Robert William Danford - Ashburn VA, US Kenneth M. Farmer - Manitou Springs CO, US Clark Debs Jeffries - Chapel Hill NC, US Robert B. Sisk - Chapel Hill NC, US Michael A. Walter - Denver CO, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 15/08 G08B 23/00
US Classification:
726 23, 726 25, 709224
Abstract:
A method of progressive response for invoking and suspending blocking measures that defend against network anomalies such as malicious network traffic so that false positives and false negatives are minimized. When an anomaly is detected, the detector notifies protective equipment such as a firewall or a router to invoke a blocking measure. The blocking measure is maintained for an initial duration, after which it is suspended while another test for the anomaly is made. If the anomaly is no longer evident, the method returns to the state of readiness. Otherwise, a loop is executed to re-applying the blocking measure for a specified duration, then suspend the blocking measure and test again for the anomaly. If the anomaly is detected, the blocking measure is re-applied, and its duration is adapted. If the anomaly is no longer detected, the method returns to the state of readiness.
Applying Blocking Measures Progressively To Malicious Network Traffic
Robert William Danford - Ashburn VA, US Kenneth M. Farmer - Manitou Springs CO, US Clark Debs Jeffries - Chapel Hill NC, US Robert B. Sisk - Chapel Hill NC, US Michael A. Walter - Denver CO, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 11/30 G08B 23/00 G06F 11/18
US Classification:
726 23, 726 25, 709224
Abstract:
A method of progressive response for invoking and suspending blocking measures that defend against network anomalies such as malicious network traffic so that false positives and false negatives are minimized. When an anomaly is detected, the detector notifies protective equipment such as a firewall or a router to invoke a blocking measure. The blocking measure is maintained for an initial duration, after which it is suspended while another test for the anomaly is made. If the anomaly is no longer evident, the method returns to the state of readiness. Otherwise, a loop is executed to re-apply the blocking measure for a specified duration, then suspend the blocking measure and test again for the anomaly. If the anomaly is detected, the blocking measure is re-applied, and its duration is adapted. If the anomaly is no longer detected, the method returns to the state of readiness.
System, Method And Program Product For Detecting Unknown Computer Attacks
Frederic G. Thiele - Broomfield CO, US Michael A. Walter - Longmont CO, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
H04L 29/14 H04L 29/02
US Classification:
726 23, 726 22
Abstract:
A computer system and program product for automatically determining if a packet is a new, exploit candidate. First program instructions determine if the packet is a known exploit or portion thereof. Second program instructions determine if the packet is network broadcast traffic presumed to be harmless. Third program instructions determine if the packet is network administration traffic. If the packet is a known exploit or portion thereof, network broadcast traffic, or network administration traffic, the packet is not considered a new, exploit candidate. If the packet is not a known exploit or portion thereof, network broadcast traffic, or network administration traffic, the packet is an exploit candidate. Alternately, the first program instructions determine if the packet is a known exploit or portion thereof. The second program instructions determine if the packet is network broadcast traffic presumed to be harmless.
System, Method And Program For Identifying And Preventing Malicious Intrusions
Computer system, method and program product for identifying a malicious intrusion. A first number of different destination IP addresses, a second number of different destination ports and a third number of different signatures of messages, are identified from a source IP address during a predetermined period. A determination is made that in one or more other such predetermined periods the source IP address sent messages having the first number of different destination IP addresses, the second number of different destination ports and the third number of different signatures. Based on the determination that in the one or more other such predetermined periods the source IP address sent messages having the first number of different destination IP addresses, the second number of different destination ports and the third number of different signatures, a determination is made that the messages are characteristic of a malicious intrusion.
System, Method And Program For Identifying And Preventing Malicious Intrusions
FREDERIC G. THIELE - NIWOT CO, US MICHAEL A. WALTER - ATLANTA GA, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 21/56
US Classification:
726 23
Abstract:
Computer system, method and program product for identifying a malicious intrusion. A first number of different destination IP addresses, a second number of different destination ports and a third number of different signatures of messages, are identified from a source IP address during a predetermined period. A determination is made that in one or more other such predetermined periods the source IP address sent messages having the first number of different destination IP addresses, the second number of different destination ports and the third number of different signatures. Based on the determination that in the one or more other such predetermined periods the source IP address sent messages having the first number of different destination IP addresses, the second number of different destination ports and the third number of different signatures, a determination is made that the messages are characteristic of a malicious intrusion.
Youtube
Teaching English : Write College Research Pap...
There are three main types of college-level research papers that are w...
Category:
Howto & Style
Uploaded:
16 Nov, 2008
Duration:
2m 6s
Teaching English : Creating Survey Questions
Create a survey by including a variety of questions with yes and no an...
Category:
Howto & Style
Uploaded:
16 Nov, 2008
Duration:
2m 45s
Teaching English : How to Set the Style for a...
When setting the style for a speech, determine who your audience is, d...
Category:
Howto & Style
Uploaded:
16 Nov, 2008
Duration:
2m 4s
Teaching English : How to Prepare a Speech
When preparing a speech, research important facts or statistics to cap...
Category:
Howto & Style
Uploaded:
16 Nov, 2008
Duration:
2m 46s
Teaching English : How to Write a College Paper
When writing a college paper, start with an introduction that includes...
Category:
Howto & Style
Uploaded:
16 Nov, 2008
Duration:
2m 42s
Take Five + Solo - Michael Walter
Take Five von Paul Desmond...
Category:
Music
Uploaded:
12 Oct, 2008
Duration:
2m 8s
News
The sun shines brightly on a 'full' Jupiter in May
May 9 Deep Earth Through a Diamond Looking Glass, a lecture by Michael Walter, director of Carnegie Sciences Geophysical Laboratory, who uncovers Earths secrets from below. At the Carnegie Institution for Science, 1530 P St. NW, 6:30 p.m. Free, registration required. carnegiescience.edu/even
Date: Apr 29, 2018
Category: Sci/Tech
Source: Google
At Least One Person Killed As 'Catastrophic' Floods Inundate Houston
"We have, I would venture to say, thousands of people now who are in a situation where they have taken on water in their homes," Michael Walter, Public Information Officer for Houston's Office of Emergency Management told NPR's Weekend Edition early Sunday afternoon. "We still have reports of indivi
Date: Aug 27, 2017
Category: Top Stories
Source: Google
Still recovering from May flooding, Houston braces for more
The city of Houston, for example, began to pre-stage high-water rescue teams across town in areas prone to flooding, said Michael Walter, spokesman for the city's Office of Emergency Management. City officials did not close any roads in advance of the storm, deciding to wait for overnight developmen
Date: Jun 15, 2015
Category: U.S.
Source: Google
Punishing storms in Texas test government emergency response
officials say they havent yet installed a system that would allow them to alert residents with more targeted warnings. The city was still working with the Federal Emergency Management Agency to get that framework running, said Michael Walter, spokesman for Houstons Office of Emergency Management.
Date: May 27, 2015
Source: Google
Latest on flooding: 840 to 1400 Houston homes damaged
Harris County Emergency Management spokesman Francisco Sanchez said Wednesday that there are about 1,400 homes in Houston with some degree of damage. Michael Walter, a spokesman for the city's Office of Emergency Management, put that figure at about 840 homes.
"Between 9 a.m. and about noon today the Houston police department had 51 active flood locations with flooding reports and thats all over the city in city streets, the Chronicle quoted city spokesman Michael Walter as saying.