US Patent Application No: 2005/0108,393

Number of patents in Portfolio can not be more than 2000

Host-based network intrusion detection systems

ALSO PUBLISHED AS: 7725936

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Methods, systems, and computer-readable mediums containing programmed instructions are disclosed for detecting an intrusion in a communications network. Data packets processed by a transport layer of a network protocol associated with the communications network are scanned using signatures from a repository of the signatures. A determination is made if the scanned data packets are malicious. One or more actions are taken if any data packets are determined to be malicious. Methods, systems, and computer-readable mediums containing programmed instructions are also disclosed for preventing an intrusion in a communications network.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTERNATIONAL BUSINESS MACHINES CORPORATIONARMONK, NY46916

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Banerjee, Pradipta Kumar Bangalore, IN 8 18
Gururaja, Ananth Narayan Mavinakayanahalli Bangalore, IN 2 9

Cited Art Landscape

Patent Info (Count) # Cites Year
 
Other [Check patent profile for assignment information] (1)
* 2004/0117,478 Monitoring network activity 65 2004
 
AXENT TECHNOLOGIES 1, INC. (1)
* 6,279,113 Dynamic signature inspection-based network intrusion detection 474 1998
 
TREND MICRO INCORPORATED (1)
* 7,076,803 Integrated intrusion detection services 73 2002
 
HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P. (2)
* 2003/0101,353 Method, computer-readable medium, and node for detecting exploits based on an inbound signature of the exploit and an outbound signature in response thereto 61 2001
* 2003/0084,322 System and method of an OS-integrated intrusion detection and anti-virus system 32 2001
 
PENDRAGON ELECTRONICS AND TELECOMMUNICATIONS RESEARCH LLC (1)
* 7,093,290 Security system for networks and the method thereof 6 2001
 
INTEL CORPORATION (1)
* 7,174,566 Integrated network intrusion detection 77 2002
 
CISCO TECHNOLOGY, INC. (1)
* 6,816,973 Method and system for adaptive network security using intelligent packet analysis 93 2002
 
DATADIRECT NETWORKS, INC. (1)
* 6,453,345 Network security and surveillance system 324 1997
 
LANCOPE, INC. (1)
* 7,185,368 Flow-based detection of network intrusions 102 2001
 
McAfee, Inc. (2)
* 6,851,061 System and method for intrusion detection data collection using a network protocol stack multiplexor 71 2000
* 7,007,302 Efficient management and blocking of malicious code and hacking attempts in a network environment 51 2001
* Cited By Examiner

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
* 8,286,243 Blocking intrusion attacks at an offending host 2 2007
 
AirTight Networks, Inc (1)
7,333,481 Method and system for disrupting undesirable wireless communication of devices in computer networks 5 2006
 
TREND MICRO INCORPORATED (1)
* 8,601,064 Techniques for defending an email system against malicious sources 2 2006
 
SOUCEFIRE, INC. (1)
7,949,732 Systems and methods for determining characteristics of a network and enforcing policy 13 2004
 
CA, INC. (1)
8,407,792 Systems and methods for computer security 0 2004
 
KOM NETWORKS INC. (2)
8,782,009 Method and system for electronic file lifecycle management 0 2008
8,234,477 Method and system for providing restricted access to a storage medium 3 2009
 
CISCO TECHNOLOGY, INC. (23)
7,885,190 Systems and methods for determining characteristics of a network based on flow analysis 15 2004
7,801,980 Systems and methods for determining characteristics of a network 12 2004
7,730,175 Systems and methods for identifying the services of a network 13 2004
7,716,742 Systems and methods for determining characteristics of a network and analyzing vulnerabilities 15 2004
7,539,681 Methods and systems for multi-pattern searching 17 2004
* 7,496,962 Intrusion detection strategies for hypertext transport protocol 20 2004
8,046,833 Intrusion event correlation with network discovery information 2 2005
7,733,803 Systems and methods for modifying network map attributes 9 2005
7,948,988 Device, system and method for analysis of fragments in a fragment train 1 2006
7,701,945 Device, system and method for analysis of segments in a transmission control protocol (TCP) session 25 2006
8,069,352 Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session 2 2007
7,756,885 Methods and systems for multi-pattern searching 6 2007
7,996,424 Methods and systems for multi-pattern searching 2 2008
8,127,353 Real-time user awareness for a computer network 2 2008
8,474,043 Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing 1 2008
8,272,055 Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system 8 2009
8,289,882 Systems and methods for modifying network map attributes 7 2010
8,433,790 System and method for assigning network blocks to sensors 5 2010
8,671,182 System and method for resolving operating system or service identity conflicts 0 2010
8,578,002 Systems and methods for determining characteristics of a network and enforcing policy 1 2010
8,601,034 System and method for real time data awareness 1 2011
8,677,486 System and method for near-real time network attack detection, and system and method for unified detection via detection routing 0 2011
9,055,094 Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system 0 2012
 
MARVELL INTERNATIONAL LTD. (1)
* 9,042,401 Application-layer mechanism to enable power enhancements in multi-access scenarios 0 2008
 
COMPUTER ASSOCIATES THINK, INC. (1)
* 8,042,180 Intrusion detection based on amount of network traffic 3 2005
 
AVG NETHERLANDS B.V. (2)
8,898,787 Software vulnerability exploitation shield 0 2007
* 2007/0226,797 SOFTWARE VULNERABILITY EXPLOITATION SHIELD 9 2007
 
SYROWIK, DAVID R. (2)
8,079,080 Method, system and computer program product for detecting security threats in a computer network 6 2005
9,055,093 Method, system and computer program product for detecting at least one of security threats and undesirable computer files 0 2008
* Cited By Examiner