System and method for preventing network misuse

Information security – Monitoring or scanning of software or data including attack... – Intrusion detection

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S025000

Reexamination Certificate

active

07467410

ABSTRACT:
A system and method for preventing misuse conditions on a data network are described. Embodiments of the system and method evaluate potential network misuse signatures by analyzing variables such as the state of the network and/or target, the context in which the potential misuse signatures are detected, the response/reaction of the target and/or the fingerprint of the target. These and other variables may be factored in to the misuse determination, either alone, or in combination.

REFERENCES:
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6275942 (2001-08-01), Bernhard et al.
patent: 6279113 (2001-08-01), Vaidya
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6460141 (2002-10-01), Olden
patent: 6728886 (2004-04-01), Ji et al.
patent: 2002/0083331 (2002-06-01), Krumel
Mark Crosbie, Gene Spafford, “Active Defense of a Computer System using Autonomous Agents,” Coast Group Dept. of Computer Sciences Purdue, 1995, n95-008, “citeseer.ist.psu.edu/138521.html”, pp. 2-4.
Jakobson, G.; Weissman, M., “Alarm correlation,” Network, IEEE, vol. 7, Issue 6, Nov. 1993, pp. 52-59.
Debra Anderson, Thane Frivold, Alfonso Valdes, “Next-generation Intrusion Detection Expert System(NIDES)A Summary,” Computer Science Laboratory; SRI-CSL-95-07, May 1995, pp. 11-13.
Denning, D.E., “An Intrusion-Detection Model,” Software Engineering, IEEE Transactions on, vol. SE-13, Issue 2, Feb. 1987, pp. 222-232.
Steven Ray Snapp, “Signature Analysis and Communication Issues in a Distributed Intrusion Detection System,” Masters Thesis, Department of Computer Science, University of California, Davis CA 95616, 1991, pp. 25-36.
Teng, H.S. Chen, K. Lu, S.C., “Adaptive real-time anomaly detection using inductively generated sequential patterns,” Research in Security and Privacy, 1990. Proceedings., 1990 IEEE Computer Society Symposium on May 7-9, 1990, pp. 278-284.
Munson, J.C.; Wimer, S., “Watcher: the missing piece of the security puzzle,” Computer Security Applications Conference, 2001, ACSAC 2001, Proceedings 17th Annual, Dec. 10-14, 2001, pp. 230-239.
Phillip A. Porras, Martin W. Fong and Alfonso Valdes, “Mission-Impact-Based Approach to(INFOSEC)Alarm Correlation,” Lecture Notes in Computer Science, Proceedings Recent Advances in Intrusion Detection, Oct. 2002, pp. 1-18.
Frédéric Cuppens, “Cooperative intrusion detection,” ONERA Centre de Toulouse (funded by the DGA/CASSI), pp. 1-10.
Mukherjee, B., Heberlein, L.T., Levitt, K.N., “Network intrusion detection,” IEEE Network Magazine: May/Jun. 1994, vol. 8, Issue: 3, pp. 26-41.
Sandeep Kumar, Eugene H. Spafford, “An Application of Pattern Matching in Intrusion Detection,” Technical Report 94-013, Department of Computer Sciences, Purdue University, Mar. 1994, http://citeseer.ist.psu.edu/kumar94application.html, pp. 1-55.
Y. Frank Jou, et al., “Architecture Design of a Scalable Intrusion Detection System for the Emerging network Infrastructure,” DARPA Order No. E296, Apr. 1997, http://citeseer.ist.psu.edu/jou97architecture.html, pp. 1-36, reference p. 5.
Forlanda, “The Secrets to Driving on BlackIce,” Jan. 12, 2000, Network Ice, pp. 1-32.
“BlackIce User's Guide Version 1.0 Beta Draft,” 1999, Network Ice Corporation, pp. 1-55.
Shulak et al., “Icecap Advanced Administration Guide Version 3.0,” 2001, Internet Security Systems Corporation, pp. 1-44.
“RealSecure™, Network Engine User Guide,” Version 3.2.1, © 1999 by Internet Security Systems, Inc., pp. 1-28.
“RealSecure Version 2.0,” Apr. 1998, pp. 1-145.
“RealSecure Network Sensor and Gigabit Network Sensor Policy Guide Version 7.0”, Aug. 2003, pp. 1-76.
Kosoresow, A.P.; Hofmeyer, S.A., “Intrusion detection via system call traces,” Software, IEEE, vol. 14, Issue 5, Sep.-Oct. 1997, pp. 35-42.
Rik Farrow, “Security Reality Check,” Network Magazine, Jul. 1, 1999, 4 pgs.
Steve Steinke, “Firewalls,” Dr. Dobb's Journal Vendor Perspectives Netseminar, Jun. 14, 2000, 5-pgs.
Yin Zhang et al., “Detecting Backdoors,” Feb. 19, 1998.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for preventing network misuse does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for preventing network misuse, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for preventing network misuse will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4050293

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.