Claims
- 1. A method for managing security information comprising the steps of:
- 2. The method of claim 1, wherein each raw event comprises suspicious computer activity detected by one of an automated system and human observation.
- 3. The method of claim 1, wherein the step of receiving raw events from one or more data sources further comprises the step of receiving real-time raw events from one of intrusion detection system, a detector within an intrusion detection system, and a firewall.
- 4. The method of claim 1, wherein the step of receiving raw events from one or more data sources further comprises the step of receiving raw events from one of a file and database.
- 5. The method of claim 1, wherein the step of classifying the raw events further comprises the steps of:
- 6. The method of claim 1, wherein the step of assigning a ranking to each raw event further comprises the steps of:
- 7. The method of claim 6, wherein the additional parameters comprise one of a priority status, a vulnerability status, a historical frequency value, a source zone value, a destination zone value, a detector zone value, and a priority change reason text string.
- 8. The method of claim 1, wherein the step of assigning a ranking to each raw event further comprises the steps of:
- 9. The method of claim 1, wherein the step of identifying relationships between two or more raw events further comprises the steps of:
- 10. The method of claim 1, wherein the step of storing raw events further comprises the step of storing each raw event in a high speed memory device comprising random access memory (RAM).
- 11. The method of claim 1, further comprising the step of determining the intent of a computer attack based upon the type of mature correlation event generated.
- 12. The method of claim 1, further comprising the steps of:
- 13. The method of claim 1, further comprising the step of creating a raw event tracking index that identifies one or more software components that are monitoring one or more raw events.
- 14. A method for determining relationships between two or more computer events, comprising the steps of:
- 15. The method of claim 14, wherein each raw event comprises suspicious computer activity detected by one of an automated system and human observation.
- 16. The method of claim 14, wherein the context database comprises any one of vulnerability values, computer event frequency values, source and destination zone values, and detector zone values.
- 17. The method of claim 14, wherein the raw event classification database comprises tables that include information that categorizes raw events based on any one of the following: how an activity indicated by a raw event may impact one or more target computers, how many target computers may be affected by an activity indicated by a raw event, and how activities indicated by respective raw events gain access to one or more target computers.
- 18. A security management system comprising:
- 19. The security management system of claim 18, further comprising a detector, the detector running in a kernel mode of a computer and the fusion engine running in a user mode of the computer.
- 20. The security management system of claim 18, further comprising a detector chip, and the fusion engine comprising software running on a computer.
- 21. The security management system of claim 18, further comprising a detector board, and the fusion engine comprising software running on a computer.
- 22. A fusion engine comprising:
- 23. The fusion engine of claim 22, further comprising an event reporter, a mature event list, a memory management list, and a raw event tracking index .
- 24. The fusion engine of claim 22, wherein the context database comprises any one of vulnerability values, computer event frequency values, source and destination zone values, and detector zone values.
- 25. The fusion engine of claim 22, wherein the raw event classification database comprises tables that include information that categorizes raw events based on any one of the following: how an activity indicated by a raw event may impact one or more target computers, how many target computers may be affected by an activity indicated by a raw event, and how activities indicated by respective raw events gain access to one or more target computers.
- 26. A method for managing security information comprising the steps of:
- 27. The method of claim 26, wherein the first ranking comprises one or more relative values measuring potential risk or damage that is associated with an activity indicated by the raw event.
- 28. The method of claim 26, wherein the step of assigning a second ranking to each raw event further comprises the steps of:
- 29. The method of claim 28, wherein the additional parameters comprise at least one of a priority status, a vulnerability status, a historical frequency value, a source zone value, a destination zone value, a detector zone value, and a priority change reason text string.
- 30. The method of claim 26, wherein the step of assigning a second ranking to each raw event further comprises the steps of:
- 31. A method for managing security information comprising the steps of:
- 32. The method of claim 31, wherein each raw event comprises suspicious computer activity detected by one of an automated system and human observation.
- 33. The method of claim 31, wherein the step of receiving raw events from one or more data sources further comprises the step of receiving real-time raw events from one of intrusion detection system, a detector within an intrusion detection system, and a firewall.
- 34. The method of claim 31, wherein the step of receiving raw events from one or more data sources further comprises the step of receiving raw events from one of a file and database.
- 35. The method of claim 31, wherein the step of classifying the raw events further comprises the steps of:
- 36. The method of claim 31, wherein the step of classifying comprises the step of categorizing a raw event based on any one of the following: how an activity indicated by a raw event may impact one or more target computers, how many target computers may be affected by an activity indicated by a raw event, and how activities indicated by respective raw events gain access to one or more target computers.
- 37. The method of claim 31, wherein the step of grouping two or more raw events further comprises the step of determining a time at which a respective raw event occurred relative to another raw event.
- 38. A computer readable medium having computer-executable instructions for performing the steps recited in claim 1.
- 39. A computer readable medium having computer-executable instructions for performing the steps recited in claim 14.
- 40. A computer readable medium having computer-executable instructions for performing the steps recited in claim 26.
- 41. A computer readable medium having computer-executable instructions for performing the steps recited in claim 31.
Cross Reference to Related Applications
[0001] The present application claims priority to provisional patent application entitled, "Intrusion Detection Fusion System of a Network Security System," filed on April 28, 2000 and assigned U.S. Application Serial Number 60/200,316. The present application is also related to non-provisional application entitled, "System and Method for Managing Security Events on a Network," (Attorney Docket No. 05456-105005) filed on April 27, 2001 and assigned U.S. Application Serial Number 09/844,448.
Provisional Applications (1)
|
Number |
Date |
Country |
|
60/200,316 |
Apr 2000 |
US |