Multiplex communications – Communication techniques for information carried in plural... – Adaptive
Reexamination Certificate
2007-12-11
2007-12-11
Orgad, Edan (Department: 2616)
Multiplex communications
Communication techniques for information carried in plural...
Adaptive
C370S389000, C726S023000
Reexamination Certificate
active
10058442
ABSTRACT:
A system protects against loss of communication during network attacks. In a first implementation, a system (120) models the behavior of normal users in a network in response to an application of a first packet filtering technique. The system (120) receives a group of packets from a first user subsequent to the application of the first packet filtering technique and creates one or more models reflecting the behavior of the first user based on the received packets. In another implementation, a system (130) receives a stream of packets subsequent to a filtering technique being applied, partitions the packets into groups, where each group corresponds to more than one packet, and classifies each group of packets as a normal group or an attack group using one or more models. Each model reflects a normal response to an application of the filtering technique. The system (130) forwards groups classified as normal groups, thus preventing network attacks from choking off all communication in the network.
REFERENCES:
patent: 6028626 (2000-02-01), Aviv
patent: 6321338 (2001-11-01), Porras et al.
patent: 6484203 (2002-11-01), Porras et al.
patent: 6578147 (2003-06-01), Shanklin et al.
patent: 6816973 (2004-11-01), Gleichauf et al.
patent: 6839754 (2005-01-01), Nowak et al.
patent: 6850491 (2005-02-01), Firoiu et al.
patent: 6880090 (2005-04-01), Shawcross
patent: 2002/0002686 (2002-01-01), Vange et al.
patent: 2002/0032774 (2002-03-01), Kohler et al.
patent: 2002/0035683 (2002-03-01), Kaashoek et al.
patent: 2003/0051026 (2003-03-01), Carter et al.
patent: 2003/0097439 (2003-05-01), Strayer et al.
Glave, James, “Smurfing Cripples ISPs,” Wired News, www.wired.com, 4 pages, Jan. 7, 1998.
Craig, Andrew, “Internet Gets Slammed By Widespread Attack,” TechWeb, Technology News, www.techweb.com, 3 pages, Mar. 4, 1998.
Schuba et al. Analysis of a Denial of Service Attack on TCP. Proceedings of the 1997 IEEE Symposium on Security and Privacy. (1997).
Denning, Dorothy E. An Intrusion-Detection Model. IEEE Transactions on Software Engineering. pp. 118-131 (1987).
Jha et al. Markov Chains, Classifiers, and Intrusion Detection. Computer Security Foundations Workshop. Proceedings, 14th IEEE, pp. 206-219. (2001).
Vigna et al. NetSTAT: A Network-based Intrusion Detection Approach. ACSAC(1998).
Stallings, William. Crypotgraphy and Network Security: Principles and Practice. 2nd ed., Prentice Hall, pp. 478-501 (1998).
BBN Technologies Corp.
Ropes & Gray LLP
Wilson Robert W.
LandOfFree
Systems and methods that identify normal traffic during... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Systems and methods that identify normal traffic during..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Systems and methods that identify normal traffic during... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3867400