Please download the dossier by clicking on the dossier button x
×

Interoperability of vulnerability and intrusion detection systems

  • US 7,509,681 B2
  • Filed: 01/08/2007
  • Issued: 03/24/2009
  • Est. Priority Date: 01/10/2000
  • Status: Expired due to Term
First Claim
Patent Images

1. A computer-implemented method for protecting a network, the method comprising:

  • gathering information about the network;

    using the gathered information to determine vulnerabilities of one or more hosts on the network;

    examining network traffic to determine intrusions on the network; and

    correlating the determined vulnerabilities of the hosts with the detected intrusions to identify network traffic indicative of an exploitation of one or more of the determined vulnerabilities.

View all claims
  • 11 Assignments
Timeline View
Assignment View
    ×
    ×