Claims
- 1. A security system for a computer connected to a computer network comprising:
at least one detection means associated with said computer, said detection means configured to generate event messages when said computer is under an attack; a master security system located outside said computer network; and a secure link between said detection means and said master security system enabling data communication therebetween; wherein said at least one detection means further comprises means for collecting said event messages and means for analyzing said event messages, and wherein said detection means uploads certain event messages to said master security system through said secure link.
- 2. The security system of claim 1, wherein said at least one detection means further comprises means for countering said attack.
- 3. The security system of claim 1, wherein said means for analyzing said event messages further comprises means for consolidating said event messages.
- 4. The security system of claim 1, wherein said means for analyzing said event messages further comprises means for classifying said event messages.
- 5. The security system of claim 1, wherein said means for analyzing said event messages further comprises means for correlating said event messages.
- 6. The security system of claim 1, wherein said means for analyzing said event messages further comprises multiple views, each of said views analyzing a different subset of event information.
- 7. The security system of claim 1, wherein said detection means is one or more selected from the group consisting of an intrusion detection system, a firewall and a security subsystem.
- 8. The security system of claim 1, wherein said master security system is hierarchically independent from said detection means.
- 9. The security system of claim 1 further comprising a pseudo attack generator associated with said master security system for generating attacks on said computer detectable by said detection means wherein said master security system monitors said detection means by comparing said pseudo-attacks to said attacks detected by said detection means.
- 10. The security system of claim 1 further comprising:
a second master security system located outside said computer network, said second master security system for monitoring attacks on said first master security system.
- 11. The security system of claim 1, further comprising a vulnerability scanning means determining vulnerability of various components of said computer network to a particular attack.
- 12. The security system of claim 11, wherein said means for analyzing said event messages are configured to compare said determined vulnerability of said various components to said attack on said computer network.
- 13. A network security system for a target network of computers comprising:
at least one detection means associated with said target network, said detection means configured to generate event messages when said computer is under an attack; a master security system located outside said network; and a secure link between said detection means and said master security system enabling data communication therebetween; wherein said at least one detection means further comprises means for collecting said event messages and means for analyzing said event messages, and wherein said detection means uploads certain event messages to said master security system through said secure link.
- 14. The network security system of claim 13, wherein said at least one detection means further comprises means for countering said attack.
- 15. The network security system of claim 13, wherein said means for analyzing said event messages further comprises means for consolidating said event messages.
- 16. The network security system of claim 13, wherein said means for analyzing said event messages further comprises means for classifying said event messages.
- 17. The network security system of claim 13, wherein said means for analyzing said event messages further comprises means for correlating said event messages.
- 18. The security system of claim 13, wherein said means for analyzing said event messages further comprises multiple views, each of said views analyzing a different subset of event information.
- 19. The network security system of claim 13, wherein said detection means is one or more selected from the group consisting of an intrusion detection system, a firewall and a security subsystem.
- 20. The network security system of claim 13, wherein said master security system is hierarchically independent from said detection means.
- 21. The network security system of claim 13, further comprising a pseudo attack generator associated with said master security system for generating attacks on said target network detectable by said detection means wherein said master security system monitors said detection means by comparing said pseudo-attacks to said attacks detected by said detection means.
- 22. The network security system of claim 13, further comprising:
a second master security system located outside said computer network, said second master security system for monitoring attacks on said first master security system.
- 23. The security system of claim 13, further comprising a vulnerability scanning means determining vulnerability of various components of said computer network to a particular attack.
- 24. The security system of claim 23, wherein said means for analyzing said event messages are configured to compare said determined vulnerability of said various components to said attack on said computer network.
- 25. A method for monitoring the integrity of a computer associated with a detection means, said computer being connected to a computer network and said detection means configured to detect an attack on said computer, said method comprising the steps of:
establishing a secure link for the transfer of data between said detection means and a master security system hierarchically independent from said detection means collecting data related to said attack; analyzing said collected data related to said attack; uploading certain analyzed data to said master security system over said secure link; and countering said attack.
- 26. The method for monitoring the integrity of a computer of claim 25, wherein said step of analyzing data further comprises the step of consolidating said data.
- 27. The method for monitoring the integrity of a computer of claim 25, wherein said step of analyzing data further comprises the step of classifying said data.
- 28. The method for monitoring the integrity of a computer of claim 25, wherein said step of analyzing data further comprises the step of correlating said data.
- 29. A method for monitoring the integrity of a target computer network associated with a detection means, said detection means configured to detect an attack on said target computer network, said method comprising the steps of:
establishing a secure link for the transfer of data between said detection means and a master system hierarchically independent from said detection means collecting data related to said attack; analyzing data related to said attack; uploading certain analyzed data to said master security system over said secure link; and countering said attack.
- 30. The method for monitoring the integrity of a target computer network of claim 29, wherein said step of analyzing data further comprises the step of consolidating said data.
- 31. The method for monitoring the integrity of a target computer network of claim 29, wherein said step of analyzing data further comprises the step of classifying said data.
- 32. The method for monitoring the integrity of a target computer network of claim 29, wherein said step of analyzing data further comprises the step of correlating said data.
RELATED APPLICATIONS
[0001] This application is a continuation-in-part of the U.S. patent application Ser. No. 09/770,525 and claims all rights of priority thereto.
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
09770525 |
Jan 2001 |
US |
Child |
10196472 |
Jul 2002 |
US |