusions

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C706S010000, C706S045000, C706S051000

Reexamination Certificate

active

06996843

ABSTRACT:
A system and method are disclosed for detecting intrusions in a host system on a network. The intrusion detection system comprises an analysis engine configured to use continuations and apply forward- and backward-chaining using rules. Also provided are sensors, which communicate with the analysis engine using a meta-protocol in which the data packet comprises a 4-tuple. A configuration discovery mechanism locates host system files and communicates the locations to the analysis engine. A file processing mechanism matches contents of a deleted file to a directory or filename, and a directory processing mechanism extracts deallocated directory entries from a directory, creating a partial ordering of the entries. A signature checking mechanism computes the signature of a file and compares it to previously computed signatures. A buffer overflow attack detector compares access times of commands and their associated files. The intrusion detection system further includes a mechanism for checking timestamps to identify and analyze forward and backward time steps in a log file.

REFERENCES:
patent: 5574898 (1996-11-01), Leblang et al.
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5638509 (1997-06-01), Dunphy et al.
patent: 5649194 (1997-07-01), Miller et al.
patent: 5680585 (1997-10-01), Bruell
patent: 5694590 (1997-12-01), Thuraisingham et al.
patent: 5724569 (1998-03-01), Andres
patent: 5757913 (1998-05-01), Bellare et al.
patent: 5778070 (1998-07-01), Mattison
patent: 5844986 (1998-12-01), Davis
patent: 5958050 (1999-09-01), Griffin et al.
patent: 5960170 (1999-09-01), Chen et al.
patent: 5978791 (1999-11-01), Farber et al.
patent: 6226745 (2001-05-01), Wiederhold
patent: 6321338 (2001-11-01), Porras et al.
patent: 6484203 (2002-11-01), Porras et al.
patent: 6519703 (2003-02-01), Joyce
patent: 6704874 (2004-03-01), Porras et al.
patent: 6708212 (2004-03-01), Porras et al.
patent: 6711615 (2004-03-01), Porras et al.
Lee et al., “Mining in a data-flow environment: experience in network intrusion detection”, Aug. 18, 1999.
Tanenbaum, “Operating Systems Design and Implementation,” 1987, pp. 58-59.
Rebecca Bace, Introduction to Intrusion Detection Assesment, no date, for System and Network Security Management.
Gene H. Kim and Eugene H. Spafford, Writing, Supporting and Evaluating Tripwire: A Publically Available Security Tool, Mar. 12, 1994, Purdue Technical Report; Purdue University.
Douglas B. Moran et al., DERBI: Diagnosis, Explanation and Recovery From Break-Ins, no date, Artificial Intelligence Center SRI International.
Mabry Tyson, Ph.D., Explaining and Recovering From Computer Break-Ins, Jan. 12, 2001, SRI International.
Aleph One, Smashing the Stack for Fun and Profit, no date, vol. Seven, Issue Forty-Nine; File 14 of 16 of BugTraq, r00t, and Underground.Org.
Donald C. Latham, Department of Defense Trusted Computer System Evaluation Criteria, Dec. 1985, Department of Defense Standard.
James P. Anderson Co., Computer Security Threat Monitoring and Surveillance, Feb. 26, 1980, Contract 79F296400.
Teresa F. Hunt et al., A Real-Time Intrusion-Detection Expert System (IDES), Feb. 28, 1992, SRI International Project 6784.
Karen L. Myers,A procedural knowledge approach to task-level control,in Proceedings of the Third International Conference on AI Planning Systems, AAAI Press, 1996.
Michael P. Georgeff, Francois Felix Ingrand,Real-Time Reasoning: The Monitoring and Control of Spacecraft Systems,in Proceedings of the Sixth IEEE Conference on Artificial Intelligence Applications, 1990.
Michael P. Georgeff, Francois Felix Ingrand,Decision-Making in an Embedded Reasoning System,in Proceedings of IJCAI89, Detroit, MI, 1989.
Michael P. Georgeff, Amy L. Lansky,Reactive reasoning and planning: an experiment with a mobile robot,in Proceedings of AAAI87, 1987.
Michael P. Georgeff, Amy L. Lansky,Procedural Knowledge,in Proceedings of the IEEE Special Issue on Knowledge Representation, vol. 74, pp. 1383-1398, 1986.
Michael P. Georgeff, Amy L. Lansky,A Procedural Logic,in Proceedings of IJCAI85, Los Angeles, CA, 1985.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for detecting computer intrusions does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for detecting computer intrusions, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for detecting computer intrusions will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3647761

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.