This application claims priority to U.S. Provisional Patent Application No. 60/151,531 entitled “SYSTEM AND METHOD FOR PROVIDING COMPUTER SECURITY” filed Aug. 30, 1999, which is incorporated herein by reference for all purposes, and to U.S. patent application Ser. No. 09/615,697 entitled “SYSTEM AND METHOD FOR COMPUTER SECURITY” filed Jul. 14, 2000, which is incorporated herein by reference for all purposes. This application is related to U.S. patent application Ser. No. 09/651,439 entitled SYSTEM AND METHOD FOR DETECTING COMPUTER INTRUSIONS filed concurrently herewith, which is incorporated herein by reference for all purposes; and U.S. patent application Ser. No. 09/651,303 entitled EXTENSIBLE INTRUSION DETECTION SYSTEM filed concurrently herewith, which is incorporated herein by reference for all purposes; and U.S. patent application Ser. No. 09/651,854 entitled SYSTEM AND METHOD FOR USING LOGIN CORRELATIONS TO DETECT INTRUSIONS filed concurrently herewith, which is incorporated herein by reference for all purposes; and U.S. patent application Ser. No. 09/651,434 entitled SYSTEM AND METHOD FOR USING SIGNATURES TO DETECT COMPUTER INTRUSIONS filed concurrently herewith, which is incorporated herein by reference for all purposes; and U.S. patent application Ser. No. 09/651,306 entitled SYSTEM AND METHOD FOR DETECTING BUFFER OVERFLOW ATTACKS filed concurrently herewith, which is incorporated herein by reference for all purposes; and U.S. patent application Ser. No. 09/654,347 entitled SYSTEM AND METHOD FOR USING TIMESTAMPS TO DETECT ATTACKS filed concurrently herewith, which is incorporated herein by reference for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
5511188 | Pascucci et al. | Apr 1996 | A |
5574898 | Leblang et al. | Nov 1996 | A |
5621889 | Lermuzeaux et al. | Apr 1997 | A |
5638509 | Dunphy et al. | Jun 1997 | A |
5649194 | Miller et al. | Jul 1997 | A |
5680585 | Bruell | Oct 1997 | A |
5724569 | Andres | Mar 1998 | A |
5757913 | Bellare et al. | May 1998 | A |
5778070 | Mattison | Jul 1998 | A |
5844986 | Davis | Dec 1998 | A |
5978791 | Farber et al. | Nov 1999 | A |
Entry |
---|
Rebecca Bace, Introduction to Intrusion Detection Assesment, no date, for System and Network Security Management, Apr. 1999, pp. 1-38. |
Gene H. Kim and Eugene H. Spafford, Writing, Supporting and Evaluating Tripwire: A Publically Available Security Tool, Mar. 12, 1994, Purdue Technical Report; Purdue University pp. 1-23. |
Douglas B. Moran et al., DERBI: Diagnosis, Explanation and Recovery from Break-Ins, no date, Artificial Intelligence Center SRI International p1. |
Mabry Tyson, Ph.D., Explaining and Recovering from Computer Break-Ins, Jan. 12, 2001, SRI International pp. 1-21. |
Aleph One, Smashing the Stack for Fun and Profit, no date, vol. Seven, Issue Forty-Nine; File 14 of 16 of BugTraq, r00t, and Underground.Org. |
Donald C. Latham, Department of Defense Trusted Computer System Evaluation Criteria, Dec. 1985, Department of Defense Standardpp. 1-126. |
James P. Anderson Co., Computer Security Threat Monitoring and Surveillance, Feb. 26, 1980, Contract 79F296400. |
Teresa F. Hunt et al., A Real-Time Intrusion-Detection Expert System (IDES), Feb. 28, 1992, SRI International Project 6784. |
Number | Date | Country | |
---|---|---|---|
60/151531 | Aug 1999 | US |