US Patent Application No: 2005/0108,393

Number of patents in Portfolio can not be more than 2000

Host-based network intrusion detection systems

ALSO PUBLISHED AS: 7725936

Stats

ATTORNEY / AGENT: (SPONSORED)

Importance

Loading Importance Indicators... loading....

Abstract

See full text

Methods, systems, and computer-readable mediums containing programmed instructions are disclosed for detecting an intrusion in a communications network. Data packets processed by a transport layer of a network protocol associated with the communications network are scanned using signatures from a repository of the signatures. A determination is made if the scanned data packets are malicious. One or more actions are taken if any data packets are determined to be malicious. Methods, systems, and computer-readable mediums containing programmed instructions are also disclosed for preventing an intrusion in a communications network.

Loading the Abstract Image... loading....

First Claim

See full text

all claims..

Related Publications

Loading Related Publications... loading....

Patent Owner(s)

Patent OwnerAddressTotal Patents
INTERNATIONAL BUSINESS MACHINES CORPORATIONARMONK, NY77159

International Classification(s)

  • [Classification Symbol]
  • [Patents Count]

Inventor(s)

Inventor Name Address # of filed Patents Total Citations
Banerjee, Pradipta Kumar Bangalore, IN 12 51
Gururaja, Ananth Narayan Mavinakayanahalli Bangalore, IN 4 40

Patent Citation Ranking

Forward Cite Landscape

Patent Info (Count) # Cites Year
 
CISCO TECHNOLOGY, INC. (22)
7,885,190 Systems and methods for determining characteristics of a network based on flow analysis 13 2004
7,801,980 Systems and methods for determining characteristics of a network 10 2004
7,730,175 Systems and methods for identifying the services of a network 11 2004
7,716,742 Systems and methods for determining characteristics of a network and analyzing vulnerabilities 11 2004
7,539,681 Methods and systems for multi-pattern searching 16 2004
7,496,962 Intrusion detection strategies for hypertext transport protocol 19 2004
8,046,833 Intrusion event correlation with network discovery information 1 2005
7,733,803 Systems and methods for modifying network map attributes 8 2005
7,948,988 Device, system and method for analysis of fragments in a fragment train 0 2006
7,701,945 Device, system and method for analysis of segments in a transmission control protocol (TCP) session 24 2006
8,069,352 Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session 1 2007
7,756,885 Methods and systems for multi-pattern searching 5 2007
7,996,424 Methods and systems for multi-pattern searching 0 2008
8,127,353 Real-time user awareness for a computer network 1 2008
8,474,043 Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing 0 2008
8,272,055 Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system 7 2009
8,289,882 Systems and methods for modifying network map attributes 6 2010
8,433,790 System and method for assigning network blocks to sensors 4 2010
8,671,182 System and method for resolving operating system or service identity conflicts 0 2010
8,578,002 Systems and methods for determining characteristics of a network and enforcing policy 0 2010
8,601,034 System and method for real time data awareness 0 2011
8,677,486 System and method for near-real time network attack detection, and system and method for unified detection via detection routing 0 2011
 
KOM NETWORKS INC. (2)
8,782,009 Method and system for electronic file lifecycle management 0 2008
8,234,477 Method and system for providing restricted access to a storage medium 2 2009
 
AirTight Networks, Inc (1)
7,333,481 Method and system for disrupting undesirable wireless communication of devices in computer networks 3 2006
 
CA, INC. (1)
8,407,792 Systems and methods for computer security 0 2004
 
COMPUTER ASSOCIATES THINK, INC. (1)
8,042,180 Intrusion detection based on amount of network traffic 1 2005
 
INTERNATIONAL BUSINESS MACHINES CORPORATION (1)
8,286,243 Blocking intrusion attacks at an offending host 2 2007
 
SOUCEFIRE, INC. (1)
7,949,732 Systems and methods for determining characteristics of a network and enforcing policy 9 2004
 
SYROWIK, DAVID R. (1)
8,079,080 Method, system and computer program product for detecting security threats in a computer network 4 2005
 
TREND MICRO INCORPORATED (1)
8,601,064 Techniques for defending an email system against malicious sources 0 2006