US Patent Application No: 2005/0108,393

Number of patents in Portfolio can not be more than 2000

Host-based network intrusion detection systems

ALSO PUBLISHED AS: 7725936
1 Status Updates

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Methods, systems, and computer-readable mediums containing programmed instructions are disclosed for detecting an intrusion in a communications network. Data packets processed by a transport layer of a network protocol associated with the communications network are scanned using signatures from a repository of the signatures. A determination is made if the scanned data packets are malicious. One or more actions are taken if any data packets are determined to be malicious. Methods, systems, and computer-readable mediums containing programmed instructions are also disclosed for preventing an intrusion in a communications network.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTERNATIONAL BUSINESS MACHINES CORPORATIONARMONK, NY47270

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Banerjee, Pradipta Kumar Bangalore, IN 8 18
Gururaja, Ananth Narayan Mavinakayanahalli Bangalore, IN 2 9

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (1)
* 2004/0117,478 Monitoring network activity 66 2004
 
AXENT TECHNOLOGIES 1, INC. (1)
* 6,279,113 Dynamic signature inspection-based network intrusion detection 480 1998
 
TREND MICRO INCORPORATED (1)
* 7,076,803 Integrated intrusion detection services 75 2002
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (2)
* 2003/0101,353 Method, computer-readable medium, and node for detecting exploits based on an inbound signature of the exploit and an outbound signature in response thereto 66 2001
* 2003/0084,322 System and method of an OS-integrated intrusion detection and anti-virus system 33 2001
 
PENDRAGON ELECTRONICS AND TELECOMMUNICATIONS RESEARCH LLC (1)
* 7,093,290 Security system for networks and the method thereof 6 2001
 
INTEL CORPORATION (1)
* 7,174,566 Integrated network intrusion detection 80 2002
 
CISCO TECHNOLOGY, INC. (1)
* 6,816,973 Method and system for adaptive network security using intelligent packet analysis 100 2002
 
DATADIRECT NETWORKS, INC. (1)
* 6,453,345 Network security and surveillance system 328 1997
 
LANCOPE, INC. (1)
* 7,185,368 Flow-based detection of network intrusions 105 2001
 
McAfee, Inc. (2)
* 6,851,061 System and method for intrusion detection data collection using a network protocol stack multiplexor 80 2000
* 7,007,302 Efficient management and blocking of malicious code and hacking attempts in a network environment 58 2001
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
* 8,286,243 Blocking intrusion attacks at an offending host 2 2007
 
AirTight Networks, Inc (1)
7,333,481 Method and system for disrupting undesirable wireless communication of devices in computer networks 5 2006
 
TREND MICRO INCORPORATED (1)
* 8,601,064 Techniques for defending an email system against malicious sources 2 2006
 
SOUCEFIRE, INC. (1)
7,949,732 Systems and methods for determining characteristics of a network and enforcing policy 14 2004
 
CA, INC. (1)
8,407,792 Systems and methods for computer security 0 2004
 
KOM NETWORKS INC. (2)
8,782,009 Method and system for electronic file lifecycle management 0 2008
8,234,477 Method and system for providing restricted access to a storage medium 3 2009
 
CISCO TECHNOLOGY, INC. (24)
7,885,190 Systems and methods for determining characteristics of a network based on flow analysis 16 2004
7,801,980 Systems and methods for determining characteristics of a network 19 2004
7,730,175 Systems and methods for identifying the services of a network 14 2004
7,716,742 Systems and methods for determining characteristics of a network and analyzing vulnerabilities 22 2004
7,539,681 Methods and systems for multi-pattern searching 18 2004
* 7,496,962 Intrusion detection strategies for hypertext transport protocol 22 2004
8,046,833 Intrusion event correlation with network discovery information 3 2005
7,733,803 Systems and methods for modifying network map attributes 10 2005
7,948,988 Device, system and method for analysis of fragments in a fragment train 2 2006
7,701,945 Device, system and method for analysis of segments in a transmission control protocol (TCP) session 26 2006
8,069,352 Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session 3 2007
7,756,885 Methods and systems for multi-pattern searching 7 2007
7,996,424 Methods and systems for multi-pattern searching 3 2008
8,127,353 Real-time user awareness for a computer network 3 2008
8,474,043 Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing 2 2008
8,272,055 Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system 9 2009
8,289,882 Systems and methods for modifying network map attributes 8 2010
8,433,790 System and method for assigning network blocks to sensors 6 2010
8,671,182 System and method for resolving operating system or service identity conflicts 0 2010
8,578,002 Systems and methods for determining characteristics of a network and enforcing policy 2 2010
8,601,034 System and method for real time data awareness 2 2011
8,677,486 System and method for near-real time network attack detection, and system and method for unified detection via detection routing 0 2011
9,055,094 Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system 0 2012
9,110,905 System and method for assigning network blocks to sensors 0 2013
 
MARVELL INTERNATIONAL LTD. (1)
* 9,042,401 Application-layer mechanism to enable power enhancements in multi-access scenarios 0 2008
 
COMPUTER ASSOCIATES THINK, INC. (2)
* 8,042,180 Intrusion detection based on amount of network traffic 3 2005
* 2005/0262,562 Systems and methods of computer security 10 2005
 
AVG NETHERLANDS B.V. (2)
8,898,787 Software vulnerability exploitation shield 0 2007
* 2007/0226,797 SOFTWARE VULNERABILITY EXPLOITATION SHIELD 10 2007
 
SYROWIK, DAVID R. (2)
8,079,080 Method, system and computer program product for detecting security threats in a computer network 6 2005
9,055,093 Method, system and computer program product for detecting at least one of security threats and undesirable computer files 0 2008
* Cited By Examiner