System and method to emulate mobile logic in a communication...

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07814550

ABSTRACT:
A system includes hosts that may be infected with mobile logic. One type of mobile logic is a worm, which can be a process that is capable of causing a (possibly evolved) copy of itself to execute on one or more hosts of the system. An infected host of the system can infect other hosts based on criteria, such as targeting, visibility, vulnerability, or infectability of the other hosts. A worm can be represented as a Turing Machine whose state can be determined using computational methods. A worm can be emulated in the system to determine worm detection capabilities of the system. Emulating the worm can allow the system to be tested with less negative impact than using the actual worm.

REFERENCES:
patent: 6088804 (2000-07-01), Hill et al.
patent: 6981279 (2005-12-01), Arnold et al.
patent: 2003/0065926 (2003-04-01), Schultz et al.
patent: 2003/0167402 (2003-09-01), Stolfo et al.
patent: 2004/0205474 (2004-10-01), Eskin et al.
patent: 2005/0257264 (2005-11-01), Stolfo et al.
patent: 2005/0265331 (2005-12-01), Stolfo
patent: 2005/0281291 (2005-12-01), Stolfo et al.
Staniford, Stuart, “Containment of Scanning Worms in Enterprise Networks.” Oct. 7, 2003, Silicon Defense, pp. 1-21.
Staniford, Stuart, “Containment of Scanning Worms in Enterprise Networks.” Oct. 7, 2003, Silicon Defense, pp. 1-21.
Daniel R. Ellis, U.S. Appl. No. 10/972,787, filed Oct. 26, 2004, “Method, Apparatus, and Computer Program Product for Detecting Computer Worms in a Network.”
Kim, H. et al., “Autograph: Toward Automated, Distributed Worm Signature Detection”, Proceedings of the 13th Usenix Security Symposium (Security 2004), San Diego, CA, Aug. 2004.
Weaver, N. et al., “Very Fast Containment of Scanning Worms”, Proceedings of the 13th Usenix Security Conference, 2004.
Cheung, S. et al., “The Design of GrIDS: A Graph-Based Intrusion Detection System”, UCD Technical Report CSE-99-2, Jan. 1999.
Staniford-Chen, S. et al., “GrIDS: a Graph-Based Intrusion Detection System for Large Networks”, Proceedings of the 19th National Information Systems Security Conference, Baltimore, 1996.
Singh, S. et al., “The EarlyBird System for Real-time Detection of Unknown Worms”, UCSD Tech Report CS2003-0761, Aug. 2003.
Staniford, S., “Containment of Scanning Worms in Enterprise Networks”, Oct. 7, 2003.
Ellis, D., “Worm Anatomy and Model”, Proceedings of ACM CCS Worm Wokshop 2003, Oct. 2003.
Chen, S. et al., “Slowing Down Internet Worms”, in Proc. of 24th International Conference on Distributed Computing Systems (ICDCS'04), Tokyo, Japan, Mar. 2004.
Cheetancheri, S.G., “Modelling a Computer Worm Defense System”, Thesis submitted in partial satisfaction of the requirements for the degree of Master Of Science in Computer Science in the Office of University of California Davis, 2004.
Zou, C.C. et al., “A Firewall Network System for Worm Defense in Enterprise Networks,” University of Massachusetts, Technical Report TR-04-CSE-01, Feb. 4, 2004.
Hung, J.C. et al., “A Behavior-based Anti-Worm System”, in proceedings of the IEEE 17th International Conference on Advanced Information Networking and Applications (AINA2003), Xi'an, China, Mar. 27-29, 2003.
Welcher, P.J. et al., “Network Detection of Worms and Viruses”, Enterprise Networks & Servers, [online]. Dec. 2003, [retrieved on Apr. 1, 2005]. Retrieved from the Internet: <URL: http://www.enterprisenetworksandservers.com/monthly/art.php/408>.
Singh, S. et al., “Automated Worm Fingerprinting”, Department of Computer Science and Engineering, University of California, San Diego, 2003.
Schechter, S. et al., “Fast Detection of Scanning Worm Infections”, Seventh International Symposium on Recent Advances in Intrusion Detection (RAID) Sophia Antipolis, French Riviera, France. Sep. 15-17, 2004.
“Cisco Self-Defending Network”, [online]. Cisco Systems, Inc., [retrieved Mar. 5, 2005]. Retrieved from the Internet: <URL: http://www.cisco.com/en/US
etsol
s340
s394
s171
s413
etworking—solutions—package.html>.
International Search Report for International Application No. PCT/US05/38599 mailed Oct. 22, 2007.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method to emulate mobile logic in a communication... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method to emulate mobile logic in a communication..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method to emulate mobile logic in a communication... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4196841

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.