Number | Name | Date | Kind |
---|---|---|---|
5621889 | Lermuzeaux et al. | Apr 1997 | A |
5987611 | Freund | Nov 1999 | A |
5991881 | Conklin et al. | Nov 1999 | A |
6055236 | Nessett et al. | Apr 2000 | A |
6119236 | Shipley | Sep 2000 | A |
6154839 | Arrow et al. | Nov 2000 | A |
6298445 | Shostack et al. | Oct 2001 | B1 |
6304975 | Shipley | Oct 2001 | B1 |
6321338 | Porras et al. | Nov 2001 | B1 |
6405318 | Rowland | Jun 2002 | B1 |
6408391 | Huff et al. | Jun 2002 | B1 |
6487666 | Shanklin et al. | Nov 2002 | B1 |
6578147 | Shanklin et al. | Jun 2003 | B1 |
6609205 | Bernhard et al. | Aug 2003 | B1 |
6614800 | Genty et al. | Sep 2003 | B1 |
Number | Date | Country |
---|---|---|
WO 0054458 | Sep 2000 | WO |
Entry |
---|
Technical Brief—Cisco Secure Intrusion Detection System Technical Overview, Jul. 3, 2000, available from http://www.cisco.com/warp/public/cc/pd/sqsw/sqidsz/tech/ntran tc.htm, “Sensor Capabilities” pps. 2-4. |
Real Secure™ signatures Version 5.0, Jun. 2000, pps. i-x, 15-17, 186-187 and 263-264 only, availavle from http://www.iss.net/customer care/resource center/product lit/, “Portscan Detection” and “UDP Port Scan”. |
Robert Grahma, FAQ: Network Intrusion Detection Systems, Version 0.8.3, http://www.ticm.com/kb/faq/idsfaq.html, sections 1.6, 1.7, 1.9, 2.1. |