$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System and method for using signatures to detect computer intrusions 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/30
  • G06F-012/14
출원번호 US-0651434 (2000-08-30)
발명자 / 주소
  • Moran,Douglas B.
출원인 / 주소
  • Symantec Corporation
대리인 / 주소
    Van Pelt, Yi &
인용정보 피인용 횟수 : 117  인용 특허 : 29

초록

A system and method are disclosed for detecting intrusions in a host system on a network. The intrusion detection system comprises an analysis engine configured to use continuations and apply forward-and backward-chaining using rules. Also provided are sensors, which communicate with the analysis en

대표청구항

What is claimed is: 1. A system for detecting intrusions, comprising: a) a signature computing function configured to compute a computed file signature for a file; b) a storage for storing a first file signature previously computed by the signature computing function for the file; c) a storage for

이 특허에 인용된 특허 (29)

  1. Andres Frederic,FRX, Apparatus for evaluating database query performance having libraries containing information for modeling the various sys.
  2. Safadi Reem ; Vince Lawrence, Authorization and access control of software object residing in set-top terminals.
  3. Farber David A. ; Lachman Ronald D., Data processing system using substantially unique identifiers to identify data items, whereby identical data items hav.
  4. Levi, Shaul; Feitelberg, Rafael; Topaz, Assaf, Data quality assurance.
  5. Dunphy William E. (Westminster CO) Halladay Steven M. (Louisville CO) Moy Michael E. (Lafayette CO) Munro Frederick G. (Broomfield CO), Data storage and protection system.
  6. Safadi, Reem, Detection of suspect software objects and signatures after failed authentication.
  7. Renaud Benjamin J., Digital signatures for data streams and data archives.
  8. Chess David M. (Mohegan Lake NY), Discrimination of malicious changes to digital information using multiple signatures.
  9. Krawczyk Hugo M. (Riverdale NY), Distributed fingerprints for information integrity verification.
  10. Leblang David B. (Wayland MA) Allen Larry W. (Cambridge MA) Chase ; Jr. Robert P. (Newton MA) Douros Bryan P. (Framingham MA) Jabs David E. (Sudbury MA) McLean ; Jr. Gordon D. (Brookline MA) Minard D, Dynamic software version auditor which monitors a process to provide a list of objects that are accessed.
  11. Lermuzeaux Jean-Marc (St Michel sur Orge FRX) Emery Thierry (St Germain les Arpajon FRX) Gonthier Patrice (Antony FRX), Facility for detecting intruders and suspect callers in a computer installation and a security system including such a f.
  12. Martin Mayhead GB; Graham Parrington GB; James Radley GB; Gradimir Starovic GB, File server system tolerant to software and hardware failures.
  13. Phillip Andrew Porras ; Alfonso Valdes, Hierarchical event monitoring and analysis.
  14. Bellare Mihir ; Guerin Roch Andre ; Rogaway Phillip Walder, Method and apparatus for data authentication in a data communication environment.
  15. Bruell Gregory O. (Carlisle MA), Method and apparatus for defining data packet formats.
  16. Mattison Phillip E., Method and apparatus for protecting flash memory.
  17. Mann Omri (Jerusalem ILX), Method for recovery of a computer program infected by a computer virus.
  18. Olarig Sompong P. ; Angelo Michael F., Method for the secure remote flashing of a BIOS memory.
  19. Porras Phillip A. ; Valdes Alfonso, Network surveillance.
  20. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance.
  21. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance.
  22. Porras, Phillip Andrew; Fong, Martin Wayne, Network-based alert management.
  23. Cox George W. ; Aucsmith David W. ; Onnen Paul E., Object-based digital signatures.
  24. Nachenberg Carey S., Polymorphic virus detection module.
  25. Davis Derek L., Secure BIOS.
  26. Goldstein, Leonid, System and method for data access.
  27. McManis Charles E. (Sunnyvale CA), System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources.
  28. Robert F. Groshon ; L. Aaron Philipp ; Jason C. Stone, Systems and methods for preventing transmission of compromised data in a computer network.
  29. Miller Arnold (Bellevue WA) Neeman Yuval (Bellevue WA) Contorer Aaron M. (Kirkland WA) Misra Pradyumna K. (Issaquah WA) Seaman Michael R. C. (Kirkland WA) Rubin Darryl E. (Redmond WA), Unification of directory service with file system services.

이 특허를 인용한 특허 (117)

  1. Mantripragada, Srinivas; Garnett, Tim; Bruening, Derek; Kiriansky, Vladimir; Chandramohan, Bharath; Brink, James; Amarasinghe, Saman P.; Wilbourn, Sandy, 0-touch and 1-touch techniques for improving the availability of computer programs under protection without compromising security.
  2. Stading, Tyron Jerrod, Alert passwords for detecting password attacks on systems.
  3. Ijiro, Hideaki; Kawauchi, Kiyoto, Attack detection device, attack detection method, and non-transitory computer readable recording medium recorded with attack detection program.
  4. Goel, Parveen Kumar, Authorization system and a method of authorization.
  5. Case, Sr., Paul, Case secure computer architecture.
  6. Case, Sr., Paul, Case secure computer architecture.
  7. Hinchliffe,Alex James; Howard,Fraser Peter; Kemp,Andrew; Rai,Bobby, Centrally managed malware scanning.
  8. Lange, Stephan; Lang, Klaus-Peter; Eschenroeder, Klaus; Wagner, Frank; Fitzer, Joachim, Configuration change without disruption of incomplete processes.
  9. Meier, John D., Configuring and organizing server security information.
  10. Amarasinghe, Saman P.; Chandramohan, Bharath; Renert, Charles; Bruening, Derek L.; Kiriansky, Vladimir; Garnett, Timothy; Wilbourn, Sandy; Wu, Warren, Constraint injection system for immunizing software programs against vulnerabilities and attacks.
  11. Bhargava, Sunil; Thakur, Sudheer, Defining and detecting network application business activities.
  12. Bhargava, Sunil; Raha, Amitava K., Defining and monitoring business rhythms associated with performance of web-enabled business processes.
  13. Cowie,Neil Andrew; Muttik,Igor, Detecting computer programs within packed computer files.
  14. Roesch, Martin Frederick; Novak, Judy Hollis; Sturges, Steven, Device, system and method for analysis of segments in a transmission control protocol (TCP) session.
  15. Jordan, Christopher J., Device, system and method for defending a computer network.
  16. Jordan, Christopher J., Device, system and method for defending a computer network.
  17. Sturges, Steven; Novak, Judy Hollis, Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session.
  18. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Diminishing false positive classifications of unsolicited electronic-mail.
  19. Wong, Chiak Wu; Lai, Aaric Chee Meng; Tran, Huong Giang, Engineering expert system.
  20. Nurmela,Kari, Event sequence detection.
  21. Sattler, Juergen; Gaffga, Joachim; Wolf, Werner; Viehmann, Robert; Markert, Frank, Formular update.
  22. Maynard, William P., Hardware-based detection and containment of an infected host computing device.
  23. Cothrell, Scott A.; Richardson, Aaron S., Inline intrusion detection.
  24. Cothrell, Scott A.; Richardson, Aaron S., Inline intrusion detection.
  25. Hall, Michael Lee; Wiley, Kevin L.; Hossain, Munawar; Sirrianni, Joseph M., Inline intrusion detection using a single physical port.
  26. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  27. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  28. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  29. Haeffele, Steven M.; Gupta, Ramesh M.; Raman, Ananth; Vissamsetti, Srikant, Integrated firewall, IPS, and virus scanner system and method.
  30. Cangini, Gianluca; Zabetta, Francesco Coda; Lamastra, Gerardo, Intrusion detection method and system, related network and computer program product therefor.
  31. Roelker,Daniel J.; Norton,Marc A., Intrusion detection strategies for hypertext transport protocol.
  32. Gustafson, Eric; Rittermann, Brian P., Intrusion event correlation with network discovery information.
  33. Bardsley,Jeffrey Scott; Brock,Ashley Anderson; Kim,Nathaniel Wook; Lingafelt,Charles Steven, Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack.
  34. Goldfeder, Aaron R.; Hawkins, John M.; Khorun, Sergey A.; Ramdatmisier, Viresh N.; Farro, Joseph Thomas; Fee, Gregory Darrell; Epling, Jeremiah S.; Bybee, Andrew G.; Xu, Jingyang; Schreiner, Tony Edward; Cool, Jamie L., Mechanism for evaluating security risks.
  35. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  36. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  37. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Message classification using legitimate contact points.
  38. Bori, Josep, Method and apparatus for a cryptographically assisted computer system designed to deter viruses and malware via enforced accountability.
  39. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Method and apparatus for classifying electronic messages.
  40. Liu, Peter; Yueh, Jason; Lin, Gene, Method and apparatus for detecting and removing kernel rootkits.
  41. Drew,Jeffrey M., Method and apparatus for minimizing file scanning by anti-virus programs.
  42. Goyal, Rajan; Mihailovici, Virgil N.; Gupta, Rahul; Monclus, Pere; Habib, Ahsan; Prabhu, Kirtikumar L.; Paggen, Christophe J.; Kaluve, Shyamasundar S., Method and system for network security.
  43. Gassoway, Paul, Method and systems for computer security.
  44. Norman, Andrew Patrick; Brawn, John Melvin; Scrimsher, John P; Griffin, Jonathan, Method of identifying software vulnerabilities on a computer system.
  45. Bardsley, Jeffrey Scott; Brock, Ashley Anderson; Kim, Nathaniel Wook; Lingafelt, Charles Steven, Method of operating an intrusion detection system.
  46. Norton, Marc A.; Roelker, Daniel J., Methods and systems for multi-pattern searching.
  47. Norton, Marc A.; Roelker, Daniel J., Methods and systems for multi-pattern searching.
  48. Enderby, Russell, Multi-stage deep packet inspection for lightweight devices.
  49. Williamson, Matthew Murray; Norman, Andrew Patrick; Griffin, Jonathan, Network management.
  50. Meier, John D.; Vasireddy, Srinath, Performance engineering and the application life cycle.
  51. Bezilla, Daniel Bailey; Immordina, John Leonard; Le Ogura, James, Policy based selection of remediation.
  52. Bezilla, Daniel B.; Immordino, John L.; Le Ogura, James, Policy-based selection of remediation.
  53. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  54. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  55. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  56. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  57. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  58. Bezilla, Daniel B.; Immordino, John L.; Ogura, James Le, Policy-based selection of remediation.
  59. Huang,Hui Chieh, Process for preventing virus infection of data-processing system.
  60. Goel, Parveen Kumar, RFID reader for facility access control and authorization.
  61. Rittermann, Brian, Real-time user awareness for a computer network.
  62. Cohen, Alexander J.; Jung, Edward K. Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Tegreene, Clarence T., Receiving an indication of a security breach of a protected set of files.
  63. Lin, Yichin; Yueh, Peng-Yuan; Liu, Yu-Heng, Secure computer system integrity check.
  64. Wilkins, Jonathan; Gjonej, Gerard; Back, Adam, Security attack detection and defense.
  65. Brawn,John Melvin; Norman,Andrew Patrick; Dalton,Chris Ralph; Griffin,Jonathan, Signal level propagation mechanism for distribution of a payload to vulnerable systems.
  66. Cohen, Alexander J.; Jung, Edward K.Y.; Levien, Royce A.; Lord, Robert W.; Malamud, Mark A.; Mangione-Smith, William Henry; Rinaldo, Jr., John D.; Tegreene, Clarence T., Signaling a security breach of a protected set of files.
  67. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  68. Oliver, Jonathan J.; Koblas, David A.; Wilson, Brian K., Signature generation using message summaries.
  69. Bolles,Gregory Allin; Mohandas,Radhesh; Simpson, Jr.,Russell L., Source throttling using CPU stamping.
  70. Sturges, Steven; Norton, Marc, Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing.
  71. Goodman, Joshua T.; Kadie, Carl M.; Meek, Christopher A., Storage abuse prevention.
  72. Polley, Jonathan; Vogel, III, William Andrew, System and method for assigning network blocks to sensors.
  73. Polley, Jonathan; Vogel, III, William Andrew, System and method for assigning network blocks to sensors.
  74. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for computer security.
  75. Pavlyushchik, Mikhail A., System and method for file integrity monitoring using timestamps.
  76. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for generating fictitious content for a computer.
  77. Olney, Matthew; Mullen, Patrick; Grenier, Lurene; Houghton, Nigel; Pentney, Ryan, System and method for near-real time network attack detection, and system and method for unified detection via detection routing.
  78. Lyle, Michael P.; Ross, Robert F.; Maricondo, James R., System and method for preventing detection of a selected process running on a computer.
  79. Roesch, Martin Frederick, System and method for real time data awareness.
  80. Roesch, Martin Frederick, System and method for real time data awareness.
  81. Roesch, Martin Frederick, System and method for real time data awareness.
  82. Vogel, III, William Andrew; Baker, Andrew, System and method for resolving operating system or service identity conflicts.
  83. Moran, Douglas B., System and method for using timestamps to detect attacks.
  84. Gaffga, Joachim; Sattler, Juergen; Markert, Frank; Viehmann, Robert; Wolf, Werner, System configuration comparison to identify process variation.
  85. Venkatasubrahmanyam, Krishnapur Narasimhamurthy, System, method and computer program product for remote rootkit detection.
  86. Worrill, Joshua; Laycock, Graeme, Systems and methods configured to enable content sharing between client terminals of a digital video management system.
  87. Bhandari, Neelendra; Joshi, Priteshkumar D; Reddy, Chandrakanth C; Goel, Parveen Kumar, Systems and methods for commissioning access control devices.
  88. Bhandari, Neelendra; Joshi, Priteshkumar D; Reddy, Chandrakanth C; Goel, Parveen Kumar, Systems and methods for configuring access control devices.
  89. Roesch, Martin; Dempster, Ronald A.; Novak, Judy, Systems and methods for determining characteristics of a network.
  90. Roesch, Martin; Vogel, III, William Andrew; Watchinski, Matt, Systems and methods for determining characteristics of a network and analyzing vulnerabilities.
  91. Roesch,Martin; Dempster,Ronald A., Systems and methods for determining characteristics of a network and assessing confidence.
  92. Roesch, Martin; Dempster, Ronald A.; Baker, Andrew; Gustafson, Eric, Systems and methods for determining characteristics of a network and enforcing policy.
  93. Roesch, Martin; Dempster, Ronald A., Systems and methods for determining characteristics of a network based on flow analysis.
  94. Dempster,Ronald A.; Houghton,Nigel, Systems and methods for identifying the client applications of a network.
  95. Roesch, Martin; Dempster, Ronald A., Systems and methods for identifying the services of a network.
  96. Bhandari, Neelendra; Reddy, Chandrakantha C; Morrison, John David; Hussain, Mushabbar; McDonnell, Neil, Systems and methods for interacting with access control devices.
  97. Roy, Sanjay; Gali, Muneswar Rao; Bhandari, Neelendra; Chappidi, Gopi; Reddy, Chandrakantha, Systems and methods for location aware access control management.
  98. Bhandari, Neelendra; Roy, Sanjay; Reddy, Chandrakantha, Systems and methods for managing access control devices.
  99. Jones, Bryan; Palme, Matt; Quaill, Stephen; Cheung, Edward, Systems and methods for managing configuration data at disconnected remote devices.
  100. Lee, Martin, Systems and methods for managing video data.
  101. Masters, Amy; Bhandari, Ajit; Kwon, Dae-Soon; Palmer, Sally-Anne, Systems and methods for managing video data.
  102. Worrill, Joshua; Laycock, Graeme; Masters, Amelia; Flannery, Mark, Systems and methods for managing video data.
  103. Vogel, III, William A.; Bruzek, Dina L., Systems and methods for modifying network map attributes.
  104. Vogel, III, William Andrew; Bruzek, Dina L., Systems and methods for modifying network map attributes.
  105. Flannery, Mark, Systems and methods for presenting digital video management system information via a user-customizable hierarchical tree interface.
  106. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  107. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  108. Wease, Kenneth Todd, Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system.
  109. Sattler, Juergen; Gaffga, Joachim; Viehmann, Robert; Markert, Frank; Riemann, Steffen, Test engine.
  110. Sattler, Juergen; Gaffga, Joachim; Wolf, Werner; Viehmann, Robert; Markert, Frank, Transformation layer.
  111. Gaffga, Joachim; Sattler, Juergen; Markert, Frank; Viehmann, Robert; Wolf, Werner, Unified configuration of multiple applications.
  112. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  113. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  114. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  115. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  116. Wilson, Brian K.; Koblas, David A.; Penzias, Arno A., Using distinguishing properties to classify messages.
  117. Meier, John D., Web application security frame.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로