This application claims priority from U.S. Provisional Application No. 60/186,892 filed on Mar. 3, 2000 which is hereby incorporated by reference into this application. This application is related to pending U.S. application Ser. No. 09/345,920, entitled Method and System for Extracting Application Protocol Characteristics, filed Jul. 1, 1999, which application is hereby incorporated herein by reference.
Number | Name | Date | Kind |
---|---|---|---|
5166977 | Ross | Nov 1992 | A |
5237693 | Kiyohara et al. | Aug 1993 | A |
5257369 | Skeen et al. | Oct 1993 | A |
5347578 | Duxbury | Sep 1994 | A |
5392390 | Crozier | Feb 1995 | A |
5485409 | Gupta et al. | Jan 1996 | A |
5557798 | Skeen et al. | Sep 1996 | A |
5559800 | Mousseau et al. | Sep 1996 | A |
5566326 | Hirsch et al. | Oct 1996 | A |
5611048 | Jacobs et al. | Mar 1997 | A |
5623601 | Vu | Apr 1997 | A |
5659547 | Scarr et al. | Aug 1997 | A |
5673322 | Pepe et al. | Sep 1997 | A |
5699518 | Held et al. | Dec 1997 | A |
5701451 | Rogers et al. | Dec 1997 | A |
5715453 | Stewart | Feb 1998 | A |
5724355 | Bruno et al. | Mar 1998 | A |
5774695 | Autrey et al. | Jun 1998 | A |
5778189 | Kimura et al. | Jul 1998 | A |
5793966 | Amstein et al. | Aug 1998 | A |
5805823 | Seitz | Sep 1998 | A |
5812763 | Teng | Sep 1998 | A |
5828893 | Wied et al. | Oct 1998 | A |
5850388 | Anderson et al. | Dec 1998 | A |
5870544 | Curtis | Feb 1999 | A |
5870559 | Leshem et al. | Feb 1999 | A |
5881232 | Cheng et al. | Mar 1999 | A |
5892900 | Ginter et al. | Apr 1999 | A |
5892903 | Klus | Apr 1999 | A |
5908469 | Botz et al. | Jun 1999 | A |
5910987 | Ginter et al. | Jun 1999 | A |
5915019 | Ginter et al. | Jun 1999 | A |
5917912 | Ginter et al. | Jun 1999 | A |
5933498 | Schneck et al. | Aug 1999 | A |
5941947 | Brown et al. | Aug 1999 | A |
5944794 | Okamoto et al. | Aug 1999 | A |
5949876 | Ginter et al. | Sep 1999 | A |
5982891 | Ginter et al. | Nov 1999 | A |
5983270 | Abraham et al. | Nov 1999 | A |
6088804 | Hill et al. | Jul 2000 | A |
6185689 | Todd, Sr. et al. | Feb 2001 | B1 |
6205552 | Fudge | Mar 2001 | B1 |
6219803 | Casella et al. | Apr 2001 | B1 |
6249886 | Kalkunte | Jun 2001 | B1 |
6298445 | Shostack et al. | Oct 2001 | B1 |
6301668 | Gleichauf et al. | Oct 2001 | B1 |
6311278 | Raanan et al. | Oct 2001 | B1 |
6408391 | Huff et al. | Jun 2002 | B1 |
6415321 | Gleichauf et al. | Jul 2002 | B1 |
20020026591 | Hartley et al. | Feb 2002 | A1 |
Number | Date | Country |
---|---|---|
959586 | Nov 1999 | EP |
WO 9946882 | Sep 1999 | WO |
WO 0016206 | Mar 2000 | WO |
WO 0102963 | Jan 2001 | WO |
WO 0131415 | May 2001 | WO |
Entry |
---|
Intrusion, Evasion, and denial of Service: Eluding Network Intrusion Dectection, Thomas H. Ptack, et al., Secure Network INC., Jan. 1998.* |
A simple Active Attack Against TCP, Laurent Joncheay, Merit Network INC, Apr. 1995.* |
Protecting Routing Infrastructures from Denial of Service Using Cooperative Intrusion Detection, Steve Cheung et al., Universit of California, Davis, CA, New Security Paradigms, workshop Cumbria UK, Sep. 1997.* |
SAINT: A security Analysis Integration Tool, published in the proceedings of the 1996 SANS Conference, Washington, D.C., May 1996.* |
“Design and Implementation of a Security Management System”, W. Song et al., IEEE 1995, especially p. 262, section entitled “Simulator”. |
“Intrusion Detection Alert”, K.L. Ida Peterson, IEEE 1992, pp. 306-311. |
“Abstraction-Based Misuse Detection: High Level Specification and Adaptable Strategies”, J. Lin et al., IEE 1998, Abstract, Figures 1 and 2, entire document. |
“Role Based Access Control: A Multi-Dimensional View”, R.S. Sandhu et al., IEEE 1994, Abstract, pp. 54-60. |
“An Audit Model for Object Oriented Databases”, B. Kogan et al., IEEE 1991, pp. 90-96. |
“Developing Secure Systems: Issues and Solutions”, J. Freeman et al., IEEE 1998, pp. 183-189. |
“Formal Techniques for an ITSEC-E4 Secure Gateway”, Pierre Bieber, IEEE 1996, pp. 236-244. |
Number | Date | Country | |
---|---|---|---|
60/186892 | Mar 2000 | US |