Information security – Monitoring or scanning of software or data including attack... – Intrusion detection
Reexamination Certificate
2007-10-02
2007-10-02
Smithers, Matthew B (Department: 2137)
Information security
Monitoring or scanning of software or data including attack...
Intrusion detection
C726S013000
Reexamination Certificate
active
10405671
ABSTRACT:
A method and system for detecting attempted intrusions into a network, including: providing a network processor for monitoring packets transmitted over a communications link of the network; receiving a plurality of packets from the communications link by the network processor; and pre-filtering the plurality of packets by the network processor to identify packets potentially with patterns of interest. These packets are forwarded to a NIDS. The NIDS then examines the forwarded packets to identify the packets that have the pattern of interest. By using the network processor to pre-filter the packets, the number of packets examined by the NIDS is significantly reduced. Also, the capacity of the NIDS can be increased without requiring changes in the NIDS.
REFERENCES:
patent: 5414833 (1995-05-01), Hershey et al.
patent: 5621889 (1997-04-01), Lermuzeaux et al.
patent: 5796942 (1998-08-01), Esbensen
patent: 5991881 (1999-11-01), Conklin et al.
patent: 6108782 (2000-08-01), Fletcher et al.
patent: 6119236 (2000-09-01), Shipley
patent: 6219706 (2001-04-01), Fan et al.
patent: 6219786 (2001-04-01), Cunningham et al.
patent: 6404752 (2002-06-01), Allen, Jr. et al.
patent: 6460120 (2002-10-01), Bass et al.
patent: 2002/0038339 (2002-03-01), Xu
patent: 2003/0229710 (2003-12-01), Lie et al.
patent: 2004/0015719 (2004-01-01), Lee et al.
Lee, Justin et al., “A Survey of Intrusion Detection Analysis Methods,” CSE 1999, pp. 1-10.
Mukherjee, Biswanath et al., “Network Intrusion Detection,” IEEE 1994, pp. 28-41.
Bauer, Dennis C. et al., “Detecting Anomalous Behavior: Optimization of Network Traffic Parameters Via an Evolution Strategy,” IEEE 2001, pp. 34-39.
Bonifacio, Jose Maurico, Jr. et al., “Neural Networks Applied in Intrusion Detection Systems,” IEEE 1998, vol. 1, pp. 205-210.
Lingafelt Charles Steven
Strole Norman C.
Sawyer Law Group LLP
Smithers Matthew B
LandOfFree
Use of a programmable network processor to observe a flow of... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Use of a programmable network processor to observe a flow of..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Use of a programmable network processor to observe a flow of... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3903138