Computer Network Intrusion Detection System and Method
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for identifying an attacker device attempting an intrusion into a TCP/IP protocol based network that includes a managed device and a security event log. The managed device detects an incoming TCP/IP connection by the attacker device to the network. TCP/IP information relating to the attacker device is extracted from a TCP/IP stack of the managed device. It is ascertained that a port number of the incoming TCP/IP connection is identical to a predefined port number. A performed process includes determining that the incoming TCP/IP connection is a Net BIOS connection that has created an invalid logon by the attacker device. Event log information, which is associated with the detected incoming TCP/IP connection, is retrieved from the security event log. A generated report is generated and stored in a database of the network. The report includes the extracted TCP/IP information and the retrieved event log information.
26 Citations
40 Claims
-
1-19. -19. (canceled)
-
20. A method for identifying an attacker device attempting an intrusion into a TCP/IP protocol based network that includes at least one managed device and a security event log, said method comprising:
-
detecting, by the at least one managed device, an incoming TCP/IP connection by the attacker device to the network; after said detecting, extracting from a TCP/IP stack of the at least one managed device TCP/IP information relating to the attacker device; after said extracting, ascertaining that a port number of the incoming TCP/IP connection is identical to a port number in a set of predefined port numbers; after said ascertaining, performing a process, wherein said performing the process comprises determining that the incoming TCP/IP connection is a Net BIOS connection that has created an invalid logon by the attacker device, followed by retrieving event log information from the security event log, and wherein the retrieved event log information is associated with the detected incoming TCP/IP connection; and generating a report comprising report information that includes the extracted TCP/IP information and the retrieved event log information; and storing the report in a central violation database of the network. - View Dependent Claims (21, 22, 23, 24, 25, 26)
-
-
27. A system comprising at least one managed device for identifying an attacker device attempting an intrusion into a TCP/IP protocol based network, said network including the at least one managed device and a security event log, said at least one managed device configured to perform a method comprising:
-
detecting, by the at least one managed device, an incoming TCP/IP connection by the attacker device to the network; after said detecting, extracting from a TCP/IP stack of the at least one managed device TCP/IP information relating to the attacker device; after said extracting, ascertaining that a port number of the incoming TCP/IP connection is identical to a port number in a set of predefined port numbers; after said ascertaining, performing a process, wherein said performing the process comprises determining that the incoming TCP/IP connection is a Net BIOS connection that has created an invalid logon by the attacker device, followed by retrieving event log information from the security event log, and wherein the retrieved event log information is associated with the detected incoming TCP/IP connection; and generating a report comprising report information that includes the extracted TCP/IP information and the retrieved event log information; and storing the report in a central violation database of the network. - View Dependent Claims (28, 29, 30, 31, 32, 33)
-
-
34. A computer program product stored on a storage medium readable by a computer machine, the computer program product tangibly embodying readable program code for causing the computer machine to perform a method comprising:
-
detecting, by the at least one managed device, an incoming TCP/IP connection by the attacker device to the network; after said detecting, extracting from a TCP/IP stack of the at least one managed device TCP/IP information relating to the attacker device; after said extracting, ascertaining that a port number of the incoming TCP/IP connection is identical to a port number in a set of predefined port numbers; after said ascertaining, performing a process, wherein said performing the process comprises determining that the incoming TCP/IP connection is a Net BIOS connection that has created an invalid logon by the attacker device, followed by retrieving event log information from the security event log, and wherein the retrieved event log information is associated with the detected incoming TCP/IP connection; and generating a report comprising report information that includes the extracted TCP/IP information and the retrieved event log information; and storing the report in a central violation database of the network. - View Dependent Claims (35, 36, 37, 38, 39, 40)
-
Specification