US Patent Application No: 2005/0108,393

Number of patents in Portfolio can not be more than 2000

Host-based network intrusion detection systems

ALSO PUBLISHED AS: 7725936

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Methods, systems, and computer-readable mediums containing programmed instructions are disclosed for detecting an intrusion in a communications network. Data packets processed by a transport layer of a network protocol associated with the communications network are scanned using signatures from a repository of the signatures. A determination is made if the scanned data packets are malicious. One or more actions are taken if any data packets are determined to be malicious. Methods, systems, and computer-readable mediums containing programmed instructions are also disclosed for preventing an intrusion in a communications network.

Loading the Abstract Image... loading....

First Claim

See full text

Family

Loading Family data... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTERNATIONAL BUSINESS MACHINES CORPORATIONARMONK, NY45606

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Banerjee, Pradipta Kumar Bangalore, IN 12 61
Gururaja, Ananth Narayan Mavinakayanahalli Bangalore, IN 4 41

Cited Art Landscape

  • No Cited Art to Display

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
* 8,286,243 Blocking intrusion attacks at an offending host 2 2007
 
AirTight Networks, Inc (1)
7,333,481 Method and system for disrupting undesirable wireless communication of devices in computer networks 5 2006
 
TREND MICRO INCORPORATED (1)
* 8,601,064 Techniques for defending an email system against malicious sources 1 2006
 
SOUCEFIRE, INC. (1)
7,949,732 Systems and methods for determining characteristics of a network and enforcing policy 10 2004
 
CA, INC. (1)
8,407,792 Systems and methods for computer security 0 2004
 
KOM NETWORKS INC. (2)
8,782,009 Method and system for electronic file lifecycle management 0 2008
8,234,477 Method and system for providing restricted access to a storage medium 2 2009
 
CISCO TECHNOLOGY, INC. (22)
7,885,190 Systems and methods for determining characteristics of a network based on flow analysis 14 2004
7,801,980 Systems and methods for determining characteristics of a network 11 2004
7,730,175 Systems and methods for identifying the services of a network 11 2004
7,716,742 Systems and methods for determining characteristics of a network and analyzing vulnerabilities 14 2004
7,539,681 Methods and systems for multi-pattern searching 16 2004
* 7,496,962 Intrusion detection strategies for hypertext transport protocol 19 2004
8,046,833 Intrusion event correlation with network discovery information 1 2005
7,733,803 Systems and methods for modifying network map attributes 8 2005
7,948,988 Device, system and method for analysis of fragments in a fragment train 0 2006
7,701,945 Device, system and method for analysis of segments in a transmission control protocol (TCP) session 24 2006
8,069,352 Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session 1 2007
7,756,885 Methods and systems for multi-pattern searching 5 2007
7,996,424 Methods and systems for multi-pattern searching 1 2008
8,127,353 Real-time user awareness for a computer network 1 2008
8,474,043 Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing 0 2008
8,272,055 Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system 7 2009
8,289,882 Systems and methods for modifying network map attributes 6 2010
8,433,790 System and method for assigning network blocks to sensors 4 2010
8,671,182 System and method for resolving operating system or service identity conflicts 0 2010
8,578,002 Systems and methods for determining characteristics of a network and enforcing policy 0 2010
8,601,034 System and method for real time data awareness 0 2011
8,677,486 System and method for near-real time network attack detection, and system and method for unified detection via detection routing 0 2011
 
COMPUTER ASSOCIATES THINK, INC. (1)
* 8,042,180 Intrusion detection based on amount of network traffic 1 2005
 
SYROWIK, DAVID R. (1)
8,079,080 Method, system and computer program product for detecting security threats in a computer network 5 2005
 
AVG NETHERLANDS B.V. (2)
8,898,787 Software vulnerability exploitation shield 0 2007
* 2007/0226,797 SOFTWARE VULNERABILITY EXPLOITATION SHIELD 9 2007
* Cited By Examiner