Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2006-05-23
2006-05-23
Jung, David (Department: 2134)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C726S027000, C726S022000
Reexamination Certificate
active
07051369
ABSTRACT:
A sensor is provided at the gateway of a local area network for successively acquiring IP packets passing through the gateway. The sensor detects various cracker attacks against the network based on the acquired IP packets. Information as to attacks detected by the sensor is given to a director which controls a firewall at the gateway of the network. Based on the given information, the director controls settings for the firewall to prevent IP packets associated with the detected attacks from entering the local area network.
REFERENCES:
patent: 0 743 777 (1996-11-01), None
Terry Escamilla, “Intrusion Detection”, 1998, Robert Ipsen.
Cheswick, “Firewalls and Internet Security”, Apr. 1994, First Printing.
http://techupdate.zdnet.com/techupdate/stories/main/0,14179,2784023,00—print.html.
http://www.linuxsecurity.com/index2.php?option=com—content&do—pdf=1&id=117265.
http://www.windowsecurity.com/pages/article—p.asp?id=1189.
De Vivo et al., “Internet Security Attacks at the Basic Levels,” Operating Systems Review (SIGOPS), vol. 32, No. 2, Apr. 1, 1998, pp. 4-15, (XP-000766953).
M. Ranum, “Intrusion detection: ideals, expectations and realities,” CSI NetSec Conference, Saint Louis, MO (Jun. 1999).
Press Release, “Cisco Introduces NetRanger Intrusion Detection Solution,” (Nov. 1998).
Press Release, “Network Flight Recorder Inc., Announces Commercial Availability,” (Jan. 1998).
“FAQ: Network Intrusion Detection Systems,” Version 0.6.1, (Aug. 1999).
Sans Institute, “Building a Network Monitoring and Analysis Capability Step by Step,” Ver. 1.1.5 (Jul. 1998).
V. Paxson, “Bro: A System for Detecting Network Intruders in Real-Time,” Lawrence Berkeley National Laboratory, LBNL-41197, (Jan. 1998).
Simple Nomad, “Strategies for Defeating Distributed Attacks,” (date unknown), http://www.nmrc.org.
NightAxis & Rain Forest Puppy, “Purgatory 101: Learning to cope with the SYNs of the Internet,” (date unknown), http://www.wiretrip.net.
Guss Paul A.
Jung David
LandOfFree
System for monitoring network for cracker attack does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System for monitoring network for cracker attack, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System for monitoring network for cracker attack will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3561693