System and method for tracking the source of a computer attack

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C709S224000, C712S220000

Reexamination Certificate

active

06971028

ABSTRACT:
A system and method are disclosed for detecting and processing attacks on a computer network. Data indicating an attack may be taking place is received. The data is associated with an event. The data is placed in a selected one of a plurality of queues of data to be processed. The data in the queue is processed. Each queue is configured to store one or more sets of data, each set of data being associated with an event to be processed. An administrative domain may be notified that an attack may be taking place. The destination administrative domain may or may not be associated with other than the sending administrative domain. The source of an attack may be identified. Messages associated with an attack may be tracked back to identify a point of attack at which messages associated with the attack are entering a network.

REFERENCES:
patent: 5107489 (1992-04-01), Brown et al.
patent: 5301333 (1994-04-01), Lee
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5574912 (1996-11-01), Hu et al.
patent: 5606669 (1997-02-01), Bertin et al.
patent: 5790808 (1998-08-01), Seaman
patent: 5892903 (1999-04-01), Klaus
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6049546 (2000-04-01), Ramakrishnan
patent: 6067620 (2000-05-01), Holden et al.
patent: 6141686 (2000-10-01), Jackowski et al.
patent: H1944 (2001-02-01), Cheswick et al.
patent: 6233686 (2001-05-01), Zenchelsky et al.
patent: 6311274 (2001-10-01), Day
patent: 6321338 (2001-11-01), Porras et al.
patent: 6408391 (2002-06-01), Huff et al.
patent: 6442694 (2002-08-01), Bergman et al.
patent: 6453345 (2002-09-01), Trcka et al.
patent: 6484203 (2002-11-01), Porras et al.
patent: 6499107 (2002-12-01), Gleichauf et al.
patent: 6578147 (2003-06-01), Shanklin et al.
patent: 6647400 (2003-11-01), Moran
patent: 6704874 (2004-03-01), Porras et al.
patent: 6708212 (2004-03-01), Porras et al.
patent: 6711615 (2004-03-01), Porras et al.
patent: 08032611 (1996-02-01), None
patent: 2000174794 (2000-06-01), None
Knuth, “The Art of Computer Programming, vol. 1,” 2nd Edition, 1973, pp. 234-238.
Durst et al., “Testing and Evaluating Computer Intrusion Detection Systems,” Jul. 1999.
Lippmann, Richard P, et al, “Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation”, Lincoln Laboratory MIT.
Pages regarding DERBI Project from SRI International website at http://www.ai.sri.com/˜derbi/.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for tracking the source of a computer attack does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for tracking the source of a computer attack, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for tracking the source of a computer attack will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3467588

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.