Intrusion Detection Patents (Class 726/23)
-
Publication number: 20080295171Abstract: A wireless node in a wireless network examines data packets directed to itself (i.e., value in destination address field indicates that the wireless node is an intended recipient)for presence of anomalies that suggest intrusion. The data packet is examined as part of the normal course of operation of the node. Upon detection of an anomaly, the wireless node sends a message packet containing details of the anomaly to a sentinel device. The sentinel device processes the anomalies to determine if a possibility of intrusion is indicated, and activates a spy routine in the wireless node. The spy routine enables further investigation into the intrusion. As components (such as wireless nodes) in the wireless network operate normally (normal operations) until an anomalous condition/event occurs, the additional power requirements for intrusion detection are reduced. If intrusion is detected, appropriate actions, such as alerting an operator, are taken to mitigate the intrusion.Type: ApplicationFiled: May 23, 2007Publication date: November 27, 2008Applicant: Honeywell International Inc.Inventors: Abhishek Kumar Singh, Gaurav Kumar, Sudarshan Yermal, Kartikeya Sriniwas Ramanathan, Denis Foo Kune, Channabasavaraj Raravi
-
Publication number: 20080295175Abstract: A low rate DoS attack detection algorithm is used, which relies on a characteristic of the low rate DoS attack in introducing high rate traffic for short periods, and then uses a proactive test based differentiation technique to filter the attack packets. The proactive test defends against DDoS attacks and low rate DoS attacks which tend to ignore the normal operation of network protocols, but it also differentiates legitimate traffic from low rate DoS attack traffic instigated by botnets. It leverages on the conformity of legitimate flows, which obey the network protocols. It also differentiates legitimate connections by checking their responses to the proactive tests which include puzzles for distinguishing botnets from human users.Type: ApplicationFiled: May 27, 2008Publication date: November 27, 2008Inventors: Nirwan Ansari, Amey Bhaskar Shevtekar
-
Publication number: 20080295172Abstract: A method, system and computer-readable media that enable the employment of an intrusion detection process are provided. This present invention is able to differentiate between certain malicious and benign incidents by means of a two-stage anomaly-based intrusion detection and prevention system. The invented system works at high-speed and with low-memory resources requirements. In particular, the invented method is implemented in a two-stage detector that performs coarse grain detection using sub-profiles 30A-30H (key features extracted from a profile) at one stage and fine grain (detailed behavioral profile) detection at another stage to eliminate unwanted attacks and false positives. Furthermore, in order to suppress specific alarms, the invented system allows the administrator to specify detailed profiles 32A-32H. By using a sub-profile extractor, a sub-profile is extracted, which is then downloaded into the coarse grain detector.Type: ApplicationFiled: May 22, 2007Publication date: November 27, 2008Inventor: Khushboo Bohacek
-
Publication number: 20080295173Abstract: Method, system and machine accessible medium for pattern based network defense. The traffic flow in a network is tracked independently form the payload data in the flow. The traffic flow pattern is compared with a set of predefined malicious traffic patterns descriptions. An event is triggered responsive to a match between a subset of the traffic patterns and the predefined malicious traffic descriptions.Type: ApplicationFiled: August 14, 2007Publication date: November 27, 2008Inventor: Tsvetomir Iliev Tsvetanov
-
Patent number: 7458094Abstract: The invention provides a method and system for monitoring a computer network and determining whether the network faces a threat from users. In the event that the existence of a threat is determined, the system in accordance with the invention provides a real-time assessment of the threat to the network and responds to prevent damage to the network.Type: GrantFiled: June 6, 2001Date of Patent: November 25, 2008Assignee: Science Applications International CorporationInventor: Gary Manuel Jackson
-
Patent number: 7458099Abstract: Systems, methods, and computer readable media for determining whether a computer file (340) has been infected by an attacking agent. A scanning engine (205) generates a new hash of a critical viral target region of the file (340) and compares it to a stored hash of the critical viral target region. The scanning engine (205) determines whether the file (340) has been scanned by the most recent version of a detection module (425) associated with the attacking agent. If the hashes are identical and the file (340) has been scanned by the most recent version of the detection module (425), the scanning engine (205) determines that the file (340) is free of infection by the attacking agent.Type: GrantFiled: September 30, 2007Date of Patent: November 25, 2008Assignee: Symantec CorporationInventors: Carey Nachenberg, Peter Szor
-
Patent number: 7458095Abstract: The invention is a method of connecting user equipment to at least one network, a communication system, and a user equipment. In a communication system comprising at least one network, including network entities which provide connectivity to user equipment, a method of connecting the user equipment to the at least one network in accordance with the invention includes establishing a secure tunnel which provides connection between the user equipment and one of the network entities; and authenticating the user equipment with another of the network entities; and wherein the authenticating of the user equipment with the another of the network entities occurs at least partially simultaneously with the establishing of the secure tunnel.Type: GrantFiled: November 18, 2003Date of Patent: November 25, 2008Assignee: Nokia Siemens Networks OyInventor: Dan Forsberg
-
Patent number: 7458098Abstract: The present invention is directed to systems and methods for enhancing electronic communication security. An electronic communication related to an application is received and stored. One or more risk assessments are made with respect to the received communication thereby generating a risk profile associated with the communication. The risk profile is analyzed with respect to data associated with previously received communications to determine if the received communication is anomalous. If the received communication is determined to be anomalous, an anomaly indicator signal is output.Type: GrantFiled: March 8, 2002Date of Patent: November 25, 2008Assignee: Secure Computing CorporationInventors: Paul Judge, Guru Rajan
-
Publication number: 20080289040Abstract: Systems and methods for virtualizing network intrusion detection system (IDS) functions based on each packet's source and/or destination host computer operating system (OS) type and characteristics are described. Virtualization is accomplished by fingerprinting each packet to determine the packet's target OS and then vetting each packet in a virtual IDS against a reduced set of threat signatures specific to the target OS. Each virtual IDS, whether operating on a separate computer or operating as a logically distinct process or separate thread running on a single computer processor, may also operate in parallel with other virtual IDS processes. IDS processing efficiency and speed are greatly increased by the fact that a much smaller subset of threat signature universe is used for each OS-specific packet threat vetting operation.Type: ApplicationFiled: April 27, 2004Publication date: November 20, 2008Inventor: Ravishankar Ganesh Ithal
-
Patent number: 7454790Abstract: A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.Type: GrantFiled: May 23, 2005Date of Patent: November 18, 2008Assignee: UT-Battelle, LLCInventor: Thomas E. Potok
-
Patent number: 7450005Abstract: An intrusion detection mechanism is provided for flexible, automatic, thorough, and consistent security checking and vulnerability resolution in a heterogeneous environment. The mechanism may provide a predefined number of default intrusion analysis approaches, such as signature-based, anomaly-based, scan-based, and danger theory. The intrusion detection mechanism also allows a limitless number of intrusion analysis approaches to be added on the fly. Using an intrusion detection skin, the mechanism allows various weights to be assigned to specific intrusion analysis approaches. The mechanism may adjust these weights dynamically. The score ration can be tailored to determine if an intrusion occurred and adjusted dynamically. Also, multiple security policies for any type of computing element may be enforced.Type: GrantFiled: January 18, 2006Date of Patent: November 11, 2008Assignee: International Business Machines CorporationInventors: Vaijayanthimala K. Anand, Sandra K. Johnson, David Robert Safford, Kimberly DaShawn Simon
-
Patent number: 7451486Abstract: A method for detecting intrusions that employ messages of two or more protocols is disclosed. Such intrusions might occur in Voice over Internet Protocol (VoIP) systems, as well as in systems in which two or more protocols support some service other than VoIP. In the illustrative embodiment of the present invention, a stateful intrusion-detection system is capable of employing rules that have cross-protocol pre-conditions. The illustrative embodiment can use such rules to recognize a variety of VoIP-based intrusion attempts, such as call hijacking, BYE attacks, etc. In addition, the illustrative embodiment is capable of using such rules to recognize other kinds of intrusion attempts in which two or more protocols support a service other than VoIP. The illustrative embodiment also comprises a stateful firewall that is capable of employing rules with cross-protocol pre-conditions.Type: GrantFiled: September 30, 2004Date of Patent: November 11, 2008Assignee: Avaya Inc.Inventors: Sachin Garg, Navjot Singh, Timothy Kohchih Tsai, Yu-Sung Wu, Saurabh Bagchi
-
Patent number: 7451485Abstract: A malfunction detection system is provided that can continue or terminate processing appropriately even if a malfunction occurs in an information processing unit. In this regard, the information processing unit receives branch direction information, carries out a conditional branch depending on the branch direction information, and performs an applicable operation on data I. At this time, the information processing unit performs an applicable operation on data J, other than the operated data I, in the conditional branch path and outputs the result for examination, thereby enabling validation of the conditional branch.Type: GrantFiled: April 18, 2002Date of Patent: November 11, 2008Assignees: Hitachi, Ltd., Hitachi ULSI Systems Co., Ltd.Inventors: Takashi Watanabe, Takashi Endo, Masahiro Kaminaga, Kunihiko Nakada, Yuuichirou Nariyoshi, Chiaki Tanimoto
-
Publication number: 20080276316Abstract: A hypertext transport protocol (HTTP) inspection engine for an intrusion detection system (IDS) includes an HTTP policy selection component, a request universal resource identifier (URI) discovery component, and a URI normalization module. The HTTP policy selection component identifies an HTTP intrusion detection policy using a packet. The request URI discovery component locates a URI within the packet. The URI normalization module decodes an obfuscation within the URI. In another embodiment, a packet transmitted on the network is intercepted. The packet is parsed. An Internet protocol (IP) address of the packet is identified. An HTTP intrusion detection policy for a network device is determined. A URI is located in the packet. A pattern from an intrusion detection system rule is compared to the located URI. In another embodiment, an IDS includes a packet acquisition system, network and transport reassembly modules, an HTTP inspection engine, a detection engine, and a logging system.Type: ApplicationFiled: September 29, 2004Publication date: November 6, 2008Inventors: Daniel J. Roelker, Marc A. Norton
-
Publication number: 20080276317Abstract: Multi-step processes such as intrusions into computer networks are detected from individual activities or events such as communications by identifying anchor points (FIG. 2, 220) that are likely to be part of the process, proceeding from the anchor points to extract other activities as a context of the anchor points, and characterizing the process from the activities in the context. The process may be characterized as sets of context activities.Type: ApplicationFiled: January 10, 2006Publication date: November 6, 2008Inventors: Varun Chandola, Eric Eilertson, Haiyang Liu, Mark Shaneck, Changho Choi, Gyoergy Simon, Yongdae Kim, Vipin Kumar, Jaideep Srivastava, Zhi-Li Zhang
-
Publication number: 20080276297Abstract: A method and system for monitoring UDP communications and for preventing unauthorized UDP communications within a computer network. A method for managing access to a resource comprises assigning a unique user identifier to each authorized user, upon initiation of a UDP communication initialed by a specific authorized user for access to a specific resource, appending the unique user identifier of the specific authorized user to each UDP packet of the UDP communication, intercepting the plurality of UDP packets within the computer network, extracting the unique user identifier from each UDP packet to identify the specific authorized user associated with the respective UDP packet, and allowing each respective UDP packet to reach the specific resource as a function of the unique user identifier extracted from the respective UDP packet.Type: ApplicationFiled: June 9, 2008Publication date: November 6, 2008Applicant: TRUSTED NETWORK TECHNOLOGIES, INC.Inventor: A. David SHAY
-
Publication number: 20080276319Abstract: A computer system, device, computer software, and/or method performed by a computer system, is provided for determining a user name likely to be associated with an attack, a configuration, or a vulnerability. First data is obtained which associates user names with individual IP addresses onto which the user names were logged in. Second data is obtained which associates attacks, configurations, or vulnerabilities with individual IP addresses on which the attacks occurred or on which the configurations or vulnerabilities exist. The user names from the first data are associated with the attacks, configurations or vulnerabilities from the second data based on having the same IP address during a log-in. An individual user name is indicated as being associated with attacks which occurred while the individual user name was logged in or with configurations or vulnerabilities for an IP address onto which the user logs in.Type: ApplicationFiled: April 29, 2008Publication date: November 6, 2008Applicant: Sourcefire, Inc.Inventor: Brian Rittermann
-
Publication number: 20080276318Abstract: A spam detection system employs a “Delayed-Verification on Purported Responsible Address” (DVPRA) module which verifies the validity of the return address of a received e-mail message in mail server in a time delay interval specifiable by the user. An implementation of the module as a Spam Mail Filter in a stand-alone spam detection system. An implementation of the module as a supplementary to the existing anti-spam systems.Type: ApplicationFiled: May 2, 2007Publication date: November 6, 2008Inventors: Brian Leung, Keith Lau, Wah Cheong Hui, Ching Shan Wong
-
Patent number: 7448083Abstract: The security apparatus comprises a memory unit which stores data that is a target of security; a CPU which counts the number of processing relating to the secret data as processing access count data, and counts the number of times the processing access count data is updated by outside causes as monitor count data. The processing access count data has exceeded a preset processing access count threshold, the CPU restricts subsequent processing, and, when the monitor count data has exceeded a preset monitor count threshold, the CPU restricts subsequent processing.Type: GrantFiled: March 29, 2002Date of Patent: November 4, 2008Assignee: Fujitsu LimitedInventor: Takeshi Kashiwada
-
Publication number: 20080271145Abstract: A tamper indication system for a computing system comprises a sensor reader configured to determine a state of a tamper sensor of the computing system, and firmware disposed in the computing system and configured to cause a report to evidence whether the report has been tampered with, the report indicating the state of the tamper sensor.Type: ApplicationFiled: April 30, 2007Publication date: October 30, 2008Inventor: Mark R. Schiller
-
Publication number: 20080271146Abstract: The invention provides methods, apparatus and systems for detecting distributed denial of service (DDoS) attacks within the Internet by sampling packets at a point or points in Internet backbone connections to determine a packet metric parameter. The packet metric parameter which might comprise the volume of packets received is analysed over selected time intervals with respect to specified geographical locations in which the hosts transmitting the packets are located. The expected behaviour can be employed to identify traffic distortions revealing a DDoS attack. In a complementary aspect, the invention provides a method of authenticating packets at routers in order to elevate the QoS of authenticated packets. This method can be used to block or filter packets and can be used in conjunction with the DDoS attack detection system to defend against DDoS attacks within the Internet in a distributed manner.Type: ApplicationFiled: May 26, 2008Publication date: October 30, 2008Inventors: John G. Rooney, Christopher J. Giblin, Marcel Waldvogel, Paul T. Hurley
-
Patent number: 7444511Abstract: The wireless base station determines whether or not each wireless terminal station accessing to the wireless base station is authenticated for the access to the LAN. Thereafter, the wireless base station stores the result of the determination to the packet distributing table. When the wireless base station receives a packet from any wireless terminal station, the wireless base station determines whether or not the wireless terminal station transmitted the packet is authenticated. If the wireless terminal station is authenticated, the packet is transmitted to the LAN. On the other hand, if the wireless terminal station is not authenticated, the packet is transmitted to the server or the gateway.Type: GrantFiled: September 26, 2001Date of Patent: October 28, 2008Assignee: NEC CorporationInventor: Shinichi Morimoto
-
Patent number: 7444678Abstract: The invention provides a new mechanism which is used to protect all internal resources against requests from sandboxed scripts. In the preferred embodiment, the mechanism is implemented for SOAP calls by untrusted scripts. When an attempt is made to access a resource at a previously-unknown URI, the sandbox reads a file at that domain with declarations to determine whether access is permitted to the script. If the file is not found, the access is denied.Type: GrantFiled: June 14, 2004Date of Patent: October 28, 2008Assignee: AOL LLCInventors: Ray Whitmer, Harish Dhurvasula
-
Patent number: 7444679Abstract: A network having a intrusion protection system comprising a network medium, a management node connected to the network medium and running an intrusion prevention system management application, and a plurality of nodes connected to the network medium and running an instance of an intrusion protection system application, at least one of the nodes having an identification assigned thereto based on a logical assignment grouping one or more of the plurality of nodes, each node sharing the identification being commonly vulnerable to at least one network exploit is provided. A method of transmitting a command and security update message to a subset of nodes of a plurality of network nodes comprising generating an update message by a management node of the network, addressing the update message to a network address shared by the subset of nodes, transmitting the update message, and receiving and processing the update message by the subset of nodes is provided.Type: GrantFiled: October 31, 2001Date of Patent: October 28, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Richard Paul Tarquini, George Simon Gales
-
Patent number: 7444677Abstract: Additional code is added to sensitive code in order to foil an adversary attempting to examine or modify the sensitive code. The additional code implements a cascade failure system. In the cascade failure system an intrusion is detected by an authorization check, and when an intrusion is detected, further changes are made which will trigger failures of other authorization checks or cause corruptions to the internal execution state of the program. Eventually, the changes will trigger a complete failure of the code to run correctly, however the genesis of the cascading failure will be concealed, so an adversary will not be able to determine how the intrusion was initially detected. The insertion of the additional cascade failure system code can be performed automatically by a mechanism with some random components, and thus the locations and content of the inserted code may be different for each instance of sensitive code into which a content failure system has been inserted.Type: GrantFiled: March 5, 2004Date of Patent: October 28, 2008Assignee: Microsoft CorporationInventor: Michael David Marr
-
Publication number: 20080263666Abstract: A computer implemented method, apparatus, and computer program product for port scan protection. A reply data packet having a modified transmission control protocol header is generated to form a modified reply data packet, in response to detecting a port scan. The modified reply data packet will illicit a response from a recipient of the modified data packet. The reply data packet is sent to a first Internet protocol address associated with the port scan. A second Internet protocol address is identified from a header of the response to the modified reply data packet. The second Internet protocol address is an actual Internet protocol address of a source of the port scan. All network traffic from the second Internet protocol address may be blocked to prevent an attack on any open ports from the source of the port scan.Type: ApplicationFiled: April 23, 2007Publication date: October 23, 2008Inventors: SUSANN MARIE KEOHANE, Gerald Francis McBrearty, Shawn Patrick Mullen, Jessica Carol Murillo, Johnny Meng-Han Shieh
-
Publication number: 20080263667Abstract: Encoded data that is obtained by embedding subdata in advertisement information and embedding the subdata-embedded advertisement information in main data is provided to a user. At the user side, the encoded data is decoded to reproduce the main data and the subdata-embedded advertisement information, and the subdata-embedded advertisement information is decoded to reproduce the advertisement information and the subdata embedded therein.Type: ApplicationFiled: April 16, 2008Publication date: October 23, 2008Inventor: Tetsujiro Kondo
-
Publication number: 20080263668Abstract: A system in which a networked device automatically evaluates hacker attack notification information and, based thereon, selects and executes responses to the attack. The notification may include information such as the address of the infected system, identification of the specific worm, and a list of vulnerable applications and operating systems. The evaluation is based on factors including criticality and vulnerability of applications running on the system and connectivity of the device. A variety of automatic responses can be selected, including notification of network administration, shutdown of the device or services running on the device, updating and activation of anti-virus software, and selective handling of data sent from the address of the suspect network device. The selection of responses can occur automatically based on rules input during setup or by intervention of network administration.Type: ApplicationFiled: July 8, 2008Publication date: October 23, 2008Applicant: International Business Machines CorporationInventors: Simon C. Chu, Steven W. Hunter, William Joseph Piazza, Gregory Brian Pruett
-
Publication number: 20080263665Abstract: This disclosure describes techniques for determining whether network traffic contains one or more computer security threats. In order to determine whether a symbol stream conforms to the symbol pattern, a security device stores a full deterministic finite automaton (fDFA) that accepts streams of symbols that conform to the symbol pattern. The security device also creates a partial deterministic finite automaton (pDFA) that includes nodes that correspond to the nodes in the fDFA that have the highest visitation levels. The security device processes each symbol in the symbol stream using the pDFA until a symbol causes the pDFA to transition to a failure node or to an accepting node. If the symbol causes the pDFA to transition to the failure node, the security device processes the symbol and subsequent symbols in the symbol stream using the fDFA.Type: ApplicationFiled: April 20, 2007Publication date: October 23, 2008Applicant: Juniper Networks, Inc.Inventors: Qingming Ma, Bryan Burns, Krishna Narayanaswamy, Vipin Rawat, Michael Chuong Shieh
-
Publication number: 20080263664Abstract: The invention relates to the integration of a security operations policy into a threat management vector.Type: ApplicationFiled: April 17, 2007Publication date: October 23, 2008Inventor: John J. McKenna
-
Patent number: 7440434Abstract: A system and method is provided for detecting wireless access devices coupled to local area network of computers. The method includes coupling a sniffer device to a local area network. The method includes transferring one or more packets to be directed to a selected device over the local area network. The selected device is preferably coupled to the local area network. The method includes intercepting the one or more packets to be directed to the selected device at the sniffer device. Moreover, the method includes deriving information from the intercepted one or more packets using the sniffer device. The method can generate one or more marker packets in a selected format using the sniffer device. The marker packets are provided based upon at least a portion of the information derived from the intercepted packets.Type: GrantFiled: December 29, 2004Date of Patent: October 21, 2008Assignee: AirTight Networks, Inc.Inventors: Hemant Chaskar, Murthy Jonnalagadda, Sharad Mittal, Pravin Bhagwat
-
Patent number: 7441272Abstract: A technique for self-isolation of a network device that has been identified as potentially harmful. The network device may be isolated from the network except for an out-of-band communication channel that can be used for management purposes to restore or repair the device prior to the network connection being re-established.Type: GrantFiled: June 9, 2004Date of Patent: October 21, 2008Assignee: Intel CorporationInventors: David M. Durham, Ravi Sahita, Priya Rajagopal, James Kardach, Scott Hahn, Raj Yavatkar
-
Patent number: 7441275Abstract: An apparatus and a corresponding method provide for real-time recovery of compromised information in a computer network. The method includes analyzing data objects in the computer network to determine data objects that comprise minimal essential information, collecting the minimal essential information, and storing the minimal essential information. To limit potential exposure of the minimal essential information, the stored minimal essential information is hidden in the computer network.Type: GrantFiled: May 14, 2003Date of Patent: October 21, 2008Assignee: Northrop Grumman CorporationInventors: Dennis Hain McCallam, Ronald Kenneth Newland
-
Publication number: 20080256634Abstract: In embodiments of the present invention improved capabilities are described for a data stream scanner. The present invention may provide for a data portion received in association with a data stream, and the data portion may be analyzed to make an assessment. An identity pool may then be selected from a universe of identities based on the assessment, and identities from the identity pool may be selected in a scanning process to analyze the data stream. Further, an unmatched identity may remove the identity from the pool upon finding that the unmatched identity does not match data in the data stream.Type: ApplicationFiled: March 14, 2008Publication date: October 16, 2008Inventor: Peter Pichler
-
Patent number: 7437761Abstract: An apparatus includes a server connected between a first computer network in which a computer virus may generate and a second computer network or a computer system as an object of security protection. In the apparatus, a collection unit collects irregular data representing a possibility of generation of the computer virus that may attack the server. A decision unit decides whether the computer virus is being generated on the computer network in accordance with the irregular data. A notification unit notifies the second computer network or the computer system of generation of the computer virus when the decision unit decides that the computer virus is being generated.Type: GrantFiled: June 20, 2007Date of Patent: October 14, 2008Assignee: Kabushiki Kaisha ToshibaInventor: Toshinari Takahashi
-
Patent number: 7436770Abstract: The packet rate limiting method and system is used for detecting and blocking the effects of DoS attacks on IP networks. The method uses an ACL counter that stores an action parameter in the first 3 most significant bits and uses 13 bits as a packet counter. A rate limit is enforced by setting the packet counter to an initial value, and resetting this value at given intervals of time. The action parameter enables the ACL to accept or deny packets based on this rate limit. If the number of packets in the incoming flow saturates the packet counter before the reset time, the packets are denied access to the network until the counter is next reset. The denied packets may be just discarded or may be extracted for further examination.Type: GrantFiled: January 21, 2004Date of Patent: October 14, 2008Assignee: Alcatel LucentInventors: Jason Sterne, Adrian Grah, Shay Nahum, Predrag Kostic, Herman Ho Ming Liu
-
Patent number: 7437759Abstract: A method includes hooking a critical operating system function, stalling a call to the critical operating system function originating from a call module, determining a location of the call module in a kernel address space of a memory, and determining whether the location is in a driver area of the kernel address space. Upon a determination that the call module is not in the driver area, the method further includes taking protective action to protect a host computer system. In this event, it is highly likely that the call module is malicious code that has been injected into the kernel stack/heap through a malicious kernel mode buffer overflow attack. By taking protective action, exploitation, damage or destruction of the host computer system is prevented.Type: GrantFiled: February 17, 2004Date of Patent: October 14, 2008Assignee: Symantec CorporationInventor: Peter Szor
-
Patent number: 7436955Abstract: The present invention provides methods, systems and apparatus for encrypting and for decrypting a data stream, for securely sending a data stream and for securely receiving a data stream, and for secure transmission of a data stream. The data stream, after at least a part of it being encrypted, is transmitted from a sender to a receiver via a channel. An exemplary method for encrypting comprises: adjusting encryption attributes during transmission; encrypting the data stream according to the adjusted encryption attributes; and transmitting the encrypted data stream and information of the encryption attributes to the receiver.Type: GrantFiled: May 6, 2004Date of Patent: October 14, 2008Assignee: International Business Machines CorporationInventors: Rong Yan, Jian Zhang, Dong Xie
-
Patent number: 7437568Abstract: Computer apparatus comprising a receiver for receiving an integrity metric for a computer entity via a trusted device associated with the computer entity, the integrity metric having values for a plurality of characteristics associated with the computer entity; a controller for assigning a trust level to the computer entity from a plurality of trust levels, wherein the assigned trust level is based upon the value of at least one of the characteristics of the received integrity metric.Type: GrantFiled: August 16, 2001Date of Patent: October 14, 2008Assignee: Hewlett-Packard Development Company, L.P.Inventors: Arindam Das-Purkayastha, Siani Lynne Pearson, Liqun Chen
-
Method, computer program element and a system for processing alarms triggered by a monitoring system
Patent number: 7437762Abstract: A method and system is designed for processing alarms, that have been triggered by a monitoring system such as an intrusion detection system, a firewall, or a network management system, comprising the steps of entering the triggered alarms into an alarm log, evaluating similarity between alarms, grouping similar alarms into alarm clusters, summarizing alarm clusters by means of generalized alarms, counting the covered alarms for each generalized alarm and forwarding generalized alarms for further processing if the number of alarms covered satisfies a predetermined criterion.Type: GrantFiled: November 1, 2002Date of Patent: October 14, 2008Assignee: International Business Machines CorporationInventors: Marc Dacier, Klaus Julisch -
Publication number: 20080250500Abstract: Detection of a man-in-the-middle attack. In particular implementations, a method includes detecting a first event comprising notification of an invalid wireless management frame operable to cause a termination of a connection between a wireless client and a wireless access point, wherein the notification is based on a failed verification of a management integrity code (MIC) appended to the wireless management frame. The method also includes detecting a second event involving notification of either an authentication failure associated with the wireless client or a connection between the wireless client and a rogue access point. The method also includes performing one or more actions upon detection of the first event and the second event within a threshold period of time of each other.Type: ApplicationFiled: April 5, 2007Publication date: October 9, 2008Applicant: Cisco Technology, Inc.Inventors: Timothy S. Olson, Arun Khanna, Bruce McMurdo, Nancy Cam-Winget, Liwen Wu
-
Publication number: 20080250502Abstract: A method of checking the integrity of a software component comprises: selecting a checking algorithm 50 from a plurality of checking algorithms in a pseudo-random manner; performing the algorithm on the component 22 to produce a checking code that is dependent on the integrity of the component and the algorithm selected; and comparing the checking code with a reference code 52 to check the integrity of the component.Type: ApplicationFiled: May 30, 2006Publication date: October 9, 2008Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventor: Joan Bosch Sole
-
Publication number: 20080250503Abstract: An e-mail relay provides message filtering services to an e-mail network. The e-mail relay monitors incoming communication and intercepts e-mail messages. The e-mail relay compares attributes of the messages to data derived from SPAM messages, which are stored in a SPAM database. The e-mail relay restricts the delivery of messages based on the comparison such as by restricting the delivery of messages having attributes close to those of SPAM messages from the SPAM database. The SPAM database is constructed by responding to user or administrator indications as to whether received messages are SPAM messages.Type: ApplicationFiled: June 16, 2008Publication date: October 9, 2008Applicant: TUMBLEWEED COMMUNICATIONS CORP.Inventors: Jean-Christophe Bandini, Daryl Odnert, Dmitry Dolinsky
-
Publication number: 20080250498Abstract: This method of detecting address spoofing in a wireless network, comprising the steps of obtaining frames comprising an address of a device having sent the frame and a timestamp representative of the time of sending of the frame by said device; of analyzing the timestamps included in the frames having one and the same sending device address; and of detecting a spoofing of said address according to the analysis of said timestamps.Type: ApplicationFiled: September 21, 2005Publication date: October 9, 2008Applicant: FRANCE TELECOMInventors: Laurent Butti, Roland Duffau, Franck Veysset
-
Publication number: 20080250501Abstract: A method for monitoring the managed devices comprises that the manage center preserves the integrality list in advance, which includes the system integrality values of the managed devices and the corresponding relations of the managed devices and the system integrality values of themselves, and the managed device gathers the current system integrality value of itself and saves it when it starts; the managed device sends the information including the current system integrality value to the manage center after receiving the monitor command from the manage center; the manage center determines whether the received current system integrality value of the managed device coincides with the integrality value of the managed device saved by itself according to the received information and said integrality list, and implements the alert process when they do not coincide with each other.Type: ApplicationFiled: December 8, 2005Publication date: October 9, 2008Applicant: BEIJING LENOVO SOFTWARE LTD.Inventors: Wei Wei, Yadong Qu, Jun Chen
-
Publication number: 20080250499Abstract: Buffer overflow exploits in a computer are reduced by encoding linkage information associated with a subroutine, following a call to the subroutine from an application executing on the computer. The encoded linkage information is stored at a first address in a run-time stack in a memory of the computer. Upon exit from the subroutine, the value stored at the first address in the run-time stack is retrieved and decoded to obtain decoded linkage information. Execution of the application continues in accordance with the decoded linkage information. Subroutine data written to the stack is not encoded.Type: ApplicationFiled: March 30, 2007Publication date: October 9, 2008Applicant: Motorola, Inc.Inventors: Kent D. Moat, Ronald F. Buskey, Brian G. Lucas
-
Patent number: 7434261Abstract: The present invention provides a system and method of tracing the spread of computer malware in a communication network. One aspect of the present invention is a method that traces the spread of computer malware in a communication network. When suspicious data characteristic of malware is identified in a computing device connected to the communication network, the method causes data that describes the state of the computing device to be stored in a database. After a specific attack against the communication network is confirmed, computing devices that are infected with the malware are identified. Then, the spread of the malware between computing devices in the communication network is traced back to a source.Type: GrantFiled: September 27, 2004Date of Patent: October 7, 2008Assignee: Microsoft CorporationInventors: Mihai Costea, David W Aucsmith
-
Patent number: 7434262Abstract: Data communications between devices are selectively blocked and resurrected based on error notifications. Data communications from one or more source devices to one or more intended destination devices are selectively blocked based on content of the data communications. The blocked data communications are stored in a database. A blocked data communication is retrieved from the database in response to an error notification from one of the source devices and/or from one of the destination devices. The retrieved data communication is then sent to the intended destination device.Type: GrantFiled: December 8, 2004Date of Patent: October 7, 2008Assignee: AT&T Intellectual Property I, L.P.Inventors: Jeffrey A. Aaron, Jun-Gang Alin
-
Patent number: 7433960Abstract: Systems, methods and computer products for profile-based identity verification over the Internet. Exemplary embodiments include a method for profiling a user on a network, the method including receiving an input of streams corresponding to network activities associated with the user, wherein the input of streams are received from one or more layers of the network, in response to receiving a request to supply specified-input, receiving a score function and a list of attributes to be monitored, classifying the input of streams into network-activity classifications, extracting values and attributes for the network-activity classifications, and placing the extracted values and attributes into data sets, calculating a score of the data sets, comparing the data sets to a database of activity-specific attributes and mapping the data sets to a class of individuals based on a value of the score and the comparison of the database of activity-specific attributes.Type: GrantFiled: January 4, 2008Date of Patent: October 7, 2008Assignee: International Business Machines CorporationInventors: Parijat Dube, David A. George, Raymond B. Jennings, III
-
Publication number: 20080244745Abstract: A system securing a computer network having various devices connected thereto. The system includes a security subsystem connected to the devices in the network, a master security system, and a first communication medium connected between the security subsystem and the master security system. The network devices generate event messages when under attack. The security subsystem generates multiple views, each view including a subset of the event messages generated by the devices. The security subsystem includes an event analyzer, which analyzes the event messages across multiple views to determine if any of the associated events exceeds a predetermined threshold. The master security system receives the associated events, which exceed the predetermined threshold, from the security subsystem through the first communication medium.Type: ApplicationFiled: May 5, 2008Publication date: October 2, 2008Applicant: SOLUTIONARY, INC.Inventors: Michael HRABIK, Jeffrey GUILFOYLE, Edward MAC BEAVER