Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2011-04-12
2011-04-12
Lanier, Benjamin E (Department: 2432)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
Reexamination Certificate
active
07926113
ABSTRACT:
Systems and methods to manage multiple vulnerability scanners distributed across one or more networks using a distributed security management system, herein called a Lightning Console. By distributing multiple scanners across a network, the work load of each scanner may be reduced to significantly reduce the impact on the network routing and switching infrastructure. In addition, scanners may be placed directly behind firewalls for more thorough scanning. Further, scanners may be placed closer to their scanned networks. By placing vulnerability scanners closer, the actual scanning traffic does not cross the core network switch and routing fabric, thereby avoiding potential network outages due to scanning activity. In addition, the closer distance of the scanners to the scanned targets speeds scan times by reducing the distance that the packets must traverse.
REFERENCES:
patent: 4525599 (1985-06-01), Curran et al.
patent: 5541997 (1996-07-01), Pappas et al.
patent: 5715391 (1998-02-01), Jackson et al.
patent: 5721819 (1998-02-01), Galles et al.
patent: 5838919 (1998-11-01), Schwaller et al.
patent: 5844817 (1998-12-01), Lobley et al.
patent: 6154775 (2000-11-01), Coss et al.
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6393568 (2002-05-01), Ranger et al.
patent: 6415321 (2002-07-01), Gleichauf et al.
patent: 6487666 (2002-11-01), Shanklin et al.
patent: 6499107 (2002-12-01), Gleichauf et al.
patent: 6510509 (2003-01-01), Chopra et al.
patent: 6606663 (2003-08-01), Liao et al.
patent: 6704874 (2004-03-01), Porras et al.
patent: 6711127 (2004-03-01), Gorman et al.
patent: 6789202 (2004-09-01), Ko et al.
patent: 6873617 (2005-03-01), Karras
patent: 6882728 (2005-04-01), Takahashi et al.
patent: 6886020 (2005-04-01), Zahavi et al.
patent: 6952779 (2005-10-01), Cohen et al.
patent: 6957348 (2005-10-01), Flowers et al.
patent: 6968377 (2005-11-01), Gleichauf et al.
patent: 7017186 (2006-03-01), Day
patent: 7073198 (2006-07-01), Flowers et al.
patent: 7093287 (2006-08-01), Gusler et al.
patent: 7120148 (2006-10-01), Batz et al.
patent: 7134141 (2006-11-01), Crosbie et al.
patent: 7139819 (2006-11-01), Luo et al.
patent: 7162742 (2007-01-01), Flowers et al.
patent: 7181769 (2007-02-01), Keanini et al.
patent: 7237264 (2007-06-01), Graham et al.
patent: 7243366 (2007-07-01), Medvinsky et al.
patent: 7290145 (2007-10-01), Falkenthros
patent: 7324551 (2008-01-01), Stammers
patent: 7509681 (2009-03-01), Flowers et al.
patent: 7594273 (2009-09-01), Keanini et al.
patent: 7761918 (2010-07-01), Gula et al.
patent: 2001/0034847 (2001-10-01), Gaul, Jr.
patent: 2002/0019945 (2002-02-01), Houston et al.
patent: 2002/0100023 (2002-07-01), Ueki et al.
patent: 2002/0107841 (2002-08-01), Hellerstein et al.
patent: 2002/0166063 (2002-11-01), Lachman, III et al.
patent: 2003/0051026 (2003-03-01), Carter et al.
patent: 2003/0056116 (2003-03-01), Bunker et al.
patent: 2003/0135517 (2003-07-01), Kauffman
patent: 2003/0145225 (2003-07-01), Bruton, III et al.
patent: 2003/0196123 (2003-10-01), Rowland et al.
patent: 2004/0003266 (2004-01-01), Moshir et al.
patent: 2004/0015719 (2004-01-01), Lee et al.
patent: 2004/0042470 (2004-03-01), Cooper et al.
patent: 2005/0068928 (2005-03-01), Smith et al.
patent: 2005/0108578 (2005-05-01), Tajalli et al.
patent: 2005/0128988 (2005-06-01), Simpson et al.
patent: 2005/0188419 (2005-08-01), Dadhia et al.
patent: 2005/0203886 (2005-09-01), Wong
patent: 2005/0203921 (2005-09-01), Newman et al.
patent: 2006/0010245 (2006-01-01), Carnahan
patent: 2006/0018466 (2006-01-01), Adelstein et al.
patent: 2006/0117091 (2006-06-01), Justin
patent: 2007/0169190 (2007-07-01), Kolton et al.
patent: 2007/0277238 (2007-11-01), Margalit et al.
patent: 2008/0047009 (2008-02-01), Overcash et al.
Wack, John, et al., “NIST Special Publication 800-42, Guideline on Network Security Testing”, Computer Security Division, National Institute of Standards and Technology, Oct. 2003, pp. 1-92.
Deraison, Renaud, et al., “Passive Vulnerability Scanning Introduction to NeVo”, Revision 9, Tenable Network Security, Aug. 2003, pp. 1-13.
Deraison, Renaud, et al., “Unified Security Monitoring (USM); Real-Time Situational Awareness of Network Vulnerabilities, Events and Configurations”, Revision 2, Tenable Network Security, Jan. 27, 2009, 12 pages.
Zhang, Yin, et al., “Detecting Backdoors”,Proceedings of the 9USENIX Security Symposium, Denver, Colorado, Aug. 2000, 11 pages.
“Basic Cryptanalysis”, Department of the Army, Field Manual No. 34-40-2, Sep. 13, 1990, 363 pages.
Deraison Renaud Marie Maurice
Gula Ronald Joseph
Hayton Matthew Todd
Lanier Benjamin E
Pillsbury Winthrop Shaw & Pittman LLP
Tenable Network Security, Inc.
Zecher Cordelia
LandOfFree
System and method for managing network vulnerability... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for managing network vulnerability..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for managing network vulnerability... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2671498