×

Computer security intrusion detection system for remote, on-demand users

  • US 7,657,939 B2
  • Filed: 03/14/2005
  • Issued: 02/02/2010
  • Est. Priority Date: 03/14/2005
  • Status: Active Grant
First Claim
Patent Images

1. A method for implementing an intrusion detection system in an on-demand computing service environment in which one or more data processing hosts are made available to a remote on-demand user that does not have physical custody and control over said host(s), comprising:

  • monitoring resources for intrusion events and implementing responses according to event-action rules;

    said resources, said intrusion events and said event-action rules being defined by said on-demand user to a third-party entity authorized by said on-demand user to specify security criteria to an on-demand service provider implementing said on-demand computing service environment;

    said monitoring being performed by one or more intrusion detection agents that are run by said one or more data processing hosts, each intrusion detection agent being associated with a single one of said data processing hosts, and each of said data processing hosts that is being monitored running at least one of said intrusion detection agents;

    said user-defined resources including hardware resources, non-network system software resources, non-network, local login system access resources and network access resources;

    said user-defined intrusion events including hardware events, non-network system software events, non-network, local login system access events and network access events; and

    said user-defined event-action rules including notifying said on-demand user of said user-defined intrusion events.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×