$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Correlation engine with support for time-based rules 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-007/04
출원번호 US-0308767 (2002-12-02)
등록번호 US-8176527 (2012-05-08)
발명자 / 주소
  • Njemanze, Hugh S.
  • Kothari, Pravin S.
  • Dash, Debabrata
  • Wang, Shijie
출원인 / 주소
  • Hewlett-Packard Development Company, L. P.
인용정보 피인용 횟수 : 32  인용 특허 : 51

초록

A rules engine with support for time-based rules is disclosed. A method performed by the rules engine, comprises receiving security events generated by a number of network devices. The security events are aggregated. One or more time-based rules are provided to a RETE engine. The aggregated security

대표청구항

1. A computer-implemented method, comprising: receiving, by a computer processor, a plurality of base events, wherein a base event originated in an event log entry that was generated by a network component, and wherein the base event includes a time attribute that indicates when the network componen

이 특허에 인용된 특허 (51)

  1. Ko,Cheuk W., Automatically generating valid behavior specifications for intrusion detection.
  2. Underwood, Roy Aaron, Codes table framework design in an E-commerce architecture.
  3. Khanolkar,Rajeev; Azim,Ozakil; Asthana,Rishi; Ved,Niten; Hanrahan,Kevin; Ghildiyal,Amit; Pogaku,Shirisha; Amaratunge,Dhani; Samavenkata,K. V. Rao; Hamid,Aral Rarsh, Comprehensive security structure platform for network managers.
  4. Orchier Jonathan ; Soriano Raymond ; Salvaterra Louis ; Ardito Dario ; Byreddy Anil, Computer network security management system.
  5. Kodavalla Hanuma ; Joshi Ashok Madhukar ; Chatterjee Sumanta ; McCready Bruce, Database system with methods for appending data records by partitioning an object into multiple page chains.
  6. Valente, Luis Filipe Pereira; Cooper, Geoffrey Howard; Shaw, Robert Allen; Sherlock, Kieran Gerard, Declarative language for specifying a security policy.
  7. Schneier Bruce ; Kelsey John, Digital signature with auditing bits.
  8. Brock, Ashley Anderson; Kim, Nathaniel Wook; Lingafelt, Charles Steven, Dynamic intrusion detection for computer systems.
  9. Julie Lynn Huff ; Tracy Glenn Shelanskey ; Sheila Ann Jackson, Dynamic system defense for information warfare.
  10. Schneier Bruce ; Kelsey John M., Event auditing system.
  11. Perfit, Michael Adam; Buchanan, Darin L.; Samek, Scott J.; Butler, Timothy W.; Mancini, Elizabeth; Arena, Michael J.; Wise, Karen G.; Farrar, Michael B.; Uftring, Michael D.; Wilson, Theodore J.; Ant, Event manager for use in fraud detection.
  12. Njemanze,Hugh S., Expression editor.
  13. Black,Steven; Debar,Herve; Garrison,John Michael; Wespi,Andreas, Hierarchical correlation of intrusion detection events.
  14. Phillip Andrew Porras ; Alfonso Valdes, Hierarchical event monitoring and analysis.
  15. Godwin,Debbie Ann; Walters,Rodney Eldon, Host-based systematic attack detection tool.
  16. Bruton, III,David Aro; Jakubik,Patricia; LiVecchi,Patrick Michael; Overby, Jr.,Linwood Hugh, Integrated intrusion detection services.
  17. Bardsley,Jeffrey Scott; Brock,Ashley Anderson; Kim,Nathaniel Wook; Lingafelt,Charles Steven, Limiting the output of alerts generated by an intrusion detection sensor during a denial of service attack.
  18. Aviram Cohen ; Ishai Kedem, Management of orphan tracks.
  19. Grainger, Steven Phillip, Method and apparatus for an intruder detection reporting and response system.
  20. Schneier Bruce, Method and apparatus for analyzing information systems using stored tree database structures.
  21. Hrabik,Michael; Guilfoyle,Jeffrey; Mac Beaver,Edward, Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures.
  22. Black, Steven C.; Debar, Herve; Garrison, John Michael; Swart, RoseAnne, Method and apparatus in a data processing system for managing situations from correlated events.
  23. Campbell, Wayne A.; Walker, Jeffrey H., Method and system for detecting intrusion into and misuse of a data processing system.
  24. Smaha Stephen E. (Austin TX) Snapp Steven R. (Austin TX), Method and system for detecting intrusion into and misuse of a data processing system.
  25. Bhattacharya,Partha; Liao,Yu, Method and system for determining intra-session event correlation across network address translation devices.
  26. Bhattacharya, Partha; Lee, Imin; Joseph, Aji; Stevens, Eli; Naramreddy, Diwakar, Method and system for displaying network security incidents.
  27. Schneier,Bruce; Gross,Andrew H.; Callas,Jonathan D., Method and system for dynamic network intrusion monitoring, detection and response.
  28. Bennett,Andrew Jonathan; Franklin,David Richard; Stewart,Kristian Jon, Method and system for efficient distribution of network event data.
  29. Hideaki Taruguchi JP; Shigeo Tsunoda JP, Method and system for embedding electronic watermark information in main information.
  30. Farley,Timothy P.; Hammer,John M.; Williams,Bryan Douglas; Brass,Philip Charles; Young,George C.; Mezack,Derek John, Method and system for managing computer security information.
  31. Beardsley, Brent Cameron; Benhase, Michael Thomas; Martin, Douglas A.; Morton, Robert Louis; Todd, Kenneth Wayne, Method and system for managing meta data.
  32. Secor, Peter; Tokarsky, Tim; Perelman, Shoel, Method and system for network event impact analysis and correlation with network administrators, management policies and procedures.
  33. Steinberg, Louis A.; Wetstone, Evan R.; Belousov, Arkadiy; Deuel, John, Method and system for reducing false alarms in network fault management systems.
  34. Walker Jeffrey H., Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources.
  35. Njemanze,Hugh S.; Aguilar Macias,Hector; Beedgen,Christian Friedrich, Method for batching events for transmission by software agent.
  36. Black,Steven; Debar,Herve; Garrison,John Michael; Wespi,Andreas, Method, apparatus, and program for associating related heterogeneous events in an event handler.
  37. Faigon Anat ; Kotmire Girish ; Raab Ilan ; Romero Robert Magnus, Network fault correlation.
  38. Bhattacharya,Partha; Lawrence,Jan Christian, Network security monitoring system.
  39. Porras Phillip A. ; Valdes Alfonso, Network surveillance.
  40. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance.
  41. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance.
  42. Porras, Phillip Andrew; Fong, Martin Wayne, Network-based alert management.
  43. Black,Steven; Debar,Herve; Garrison,John Michael, Presentation of correlated events as situation classes.
  44. Njemanze,Hugh S.; Kothari,Pravin S., Real time monitoring and analysis of events from multiple network security devices.
  45. Michael D. Ladwig, System and method for ensuring and managing situation awareness.
  46. Hsieh Francis ; Manring Brad, System and method for network integrity management.
  47. Barker, Geoffrey T.; Alexander, Bruce; Talley, Paul, System and method for providing configurable security monitoring utilizing an integrated information portal.
  48. Beavers,John B., System and method for tracking and filtering alerts in an enterprise and generating alert indications for analysis.
  49. Parish,Sandy; Goostree,Peter, System and method for tracking computer viruses.
  50. Bernhard Thomas ; Escamilla Terry ; Leddy William ; Letsinger Richard ; Marks Crosby ; Smaha Steven E. ; Snapp Steven R., System, method and computer program product for automatic response to computer system misuse using active response modules.
  51. Tidwell,Kenny; Saurabh,Kumar; Dash,Debabrata; Njemanze,Hugh S.; Kothari,Pravin S., Threat detection in a network security system.

이 특허를 인용한 특허 (32)

  1. Kalinichenko, Michael, Application of nested behavioral rules for anti-malware processing.
  2. Nakamura, Takatoshi; Sako, Yoichiro; Kawakami, Itaru; Takehara, Mitsuru; Abe, Yuichi, Chronology providing method, chronology providing apparatus, and recording medium containing chronology providing program.
  3. Vangala, Vipindeep, Diagnostic framework in computing systems.
  4. Boteler, Aaron; Norton, Marc, Digital filter correlation engine.
  5. Bu, Tian; Chen, Aiyou; Vander Wiel, Scott Alan; Woo, Thomas, Evaluation of a fast and robust worm detection algorithm.
  6. Hassanzadeh, Amin; Modi, Shimon; Mulchandani, Shaan; Negm, Walid, Event correlation across heterogeneous operations.
  7. Hassanzadeh, Amin; Modi, Shimon; Mulchandani, Shaan; Negm, Walid, Event correlation across heterogeneous operations.
  8. Hassanzadeh, Amin; Modi, Shimon; Mulchandani, Shaan; Negm, Walid, Event correlation across heterogeneous operations.
  9. Huang, Wei; Zhou, Yizheng; Yu, Bin; Tang, Wenting; Beedgen, Christian F., Generating row-based and column-based chunks.
  10. Kruse, William Frederick Hingle; Rangole, Ashish, Large-scale authorization data collection and aggregation.
  11. Lingafelt, Charles S.; Murray, James W.; Swantek, James T.; Worley, James S., Managing cyber attacks through change of network address.
  12. Boteler, Aaron; Norton, Marc, Method and apparatus for detecting SSH login attacks.
  13. Porras, Phillip Andrew; Zhang, Jian, Method and apparatus for generating highly predictive blacklists.
  14. Roll, Stuart L., Method and system for time-based correlation of events.
  15. Weiderman Sandahl, Göran; Gustafsson, Johan, Method, apparatus and computer program for analysing events in a computer system.
  16. Sporton, Simon; Sutherns, Timothy; Sauder, Oliver, Monitoring of signalling traffic.
  17. Karale, Sachin, Network security management.
  18. Solomon, Arnold Cory; Floyd, Gregory Ray, Notification system, method, and computer application based on decision rules for evaluating a plurality of utility meter conditions.
  19. Sinnema, Rémon, Risk-adaptive access control of an application action based on threat detection data.
  20. Patel, Rajesh, Security event data normalization.
  21. Kouznetsov, Oleg, Security information and event management.
  22. Kruse, William Frederick Hingle; Rangole, Ashish; Scharf, Jr., James E.; Zhao, Kai; Wierer, Jeffrey John, Self-learning access control policies.
  23. Fan Chiang, Shih-Wu, Surveillance system and surveillance method.
  24. Altman, Yuval; Keren, Assaf Yosef, System and method for automated configuration of intrusion detection systems.
  25. Zlatokrilov, Haim, System and method for identifying communication session participants based on traffic patterns.
  26. Yishay, Yitshak, System and method for keyword spotting using representative dictionary.
  27. Altman, Yuval; Kere, Assaf Yosef; Krupkin, Ido; Rozenblum, Pinhas, System and method for malware detection.
  28. Altman, Yuval; Keren, Assaf Yosef; Krupkin, Ido, System and method for malware detection learning.
  29. Altman, Yuval; Keren, Assaf Yosef; Krupkin, Ido, System and method for malware detection learning.
  30. Margolies, Jeffrey M.; Lippiatt, Keith Gregory; Krull, Joseph Eric, Systems and methods for detecting and investigating insider fraud.
  31. Allen, Andrew T.; Myers, Ken R.; Chan, John M.; Bomer, Michelle N.; Yackshaw, Catherine, Techniques for grammar rule composition and testing.
  32. Singla, Anurag; Saurabh, Kumar; Tidwell, Kenny C., Tracking changing state data to assist in computer network security.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로