System and method for using login correlations to detect...

Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C713S152000

Reexamination Certificate

active

07085936

ABSTRACT:
A system and method are disclosed for detecting intrusions in a host system on a network. The intrusion detection system comprises an analysis engine configured to use continuations and apply forward- and backward-chaining using rules. Also provided are sensors, which communicate with the analysis engine using a meta-protocol in which the data packet comprises a 4-tuple. A configuration discovery mechanism locates host system files and communicates the locations to the analysis engine. A file processing mechanism matches contents of a deleted file to a directory or filename, and a directory processing mechanism extracts deallocated directory entries from a directory, creating a partial ordering of the entries. A signature checking mechanism computes the signature of a file and compares it to previously computed signatures. A buffer overflow attack detector compares access times of commands and their associated files. The intrusion detection system further includes a mechanism for checking timestamps to identify and analyze forward and backward time steps in a log file.

REFERENCES:
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5557742 (1996-09-01), Smaha et al.
patent: 5574898 (1996-11-01), Leblang et al.
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5638509 (1997-06-01), Dunphy et al.
patent: 5649194 (1997-07-01), Miller et al.
patent: 5680585 (1997-10-01), Bruell
patent: 5724569 (1998-03-01), Andres
patent: 5757913 (1998-05-01), Bellare et al.
patent: 5778070 (1998-07-01), Mattison
patent: 5796942 (1998-08-01), Esbensen
patent: 5844986 (1998-12-01), Davis
patent: 5978791 (1999-11-01), Farber et al.
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6278966 (2001-08-01), Howard et al.
patent: 6321338 (2001-11-01), Porras et al.
patent: 6347374 (2002-02-01), Drake et al.
patent: 6405318 (2002-06-01), Rowland
patent: 6453345 (2002-09-01), Trcka et al.
patent: 6453419 (2002-09-01), Flint et al.
patent: 6484203 (2002-11-01), Porras et al.
patent: 6681331 (2004-01-01), Munson et al.
patent: 6704874 (2004-03-01), Porras et al.
patent: 6708212 (2004-03-01), Porras et al.
patent: 6711615 (2004-03-01), Porras et al.
patent: 6826697 (2004-11-01), Moran
patent: 6839850 (2005-01-01), Campbell et al.
Frisch, “Essential System Administration,” 1995, pp. 250 and 262-265.
Rebecca Bace, Introduction to Intrusion Detection Assesment, no date, for System and Network Security Management.
Gene H. Kim and Eugene H. Spafford, Writing, Supporting and Evaluating Tripwire: A Publically Available Security Tool, Mar. 12, 1994, Purdue Technical Report; Purdue University.
Douglas B. Moran et al., Derbi: Diagnosis, Explanation and Recovery From Break-Ins, no date, Artificial Intelligence Center SRI International.
Mabry Tyson, Ph.D., Explaining and Recovering From Computer Break-Ins, Jan. 12, 2001, SRI International.
Aleph One, Smashing the Stack for fun and Profit, no date, vol. Seven, Issue Forty-Nine; File 14 of 16 of BugTraq, r00t, and Underground.Org.
Donald C. Latham, Department of Defense Trusted Computer System Evaluation Criteria, Dec. 1985, Department of Defense Standard.
James P. Anderson Co., Computer Security Threat Monitoring and Surveillance, Feb. 26, 1980, Contract 79F296400.
Teresa F. Hunt et al., A Real-Time Intrusion-Detection Expert System (IDES), Feb. 28, 1992, SRI International Project 6784.
Lawrence Halme, Teresa Lunt, and J. Van Horne,Automated Analysis of Computer System Audit Trails for Security Purposes. Proceedings of the National Computer Security Conference, Washington, D.C., 1986.
Teresa Lunt,Automated Audit Trail Analysis and Intrusion Detection: A Survey. Proceedings of the Eleventh National Computer Security Conference, Washington, D.C., Oct. 1988.
Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali,IDES: A Progress Report. Proceedings of the Sixth Annual Computer Security Applications Conference, Tucson, AZ, Dec. 1990.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for using login correlations to detect... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for using login correlations to detect..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for using login correlations to detect... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3643299

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.