Movatterモバイル変換


[0]ホーム

URL:


US20100100961A1 - Intrusion detection system - Google Patents

Intrusion detection system
Download PDF

Info

Publication number
US20100100961A1
US20100100961A1US12/577,574US57757409AUS2010100961A1US 20100100961 A1US20100100961 A1US 20100100961A1US 57757409 AUS57757409 AUS 57757409AUS 2010100961 A1US2010100961 A1US 2010100961A1
Authority
US
United States
Prior art keywords
attack
characteristic
network
attacks
alert
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US12/577,574
Inventor
Michael Scheidell
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US12/577,574priorityCriticalpatent/US20100100961A1/en
Publication of US20100100961A1publicationCriticalpatent/US20100100961A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

An intrusion detection system monitors the rate and characteristics of Internet attacks on a computer network and filters attack alerts based upon various rates and frequencies of the attacks. The intrusion detection system monitors attacks on other hosts and determines if the attacks are random or general attacks or attacks directed towards a specific computer network and generates a corresponding signal. The intrusion detections system also tests a computer network's vulnerability to attacks detected on the other monitored hosts.

Description

Claims (20)

US12/577,5742002-10-312009-10-12Intrusion detection systemAbandonedUS20100100961A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US12/577,574US20100100961A1 (en)2002-10-312009-10-12Intrusion detection system

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US42272002P2002-10-312002-10-31
US10/699,005US7603711B2 (en)2002-10-312003-10-30Intrusion detection system
US12/577,574US20100100961A1 (en)2002-10-312009-10-12Intrusion detection system

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US10/699,005ContinuationUS7603711B2 (en)2002-10-312003-10-30Intrusion detection system

Publications (1)

Publication NumberPublication Date
US20100100961A1true US20100100961A1 (en)2010-04-22

Family

ID=32302582

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US10/699,005Active2026-06-17US7603711B2 (en)2002-10-312003-10-30Intrusion detection system
US12/577,574AbandonedUS20100100961A1 (en)2002-10-312009-10-12Intrusion detection system

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US10/699,005Active2026-06-17US7603711B2 (en)2002-10-312003-10-30Intrusion detection system

Country Status (3)

CountryLink
US (2)US7603711B2 (en)
AU (1)AU2003287419A1 (en)
WO (1)WO2004042524A2 (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN102487339A (en)*2010-12-012012-06-06中兴通讯股份有限公司Attack preventing method for network equipment and device
US8984644B2 (en)2003-07-012015-03-17Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9088618B1 (en)*2014-04-182015-07-21Kaspersky Lab ZaoSystem and methods for ensuring fault tolerance of antivirus protection realized in a virtual environment
US9100431B2 (en)2003-07-012015-08-04Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US9118710B2 (en)2003-07-012015-08-25Securityprofiling, LlcSystem, method, and computer program product for reporting an occurrence in different manners
US9118708B2 (en)2003-07-012015-08-25Securityprofiling, LlcMulti-path remediation
US9118711B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9117069B2 (en)2003-07-012015-08-25Securityprofiling, LlcReal-time vulnerability monitoring
US9118709B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
WO2015013376A3 (en)*2013-07-232015-11-26Crypteia Networks S.A.Systems and methods for self-tuning network intrusion detection and prevention
JP2015231138A (en)*2014-06-052015-12-21日本電信電話株式会社Cyber attack practice system, practice environment providing method, and, practice environment providing program
CN105471854A (en)*2015-11-182016-04-06国网智能电网研究院Adaptive boundary abnormity detection method based on multistage strategies
US9350752B2 (en)2003-07-012016-05-24Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9392007B2 (en)2013-11-042016-07-12Crypteia Networks S.A.System and method for identifying infected networks and systems from unknown attacks
CN111989678A (en)*2018-10-172020-11-24松下电器(美国)知识产权公司Information processing apparatus, information processing method, and program
CN112100626A (en)*2020-09-242020-12-18成都信息工程大学Development method for improving source code audit vulnerability hit rate

Families Citing this family (144)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8392552B2 (en)*2000-09-282013-03-05Vig Acquisitions Ltd., L.L.C.System and method for providing configurable security monitoring utilizing an integrated information system
US7627665B2 (en)2000-09-282009-12-01Barker Geoffrey TSystem and method for providing configurable security monitoring utilizing an integrated information system
US6748343B2 (en)2000-09-282004-06-08Vigilos, Inc.Method and process for configuring a premises for monitoring
US7664845B2 (en)*2002-01-152010-02-16Mcafee, Inc.System and method for network vulnerability detection and reporting
US7543056B2 (en)2002-01-152009-06-02Mcafee, Inc.System and method for network vulnerability detection and reporting
US7480715B1 (en)*2002-01-252009-01-20Vig Acquisitions Ltd., L.L.C.System and method for performing a predictive threat assessment based on risk factors
US8209756B1 (en)2002-02-082012-06-26Juniper Networks, Inc.Compound attack detection in a computer network
US7359962B2 (en)*2002-04-302008-04-153Com CorporationNetwork security system integration
US8359650B2 (en)*2002-10-012013-01-22Skybox Secutiry Inc.System, method and computer readable medium for evaluating potential attacks of worms
US8407798B1 (en)2002-10-012013-03-26Skybox Secutiry Inc.Method for simulation aided security event management
US7603711B2 (en)*2002-10-312009-10-13Secnap Networks Security, LLCIntrusion detection system
JP4161693B2 (en)*2002-11-252008-10-08松下電器産業株式会社 Multicarrier transmission apparatus, multicarrier reception apparatus, and multicarrier communication apparatus
US7219239B1 (en)*2002-12-022007-05-15Arcsight, Inc.Method for batching events for transmission by software agent
US8176527B1 (en)*2002-12-022012-05-08Hewlett-Packard Development Company, L. P.Correlation engine with support for time-based rules
US7243147B2 (en)*2002-12-302007-07-10Bellsouth Ip CorporationSystems and methods for the detection and management of network assets
US7483972B2 (en)*2003-01-082009-01-27Cisco Technology, Inc.Network security monitoring system
JP2006518080A (en)2003-02-142006-08-03プリベンシス,インコーポレイティド Network audit and policy assurance system
US7895649B1 (en)2003-04-042011-02-22Raytheon CompanyDynamic rule generation for an enterprise intrusion detection system
US8127359B2 (en)*2003-04-112012-02-28Samir Gurunath KelekarSystems and methods for real-time network-based vulnerability assessment
US7308716B2 (en)*2003-05-202007-12-11International Business Machines CorporationApplying blocking measures progressively to malicious network traffic
US7712133B2 (en)*2003-06-202010-05-04Hewlett-Packard Development Company, L.P.Integrated intrusion detection system and method
US6985920B2 (en)*2003-06-232006-01-10Protego Networks Inc.Method and system for determining intra-session event correlation across network address translation devices
US7406714B1 (en)2003-07-012008-07-29Symantec CorporationComputer code intrusion detection system based on acceptable retrievals
US7568229B1 (en)*2003-07-012009-07-28Symantec CorporationReal-time training for a computer code intrusion detection system
US7644365B2 (en)*2003-09-122010-01-05Cisco Technology, Inc.Method and system for displaying network security incidents
US9027120B1 (en)2003-10-102015-05-05Hewlett-Packard Development Company, L.P.Hierarchical architecture in a network security system
US8015604B1 (en)*2003-10-102011-09-06Arcsight IncHierarchical architecture in a network security system
US7237267B2 (en)*2003-10-162007-06-26Cisco Technology, Inc.Policy-based network security management
US8266177B1 (en)2004-03-162012-09-11Symantec CorporationEmpirical database access adjustment
US7225468B2 (en)*2004-05-072007-05-29Digital Security Networks, LlcMethods and apparatus for computer network security using intrusion detection and prevention
US7523504B2 (en)*2004-08-022009-04-21Netiq CorporationMethods, systems and computer program products for evaluating security of a network environment
US8176126B2 (en)2004-08-262012-05-08International Business Machines CorporationSystem, method and program to limit rate of transferring messages from suspected spammers
KR100622670B1 (en)*2004-12-072006-09-19한국전자통신연구원 Real-time attack pattern detection system and method for unknown network attack
US7937755B1 (en)2005-01-272011-05-03Juniper Networks, Inc.Identification of network policy violations
US7809826B1 (en)*2005-01-272010-10-05Juniper Networks, Inc.Remote aggregation of network traffic profiling data
US7797411B1 (en)2005-02-022010-09-14Juniper Networks, Inc.Detection and prevention of encapsulated network attacks using an intermediate device
US7444331B1 (en)2005-03-022008-10-28Symantec CorporationDetecting code injection attacks against databases
US8046374B1 (en)2005-05-062011-10-25Symantec CorporationAutomatic training of a database intrusion detection system
US7558796B1 (en)2005-05-192009-07-07Symantec CorporationDetermining origins of queries for a database intrusion detection system
FR2887385B1 (en)*2005-06-152007-10-05Advestigo Sa METHOD AND SYSTEM FOR REPORTING AND FILTERING MULTIMEDIA INFORMATION ON A NETWORK
GB0513375D0 (en)2005-06-302005-08-03Retento LtdComputer security
US8572733B1 (en)*2005-07-062013-10-29Raytheon CompanySystem and method for active data collection in a network security system
FR2888440A1 (en)*2005-07-082007-01-12France Telecom METHOD AND SYSTEM FOR DETECTING INTRUSIONS
US7774361B1 (en)2005-07-082010-08-10Symantec CorporationEffective aggregation and presentation of database intrusion incidents
US7690037B1 (en)2005-07-132010-03-30Symantec CorporationFiltering training data for machine learning
US7882262B2 (en)2005-08-182011-02-01Cisco Technology, Inc.Method and system for inline top N query computation
US7950058B1 (en)2005-09-012011-05-24Raytheon CompanySystem and method for collaborative information security correlation in low bandwidth environments
US8224761B1 (en)2005-09-012012-07-17Raytheon CompanySystem and method for interactive correlation rule design in a network security system
CN101258470B (en)*2005-09-072011-08-03国际商业机器公司 Automatic deployment of protection agents to devices connected to a distributed computer network
US9794272B2 (en)*2006-01-032017-10-17Alcatel LucentMethod and apparatus for monitoring malicious traffic in communication networks
US7849185B1 (en)2006-01-102010-12-07Raytheon CompanySystem and method for attacker attribution in a network security system
US20070195776A1 (en)*2006-02-232007-08-23Zheng Danyang RSystem and method for channeling network traffic
US8554536B2 (en)*2006-05-242013-10-08Verizon Patent And Licensing Inc.Information operations support system, method, and computer program product
US8233388B2 (en)2006-05-302012-07-31Cisco Technology, Inc.System and method for controlling and tracking network content flow
US8180873B2 (en)*2006-11-142012-05-15Fmr LlcDetecting fraudulent activity
US8811156B1 (en)2006-11-142014-08-19Raytheon CompanyCompressing n-dimensional data
WO2008098260A1 (en)*2007-02-092008-08-14Smobile Systems, Inc.Off-line mms malware scanning system and method
US8413247B2 (en)*2007-03-142013-04-02Microsoft CorporationAdaptive data collection for root-cause analysis and intrusion detection
US8955105B2 (en)*2007-03-142015-02-10Microsoft CorporationEndpoint enabled for enterprise security assessment sharing
US8959568B2 (en)*2007-03-142015-02-17Microsoft CorporationEnterprise security assessment sharing
US20080229419A1 (en)*2007-03-162008-09-18Microsoft CorporationAutomated identification of firewall malware scanner deficiencies
US8424094B2 (en)*2007-04-022013-04-16Microsoft CorporationAutomated collection of forensic evidence associated with a network security incident
EP1986391A1 (en)*2007-04-232008-10-29Mitsubishi Electric CorporationDetecting anomalies in signalling flows
US20080295172A1 (en)*2007-05-222008-11-27Khushboo BohacekMethod, system and computer-readable media for reducing undesired intrusion alarms in electronic communications systems and networks
WO2008148106A1 (en)*2007-05-252008-12-04New Jersey Institute Of TechnologyProactive test-based differentiation method and system to mitigate low rate dos attacks
EP2194677B1 (en)*2007-09-282012-11-14Nippon Telegraph and Telephone CorporationNetwork monitoring device, network monitoring method, and network monitoring program
KR20090121579A (en)*2008-05-222009-11-26주식회사 이베이지마켓 System and method for checking vulnerability of server
US20100070776A1 (en)*2008-09-172010-03-18Shankar RamanLogging system events
US10210162B1 (en)2010-03-292019-02-19Carbonite, Inc.Log file management
US8364813B2 (en)2010-11-022013-01-29International Business Machines CorporationAdministering incident pools for event and alert analysis
US8386602B2 (en)2010-11-022013-02-26International Business Machines CorporationRelevant alert delivery in a distributed processing system
US8621277B2 (en)2010-12-062013-12-31International Business Machines CorporationDynamic administration of component event reporting in a distributed processing system
US8868984B2 (en)2010-12-072014-10-21International Business Machines CorporationRelevant alert delivery in a distributed processing system with event listeners and alert listeners
US8737231B2 (en)2010-12-072014-05-27International Business Machines CorporationDynamic administration of event pools for relevant event and alert analysis during event storms
US8805999B2 (en)2010-12-072014-08-12International Business Machines CorporationAdministering event reporting rules in a distributed processing system
CN102025785B (en)*2010-12-242012-11-07汉柏科技有限公司Method for monitoring safety of network through WEB
US8756462B2 (en)2011-05-242014-06-17International Business Machines CorporationConfigurable alert delivery for reducing the amount of alerts transmitted in a distributed processing system
US8645757B2 (en)2011-05-262014-02-04International Business Machines CorporationAdministering incident pools for event and alert analysis
US9213621B2 (en)2011-05-272015-12-15International Business Machines CorporationAdministering event pools for relevant event analysis in a distributed processing system
US8676883B2 (en)2011-05-272014-03-18International Business Machines CorporationEvent management in a distributed processing system
US8392385B2 (en)2011-06-222013-03-05International Business Machines CorporationFlexible event data content management for relevant event and alert analysis within a distributed processing system
US9419650B2 (en)2011-06-222016-08-16International Business Machines CorporationFlexible event data content management for relevant event and alert analysis within a distributed processing system
US8880943B2 (en)2011-06-222014-11-04International Business Machines CorporationRestarting event and alert analysis after a shutdown in a distributed processing system
US8713366B2 (en)2011-06-222014-04-29International Business Machines CorporationRestarting event and alert analysis after a shutdown in a distributed processing system
US9178936B2 (en)2011-10-182015-11-03International Business Machines CorporationSelected alert delivery in a distributed processing system
US20130097272A1 (en)*2011-10-182013-04-18International Business Machines CorporationPrioritized Alert Delivery In A Distributed Processing System
US8887175B2 (en)2011-10-182014-11-11International Business Machines CorporationAdministering incident pools for event and alert analysis
US20130097215A1 (en)2011-10-182013-04-18International Business Machines CorporationSelected Alert Delivery In A Distributed Processing System
US9094288B1 (en)*2011-10-262015-07-28Narus, Inc.Automated discovery, attribution, analysis, and risk assessment of security threats
US8713581B2 (en)2011-10-272014-04-29International Business Machines CorporationSelected alert delivery in a distributed processing system
US9137258B2 (en)*2012-02-012015-09-15Brightpoint Security, Inc.Techniques for sharing network security event information
US9710644B2 (en)*2012-02-012017-07-18Servicenow, Inc.Techniques for sharing network security event information
US8914406B1 (en)2012-02-012014-12-16Vorstack, Inc.Scalable network security with fast response protocol
AU2013272215B2 (en)2012-03-222017-10-12Imperial Innovations LimitedAnomaly detection to identify coordinated group attacks in computer networks
WO2013184099A1 (en)2012-06-052013-12-12Empire Technology Development, LlcCross-user correlation for detecting server-side multi-target intrusion
US9715325B1 (en)2012-06-212017-07-25Open Text CorporationActivity stream based interaction
US9043920B2 (en)2012-06-272015-05-26Tenable Network Security, Inc.System and method for identifying exploitable weak points in a network
US9088606B2 (en)2012-07-052015-07-21Tenable Network Security, Inc.System and method for strategic anti-malware monitoring
US8954811B2 (en)2012-08-062015-02-10International Business Machines CorporationAdministering incident pools for incident analysis
US8943366B2 (en)2012-08-092015-01-27International Business Machines CorporationAdministering checkpoints for incident analysis
US9021599B2 (en)*2013-03-132015-04-28Google Inc.Protecting privacy via a gateway
US9467464B2 (en)2013-03-152016-10-11Tenable Network Security, Inc.System and method for correlating log data to discover network vulnerabilities and assets
EP2785009A1 (en)2013-03-292014-10-01British Telecommunications public limited companyMethod and apparatus for detecting a multi-stage event
EP2785008A1 (en)*2013-03-292014-10-01British Telecommunications public limited companyMethod and apparatus for detecting a multi-stage event
US9361184B2 (en)2013-05-092016-06-07International Business Machines CorporationSelecting during a system shutdown procedure, a restart incident checkpoint of an incident analyzer in a distributed processing system
US9170860B2 (en)2013-07-262015-10-27International Business Machines CorporationParallel incident processing
US9658902B2 (en)2013-08-222017-05-23Globalfoundries Inc.Adaptive clock throttling for event processing
US9256482B2 (en)2013-08-232016-02-09International Business Machines CorporationDetermining whether to send an alert in a distributed processing system
US9602337B2 (en)2013-09-112017-03-21International Business Machines CorporationEvent and alert analysis in a distributed processing system
US9086968B2 (en)2013-09-112015-07-21International Business Machines CorporationCheckpointing for delayed alert creation
US9389943B2 (en)2014-01-072016-07-12International Business Machines CorporationDetermining a number of unique incidents in a plurality of incidents for incident processing in a distributed processing system
US9485262B1 (en)*2014-03-282016-11-01Juniper Networks, Inc.Detecting past intrusions and attacks based on historical network traffic information
WO2015200211A1 (en)2014-06-222015-12-30Webroot Inc.Network threat prediction and blocking
EP3095034B1 (en)2014-10-212019-05-29Ironnet Cybersecurity, Inc.Cybersecurity system
US9690928B2 (en)*2014-10-252017-06-27Mcafee, Inc.Computing platform security methods and apparatus
US9571517B2 (en)2014-11-112017-02-14Goldman, Sachs & Co.Synthetic cyber-risk model for vulnerability determination
US9591022B2 (en)2014-12-172017-03-07The Boeing CompanyComputer defenses and counterattacks
US9648036B2 (en)2014-12-292017-05-09Palantir Technologies Inc.Systems for network risk assessment including processing of user access rights associated with a network of devices
CN105871775B (en)*2015-01-192019-03-12中国移动通信集团公司 A security protection method and DPMA protection model
US10282455B2 (en)*2015-04-202019-05-07Splunk Inc.Display of data ingestion information based on counting generated events
US10817544B2 (en)2015-04-202020-10-27Splunk Inc.Scaling available storage based on counting generated events
US10395133B1 (en)2015-05-082019-08-27Open Text CorporationImage box filtering for optical character recognition
US10599844B2 (en)2015-05-122020-03-24Webroot, Inc.Automatic threat detection of executable files based on static data analysis
US10289686B1 (en)2015-06-302019-05-14Open Text CorporationMethod and system for using dynamic content types
US10454950B1 (en)*2015-06-302019-10-22Fireeye, Inc.Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US10701104B2 (en)*2015-08-182020-06-30Acronis International GmbhAgentless security of virtual machines using a network interface controller
US20170054686A1 (en)*2015-08-182017-02-23Konstantin MalkovAgentless Security of Virtual Machines using a Filtering Platform
US10425447B2 (en)*2015-08-282019-09-24International Business Machines CorporationIncident response bus for data security incidents
US10742480B2 (en)2015-10-122020-08-11Vmware, Inc.Network management as a service (MaaS) using reverse session-origination (RSO) tunnel
US10609110B2 (en)2015-10-122020-03-31Vmware, Inc.Remote access over internet using reverse session-origination (RSO) tunnel
US10284631B2 (en)*2015-10-122019-05-07Vmware, Inc.Management-as-a-service for on-premises information-technology systems
JP2017079042A (en)*2015-10-222017-04-27富士通株式会社Attention alert action support program, attention alert action support device, and attention alert action support method
AU2016367922B2 (en)2015-12-112019-08-08Servicenow, Inc.Computer network threat assessment
US9965633B2 (en)2015-12-292018-05-08Sap SeUsing code similarities for improving auditing and fixing of SAST-discovered code vulnerabilities
HK1257367B (en)2016-07-142020-06-12IronNet Cybersecurity, Inc.Simulation and virtual reality based cyber behavioral system
US10237300B2 (en)2017-04-062019-03-19Microsoft Technology Licensing, LlcSystem and method for detecting directed cyber-attacks targeting a particular set of cloud based machines
US11271967B2 (en)*2017-05-022022-03-08International Business Machines CorporationMethods and systems for cyber-hacking detection
US10333960B2 (en)2017-05-032019-06-25Servicenow, Inc.Aggregating network security data for export
US20180324207A1 (en)2017-05-052018-11-08Servicenow, Inc.Network security threat intelligence sharing
US10432647B2 (en)2017-06-272019-10-01Honeywell International Inc.Malicious industrial internet of things node activity detection for connected plants
US11128648B2 (en)2018-01-022021-09-21Maryam AMIRMAZLAGHANIGeneralized likelihood ratio test (GLRT) based network intrusion detection system in wavelet domain
US10728034B2 (en)2018-02-232020-07-28Webroot Inc.Security privilege escalation exploit detection and mitigation
US11314863B2 (en)2019-03-272022-04-26Webroot, Inc.Behavioral threat detection definition and compilation
US20250175472A1 (en)*2023-11-272025-05-29Micro Focus LlcGlobal signal analytics

Citations (25)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5991881A (en)*1996-11-081999-11-23Harris CorporationNetwork surveillance system
US6088804A (en)*1998-01-122000-07-11Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US6119236A (en)*1996-10-072000-09-12Shipley; Peter M.Intelligent network security device and method
US6282546B1 (en)*1998-06-302001-08-28Cisco Technology, Inc.System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
US6477651B1 (en)*1999-01-082002-11-05Cisco Technology, Inc.Intrusion detection system and method having dynamically loaded signatures
US20020178383A1 (en)*2001-01-252002-11-28Michael HrabikMethod and apparatus for verifying the integrity and security of computer networks and implementing counter measures
US20030009696A1 (en)*2001-05-182003-01-09Bunker V. Nelson WaldoNetwork security testing
US6519703B1 (en)*2000-04-142003-02-11James B. JoyceMethods and apparatus for heuristic firewall
US20030188194A1 (en)*2002-03-292003-10-02David CurrieMethod and apparatus for real-time security verification of on-line services
US20040117658A1 (en)*2002-09-272004-06-17Andrea KlaesSecurity monitoring and intrusion detection system
US7076803B2 (en)*2002-01-282006-07-11International Business Machines CorporationIntegrated intrusion detection services
US7152242B2 (en)*2002-09-112006-12-19Enterasys Networks, Inc.Modular system for detecting, filtering and providing notice about attack events associated with network security
US20070136813A1 (en)*2005-12-082007-06-14Hsing-Kuo WongMethod for eliminating invalid intrusion alerts
US7237008B1 (en)*2002-05-102007-06-26Mcafee, Inc.Detecting malware carried by an e-mail message
US20070226803A1 (en)*2006-03-222007-09-27Woonyon KimSystem and method for detecting internet worm traffics through classification of traffic characteristics by types
US20070240218A1 (en)*2006-04-062007-10-11George TuvellMalware Detection System and Method for Mobile Platforms
US20080086773A1 (en)*2006-10-062008-04-10George TuvellSystem and method of reporting and visualizing malware on mobile networks
US20080086776A1 (en)*2006-10-062008-04-10George TuvellSystem and method of malware sample collection on mobile networks
US20080263661A1 (en)*2007-04-232008-10-23Mitsubishi Electric CorporationDetecting anomalies in signaling flows
US20080301810A1 (en)*2007-06-042008-12-04Agilent Technologies, Inc.Monitoring apparatus and method therefor
US20090077663A1 (en)*2007-09-172009-03-19Alcatel LucentScore-based intrusion prevention system
US7603711B2 (en)*2002-10-312009-10-13Secnap Networks Security, LLCIntrusion detection system
US7631354B2 (en)*2004-12-302009-12-08Intel CorporationSystem security agent authentication and alert distribution
US7673342B2 (en)*2001-07-262010-03-02Mcafee, Inc.Detecting e-mail propagated malware
US20100154059A1 (en)*2008-12-112010-06-17KindsightNetwork based malware detection and reporting

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
FR2706652B1 (en)1993-06-091995-08-18Alsthom Cge Alcatel Device for detecting intrusions and suspicious users for a computer system and security system comprising such a device.
US5878420A (en)1995-08-311999-03-02Compuware CorporationNetwork monitoring and management system
US5898830A (en)1996-10-171999-04-27Network Engineering SoftwareFirewall providing enhanced network security and user transparency
JP3165366B2 (en)1996-02-082001-05-14株式会社日立製作所 Network security system
US6453345B2 (en)1996-11-062002-09-17Datadirect Networks, Inc.Network security and surveillance system
US6279113B1 (en)1998-03-162001-08-21Internet Tools, Inc.Dynamic signature inspection-based network intrusion detection
US6578147B1 (en)1999-01-152003-06-10Cisco Technology, Inc.Parallel intrusion detection sensors with load balancing for high speed networks
US6971028B1 (en)*1999-08-302005-11-29Symantec CorporationSystem and method for tracking the source of a computer attack
US6769066B1 (en)1999-10-252004-07-27Visa International Service AssociationMethod and apparatus for training a neural network model for use in computer network intrusion detection
US6611869B1 (en)1999-10-282003-08-26Networks Associates, Inc.System and method for providing trustworthy network security concern communication in an active security management environment
GB2362076B (en)2000-05-032002-08-143Com CorpDetection of an attack such as a pre-attack on a computer network
US7134141B2 (en)*2000-06-122006-11-07Hewlett-Packard Development Company, L.P.System and method for host and network based intrusion detection and response
US7406713B2 (en)2000-08-182008-07-29Invicta Networks, Inc.Systems and methods for distributed network protection
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
WO2002071227A1 (en)*2001-03-012002-09-12Cyber Operations, LlcSystem and method for anti-network terrorism
US7379993B2 (en)*2001-09-132008-05-27Sri InternationalPrioritizing Bayes network alerts
US20030084349A1 (en)*2001-10-122003-05-01Oliver FriedrichsEarly warning system for network attacks
US20030084319A1 (en)*2001-10-312003-05-01Tarquini Richard PaulNode, method and computer readable medium for inserting an intrusion prevention system into a network stack
US7222366B2 (en)*2002-01-282007-05-22International Business Machines CorporationIntrusion event filtering
US20040006704A1 (en)*2002-07-022004-01-08Dahlstrom Dale A.System and method for determining security vulnerabilities
US7017186B2 (en)*2002-07-302006-03-21Steelcloud, Inc.Intrusion detection system using self-organizing clusters
US6952779B1 (en)*2002-10-012005-10-04Gideon CohenSystem and method for risk detection and analysis in a computer network
US7596807B2 (en)*2003-07-032009-09-29Arbor Networks, Inc.Method and system for reducing scope of self-propagating attack code in network

Patent Citations (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6119236A (en)*1996-10-072000-09-12Shipley; Peter M.Intelligent network security device and method
US6304975B1 (en)*1996-10-072001-10-16Peter M. ShipleyIntelligent network security device and method
US5991881A (en)*1996-11-081999-11-23Harris CorporationNetwork surveillance system
US6088804A (en)*1998-01-122000-07-11Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US6282546B1 (en)*1998-06-302001-08-28Cisco Technology, Inc.System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
US6477651B1 (en)*1999-01-082002-11-05Cisco Technology, Inc.Intrusion detection system and method having dynamically loaded signatures
US6519703B1 (en)*2000-04-142003-02-11James B. JoyceMethods and apparatus for heuristic firewall
US20020178383A1 (en)*2001-01-252002-11-28Michael HrabikMethod and apparatus for verifying the integrity and security of computer networks and implementing counter measures
US20030009696A1 (en)*2001-05-182003-01-09Bunker V. Nelson WaldoNetwork security testing
US7673342B2 (en)*2001-07-262010-03-02Mcafee, Inc.Detecting e-mail propagated malware
US7076803B2 (en)*2002-01-282006-07-11International Business Machines CorporationIntegrated intrusion detection services
US20030188194A1 (en)*2002-03-292003-10-02David CurrieMethod and apparatus for real-time security verification of on-line services
US7237008B1 (en)*2002-05-102007-06-26Mcafee, Inc.Detecting malware carried by an e-mail message
US20110173677A1 (en)*2002-05-102011-07-14Mcafee, Inc., A Delaware CorporationDetecting malware carried by an e-mail message
US7152242B2 (en)*2002-09-112006-12-19Enterasys Networks, Inc.Modular system for detecting, filtering and providing notice about attack events associated with network security
US20040117658A1 (en)*2002-09-272004-06-17Andrea KlaesSecurity monitoring and intrusion detection system
US7603711B2 (en)*2002-10-312009-10-13Secnap Networks Security, LLCIntrusion detection system
US7631354B2 (en)*2004-12-302009-12-08Intel CorporationSystem security agent authentication and alert distribution
US20070136813A1 (en)*2005-12-082007-06-14Hsing-Kuo WongMethod for eliminating invalid intrusion alerts
US20070226803A1 (en)*2006-03-222007-09-27Woonyon KimSystem and method for detecting internet worm traffics through classification of traffic characteristics by types
US20070240218A1 (en)*2006-04-062007-10-11George TuvellMalware Detection System and Method for Mobile Platforms
US20070240217A1 (en)*2006-04-062007-10-11George TuvellMalware Modeling Detection System And Method for Mobile Platforms
US20080086776A1 (en)*2006-10-062008-04-10George TuvellSystem and method of malware sample collection on mobile networks
US20080086773A1 (en)*2006-10-062008-04-10George TuvellSystem and method of reporting and visualizing malware on mobile networks
US20080263661A1 (en)*2007-04-232008-10-23Mitsubishi Electric CorporationDetecting anomalies in signaling flows
US20080301810A1 (en)*2007-06-042008-12-04Agilent Technologies, Inc.Monitoring apparatus and method therefor
US20090077663A1 (en)*2007-09-172009-03-19Alcatel LucentScore-based intrusion prevention system
US20100154059A1 (en)*2008-12-112010-06-17KindsightNetwork based malware detection and reporting

Cited By (22)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9118709B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US10104110B2 (en)2003-07-012018-10-16Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US10154055B2 (en)2003-07-012018-12-11Securityprofiling, LlcReal-time vulnerability monitoring
US9100431B2 (en)2003-07-012015-08-04Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US9118710B2 (en)2003-07-012015-08-25Securityprofiling, LlcSystem, method, and computer program product for reporting an occurrence in different manners
US9118708B2 (en)2003-07-012015-08-25Securityprofiling, LlcMulti-path remediation
US8984644B2 (en)2003-07-012015-03-17Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9350752B2 (en)2003-07-012016-05-24Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US10021124B2 (en)2003-07-012018-07-10Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US9117069B2 (en)2003-07-012015-08-25Securityprofiling, LlcReal-time vulnerability monitoring
US9118711B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9225686B2 (en)2003-07-012015-12-29Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US10050988B2 (en)2003-07-012018-08-14Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
CN102487339A (en)*2010-12-012012-06-06中兴通讯股份有限公司Attack preventing method for network equipment and device
US9319425B2 (en)2013-07-232016-04-19Crypteia Networks S.A.Systems and methods for self-tuning network intrusion detection and prevention
WO2015013376A3 (en)*2013-07-232015-11-26Crypteia Networks S.A.Systems and methods for self-tuning network intrusion detection and prevention
US9392007B2 (en)2013-11-042016-07-12Crypteia Networks S.A.System and method for identifying infected networks and systems from unknown attacks
US9088618B1 (en)*2014-04-182015-07-21Kaspersky Lab ZaoSystem and methods for ensuring fault tolerance of antivirus protection realized in a virtual environment
JP2015231138A (en)*2014-06-052015-12-21日本電信電話株式会社Cyber attack practice system, practice environment providing method, and, practice environment providing program
CN105471854A (en)*2015-11-182016-04-06国网智能电网研究院Adaptive boundary abnormity detection method based on multistage strategies
CN111989678A (en)*2018-10-172020-11-24松下电器(美国)知识产权公司Information processing apparatus, information processing method, and program
CN112100626A (en)*2020-09-242020-12-18成都信息工程大学Development method for improving source code audit vulnerability hit rate

Also Published As

Publication numberPublication date
AU2003287419A8 (en)2004-06-07
WO2004042524A3 (en)2004-11-18
US20040098623A1 (en)2004-05-20
WO2004042524A2 (en)2004-05-21
AU2003287419A1 (en)2004-06-07
US7603711B2 (en)2009-10-13

Similar Documents

PublicationPublication DateTitle
US7603711B2 (en)Intrusion detection system
Bace et al.Intrusion detection systems
Bace et al.NIST special publication on intrusion detection systems
CN100448203C (en) Systems and methods for identifying and preventing malicious intrusions
US20150047032A1 (en)System and method for computer security
US20030188189A1 (en)Multi-level and multi-platform intrusion detection and response system
US20120084866A1 (en)Methods, systems, and media for measuring computer security
US20060150249A1 (en)Method and apparatus for predictive and actual intrusion detection on a network
Tan et al.Hiding intrusions: From the abnormal to the normal and beyond
Mualfah et al.Network forensics for detecting flooding attack on web server
Aboelfotoh et al.A review of cyber-security measuring and assessment methods for modern enterprises
Kim et al.DSS for computer security incident response applying CBR and collaborative response
Kurundkar et al.Network intrusion detection using Snort
Beigh et al.Intrusion Detection and Prevention System: Classification and Quick
Karie et al.Cybersecurity incident response in the enterprise
JayasekaraSecurity operations & incident management: Case study analysis
LaPadulaState of the art in anomaly detection and reaction
Badea et al.Computer networks security based on the detection of user's behavior
AllanIntrusion Detection Systems (IDSs): Perspective
Vuppala et al.Intrusion Detection & Prevention Systems-Sourcefire Snort
KanikaSecurity of network using Ids and firewall
Satti et al.Information security on Internet enterprise managed intrusion detection system (EMIDS)
NayakResearch on application of intrusion detection system in data mining
Smaha et al.Software Tools for Detecting Misuse on Unix Systems
AsarcıklıFirewall monitoring using intrusion detection systems

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp