Claims
- 1. A method of defining the security condition of a computer system, comprising:
specifying an identity of an attack; specifying at least one attribute of the specified attack; specifying at least one policy definition with respect to the specified attack; and specifying at least one attribute of the specified policy definition.
- 2. The method, as set forth in claim 1, further comprising:
specifying a computing platform of the computer system; and specifying a data signature of the specified attack on the computing platform.
- 3. The method, as set forth in claim 1, further comprising:
specifying a security category of the specified attack; and specifying at least one policy group with respect to the specified security category.
- 4. The method, as set forth in claim 1, further comprising specifying a security product executing on the computer system.
- 5. The method, as set forth in claim 1, wherein specifying at least one attribute of the specified attack comprises specifying an identification of the severity associated with a breach of the computer system by the specified attack.
- 6. The method, as set forth in claim 1, wherein specifying at least one attribute of the specified attack comprises specifying a description of the attack.
- 7. The method, as set forth in claim 1, wherein specifying at least one attribute of the specified attack comprises specifying an explanation of why the specified attack is important.
- 8. The method, as set forth in claim 1, wherein specifying at least one attribute of the specified attack comprises specifying how information is to be reported to a user with respect to the specified attack.
- 9. The method, as set forth in claim 1, wherein specifying at least one attribute of the specified attack comprises specifying an application operable to respond to a breach of the computer system by the specified attack.
- 10. The method, as set forth in claim 1, wherein specifying a signature of the specified attack comprises:
specifying a network protocol; specifying a data pattern; and specifying an action in response to detecting the specified network protocol and data pattern.
- 11. The method, as set forth in claim 1, wherein specifying a signature of the specified attack comprises specifying a direction of data flow.
- 12. A method of defining vulnerability conditions of a system coupled to a global network, comprising:
specifying a name of an attack associated with a vulnerability of the system; specifying at least one attribute of the specified attack, and the severity of the specified attack associated with a breach of the computer system by the specified attack; specifying a policy definition with respect to the specified attack; specifying at least one attribute of the specified policy definition; specifying a computing platform of the system.
- 13. The method, as set forth in claim 12, further comprising:
specifying a security category of the specified attack; and specifying at least one policy group with respect to the specified security category.
- 14. The method, as set forth in claim 12, wherein specifying at least one attribute of the specified attack comprises specifying how information is to be reported to a user with respect to the specified attack.
- 15. The method, as set forth in claim 12, wherein specifying at least one attribute of the specified attack comprises specifying an application operable to respond to a breach of the computer system by the specified attack.
- 16. The method, as set forth in claim 12, wherein specifying at least one attribute of the specified attack comprises specifying a source of an application operable to repair the vulnerability.
- 17. A system of defining security conditions of a computer system, comprising:
a vulnerability description file containing a definition of at least one attack and a definition of at least one policy item for the attack; an interpreter operable to parse the at least one attack and at least one policy item definition in the vulnerability description file and organize the parsed definitions pursuant to a predetermined format; and a data storage operable to store the parsed and organized at least one attack and at least one policy item definition, wherein the data storage is accessible by at least one security application.
- 18. The system, as set forth in claim 17, wherein the data storage is a relational database having a plurality of tables.
- 19. The system, as set forth in claim 17, wherein the data storage is a memory.
- 20. The system, as set forth in claim 17, wherein the vulnerability description file further comprises a definition of a security product.
- 21. The system, as set forth in claim 17, wherein the vulnerability description file further comprises a definition of a security category providing a grouping of the at least one attack, and a definition of a policy group providing a grouping of the at least one policy item.
- 22. The system, as set forth in claim 17, wherein the vulnerability description file further comprises a definition of a computing platform.
- 23. The system, as set forth in claim 17, wherein the vulnerability description file further comprises a definition of at least one attribute of the at least one attack.
- 24. The system, as set forth in claim 17, wherein the vulnerability description file further comprises an identification of the severity associated with a breach of the computer system by the at least one attack.
- 25. The system, as set forth in claim 17, wherein the vulnerability description file further comprises a description of the at least one attack.
- 26. The system, as set forth in claim 17, wherein the vulnerability description file further comprises a definition of how information are to be displayed and reported to the user in response to generated results with respect to the at least one attack.
- 27. The system, as set forth in claim 17, wherein the vulnerability description file further comprises a definition of an application operable to respond to a breach of the computer system by the at least one attack.
- 28. The system, as set forth in claim 17, wherein the vulnerability description file further comprises a signature of the specified attack having:
a network protocol; a data pattern; and an action in response to detecting the specified network protocol and data pattern.
- 29. The system, as set forth in claim 17, wherein the vulnerability description file further comprises a signature of the specified attack having a direction of data flow.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This patent application is related to co-pending U.S. Patent Application, Attorney Docket No. 10014010-1, entitled “METHOD AND COMPUTER READABLE MEDIUM FOR SUPPRESSING EXECUTION OF SIGNATURE FILE DIRECTIVES DURING A NETWORK EXPLOIT”; U.S. Patent Application, Attorney Docket No. 10017028-1, entitled “SYSTEM AND METHOD OF DEFINING THE SECURITY VULNERABILITIES OF A COMPUTER SYSTEM”; U.S. Patent Application, Attorney Docket No. 10017029-1, entitled “SYSTEM AND METHOD OF DEFINING UNAUTHORIZED INTRUSIONS ON A COMPUTER SYSTEM”; U.S. Patent Application, Attorney Docket No. 10017055-1, entitled “NETWORK INTRUSION DETECTION SYSTEM AND METHOD”; U.S. Patent Application, Attorney Docket No. 10016861-1, entitled “NODE, METHOD AND COMPUTER READABLE MEDIUM FOR INSERTING AN INTRUSION PREVENTION SYSTEM INTO A NETWORK STACK”; U.S. Patent Application, Attorney Docket No. 10016862-1, entitled “METHOD, COMPUTER-READABLE MEDIUM, AND NODE FOR DETECTING EXPLOITS BASED ON AN INBOUND SIGNATURE OF THE EXPLOIT AND AN OUTBOUND SIGNATURE IN RESPONSE THERETO”; U.S. Patent Application, Attorney Docket No. 10016591-1, entitled “NETWORK, METHOD AND COMPUTER READABLE MEDIUM FOR DISTRIBUTED SECURITY UPDATES TO SELECT NODES ON A NETWORK”; U.S. Patent Application, Attorney Docket No. 10014006-1, entitled “METHOD, COMPUTER READABLE MEDIUM, AND NODE FOR A THREE-LAYERED INTRUSION PREVENTION SYSTEM FOR DETECTING NETWORK EXPLOITS”; U.S. Patent Application, Attorney Docket No. 10016864-1, entitled “SYSTEM AND METHOD OF AN OS-INTEGRATED INTRUSION DETECTION AND ANTI-VIRUS SYSTEM”; U.S. Patent Application, Attorney Docket No. 10002019-1, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR IDENTIFYING DATA IN A NETWORK EXPLOIT”; U.S. Patent Application, Attorney Docket No. 10017334-1, entitled “NODE, METHOD AND COMPUTER READABLE MEDIUM FOR OPTIMIZING PERFORMANCE OF SIGNATURE RULE MATCHING IN A NETWORK”; U.S. Patent Application, Attorney Docket No. 10017333-1, entitled “METHOD, NODE AND COMPUTER READABLE MEDIUM FOR PERFORMING MULTIPLE SIGNATURE MATCHING IN AN INTRUSION PREVENTION SYSTEM”; U.S. Patent Application, Attorney Docket No. 10017330-1, entitled “USER INTERFACE FOR PRESENTING DATA FOR AN INTRUSION PROTECTION SYSTEM”; U.S. Patent Application, Attorney Docket No. 10017270-1, entitled “NODE AND MOBILE DEVICE FOR A MOBILE TELECOMMUNICATIONS NETWORK PROVIDING INTRUSION DETECTION”; U.S. Patent Application, Attorney Docket No. 10017331-1, entitled “METHOD AND COMPUTER-READABLE MEDIUM FOR INTEGRATING A DECODE ENGINE WITH AN INTRUSION DETECTION SYSTEM”; U.S. Patent Application, Attorney Docket No. 10017328-1, entitled “SYSTEM AND METHOD OF GRAPHICALLY DISPLAYING DATA FOR AN INTRUSION PROTECTION SYSTEM”; and U.S. Patent Application, Attorney Docket No. 10017303-1, entitled “SYSTEM AND METHOD OF GRAPHICALLY CORRELATING DATA FOR AN INTRUSION PROTECTION SYSTEM”.