This application claims benefit of No. 60/151,531 filed Aug. 30, 1999. This application is related to co-pending U.S. patent application Ser. No. 09/651,439 entitled SYSTEM AND METHOD FOR DETECTING COMPUTER INTRUSIONS filed concurrently herewith, which is incorporated herein by reference for all purposes; and co-pending U.S. patent application Ser. No. 09/651,303 entitled EXTENSIBLE INTRUSION DETECTION SYSTEM filed concurrently herewith, which is incorporated herein by reference for all purposes; and co-pending U.S. patent application Ser. No. 09/651,854 entitled SYSTEM AND METHOD FOR USING LOGIN CORRELATIONS TO DETECT INTRUSIONS filed concurrently herewith, which is incorporated herein by reference for all purposes; and co-pending U.S. patent application Ser. No. 09/651,434 entitled SYSTEM AND METHOD FOR USING SIGNATURES TO DETECT COMPUTER INTRUSIONS filed concurrently herewith, which is incorporated herein by reference for all purposes; and copending U.S. patent application Ser. No. 09/651,304 entitled SYSTEM AND METHOD FOR ANALYZING FILESYSTEMS TO DETECT INTRUSIONS filed concurrently herewith, now U.S. Pat. No. 6,647,400 issued Nov. 11, 2003, which is incorporated herein by reference for all purposes; and co-pending U.S. patent application Ser. No. 09/654,347 entitled SYSTEM AND METHOD FOR USING TIMESTAMPS TO DETECT ATTACKS filed concurrently herewith, which is incorporated herein by reference for all purposes.
Number | Name | Date | Kind |
---|---|---|---|
5278901 | Shieh et al. | Jan 1994 | A |
5557742 | Smaha et al. | Sep 1996 | A |
5574898 | Leblang et al. | Nov 1996 | A |
5621889 | Lermuzeaux et al. | Apr 1997 | A |
5638509 | Dunphy et al. | Jun 1997 | A |
5649194 | Miller et al. | Jul 1997 | A |
5680585 | Bruell | Oct 1997 | A |
5724569 | Andres | Mar 1998 | A |
5757913 | Bellare et al. | May 1998 | A |
5778070 | Mattison | Jul 1998 | A |
5844986 | Davis | Dec 1998 | A |
5978791 | Farber et al. | Nov 1999 | A |
6134664 | Walker | Oct 2000 | A |
6269447 | Maloney et al. | Jul 2001 | B1 |
20020083343 | Crosbie et al. | Jun 2002 | A1 |
20030204632 | Willebeek-LeMair et al. | Oct 2003 | A1 |
Entry |
---|
Pennington, A.G., et al, “Storage-based Intrusion Detection: Watching storage activity for suspicious behavior”, Carnegie Mellon University, USENIX Security Symposium, Aug. 2003, entire document.* |
Norvill, Trevor “Auditing and Event Correction”, Dept. of IT & EE, Univ. of Queensland, 2001, entire document.* |
Rebecca Bace, Introduction to Intrusion Detection Assesment, no date, for System and Network Security Management. |
Gene H. Kim and Eugene H. Spafford, Writing, Supporting and Evaluating Tripwire: A Publically Available Security Tool, Mar. 12, 1994, Purdue Technical Report; Purdue University. |
Douglas B. Moran et al., DERBI: Diagnosis, Explanation and Recovery From Break-Ins, no date, Artificial Intelligence Center SRI International. |
Mabry Tyson, Ph.D., Explaining and Recovering From Computer Break-Ins, Jan. 12, 2001, SRI International. |
Aleph One, Smashing the Stack for Fun and Profit, no date, Volume Seven, Issue Forty-Nine; File 14 of 16 of BugTraq, r00t, and Underground.Org. |
Donald C. Latham, Department of Defense Trusted Computer System Evaluation Criteria, Dec. 1985, Department of Defense Standard. |
James P. Anderson Co., Computer Security Threat Monitoring and Surveillance, Feb. 26, 1980, Contract 79F296400. |
Teresa F. Hunt et al., A Real-Time Intrusion-Detection Expert System (IDES), Feb. 28, 1992, SRI International Project 6784. |
Number | Date | Country | |
---|---|---|---|
60/151531 | Aug 1999 | US |