Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2003-05-30
2011-11-22
Abrishamkar, Kaveh (Department: 2431)
Information security
Monitoring or scanning of software or data including attack...
C713S151000, C713S153000, C709S200000
Reexamination Certificate
active
08065725
ABSTRACT:
Systems and methods for an information system security infrastructure are described. One embodiment of the present invention comprises global Internet-scale defense infrastructure, referred to as the Intrusion Detection Force (IDF). The IDF comprises a virtual infrastructure implemented on top of an existing network, such as the Internet. The IDF enables secure information sharing and intelligent data analysis and response. The node (e.g.102of FIG.1) is the most primitive entity in the IDF architecture, and may be a switch, router, server, or workstation. The IDF may be implemented in small networks of computers or may be utilized by millions of hosts throughout the Internet, spanning different organizations, countries, and continents.
REFERENCES:
patent: 5796942 (1998-08-01), Esbensen
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6711615 (2004-03-01), Porras et al.
patent: 6775657 (2004-08-01), Baker
patent: 6834310 (2004-12-01), Munger et al.
patent: 6971028 (2005-11-01), Lyle et al.
patent: 7058968 (2006-06-01), Rowland et al.
patent: 7174566 (2007-02-01), Yadav
patent: 7239605 (2007-07-01), Dinker et al.
patent: 7313695 (2007-12-01), Norton et al.
patent: 7327683 (2008-02-01), Ogier et al.
patent: 7328336 (2008-02-01), Zsohar
patent: 2002/0191573 (2002-12-01), Whitehill et al.
patent: 2003/0149887 (2003-08-01), Yadav
patent: 2004/0193891 (2004-09-01), Ollila
patent: 2004/0205360 (2004-10-01), Norton et al.
patent: 2005/0216764 (2005-09-01), Norton et al.
patent: 2006/0069912 (2006-03-01), Zheng et al.
Krugel, C. et al., “Applying Mobile Agent Technology to Intrusion Detection.” 2001, Distribution Systems Group, Technical University Vienna, pp. 1-3.
Krugel, C. et al., “Flexible, Mobile Agent based Intrusion Detection for Dynamic Networks.” 2002. Distribution Systems Group, Technical University Vienna, pp. 1-5.
Patent Cooperation Treaty, International Search Report, International Application No. PCT/US03/16816, mailed on Aug. 29. 2003, 5 pages.
Ragsdale, D. J., “Adaptation Techniques for Intrusion Detection and Intrusion Response Systems.” Proceedings of IEEE International Conference on Systems, Man, and Cybernetics, vol. 4, TN, Oct. 2000, pp. 1-4.
DeepSight Analyzer, What is DeepSight Analyzer? web page at http://www.analyzer.symantec.com/AnalyzerIntro.aspx, as available via the Internet and printed Mar. 23, 2006.
DShield, Distributed Intrusion Detection System, web page at http://www.dshield.org.as available via the Internet and printed Mar. 23, 2006.
The Honeynet Project, About the Project, web page at http://www.honeynet.org/misc/project.html, as available via the Internet and printed Mar. 23, 2006.
Internet Security Systems, X-Force Threat Analysis Service, web page at http://www.xforce.iss.net/xftas, as available via the Internet and printed Mar. 23, 2006.
SANS, Internet Storm Center, Cooperative Cyber Threat Monitor and Alert System, web page at http://www.isc.sans.org, as available via the internet and printed Mar. 23, 2006.
Trusted Source Portal, Spam Senders by Geographic Region, web page a t http://www.trustedsource.org, as available via the internet and printed Mar. 23, 2006.
Teo Lawrence Chin Shiun
Zheng Yuliang
Abrishamkar Kaveh
Passé James G.
Passeé Intellectual Property, LLC
LandOfFree
Systems and methods for enhanced network security does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and methods for enhanced network security, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods for enhanced network security will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4301771