The assignee for this patent application is
Reporters obtained the following quote from the background information supplied by the inventors: "An Intrusion Detection System (IDS) is a device or software application that monitors network and/or system activities for malicious activities or policy violations and produces reports to a management station. Intrusion prevention is the process of performing intrusion detection and attempting to stop detected possible incidents. Intrusion detection and prevention systems (IDPS) are primarily focused on identifying possible incidents, logging information about them, attempting to stop them, and reporting them to security administrators. In addition, organizations use IDPSs for other purposes, such as identifying problems with security policies, documenting existing threats, and deterring individuals from violating security policies. IDPSs typically record information related to observed events, notify security administrators of important observed events, and produce reports. Many IDPSs can also respond to a detected threat by attempting to prevent it from succeeding. They use several response techniques, which involve the IDPS stopping the attack itself, changing the security environment (e.g., reconfiguring a firewall), or changing the attack's content.
"Users of various network services, such as email, social networking systems, and the like, typically maintain accounts with such systems that are keyed to a user identifier. Some of these network service providers, such as
In addition to obtaining background information on this patent application, VerticalNews editors also obtained the inventor's summary information for this patent application: "The present invention provides methods, apparatuses and systems directed to a network security system that correlates security-related events to individual users, as identified by a user identifier and an identity provider. The user identifier may be associated in one or more implicit or explicit social networks. Correlating events to users, as opposed to remote hosts identified by a network address, greatly expands the data that can be gathered, associated and correlated thereby improving the ability to develop more sophisticated attack signatures.
"These and other features, aspects, and advantages of the disclosure are described in more detail below in the detailed description and in conjunction with the following figures.
DESCRIPTION OF THE DRAWINGS
"FIG. 1 is a schematic diagram illustrating an example security framework.
"FIG. 2 is a schematic diagram illustrating an example system architecture.
"FIG. 3 is a flow chart illustrating an example process implemented by the front-end framework.
"FIG. 4 illustrates an example network environment.
"FIG. 5 illustrates an example computer system.
"FIG. 6 is a schematic diagram illustrating an example message and data flow between various components of a security framework.
"FIG. 7 is a schematic illustrating various components of the security framework."
For more information, see this patent application: Haugsnes,
Keywords for this news article include:
Our reports deliver fact-based news of research and discoveries from around the world. Copyright 2014, NewsRx LLC
Most Popular Stories
- SoCalGas Reaches Record Spend on Diversity Suppliers
- Republican Jolly Wins Fla. Special Election
- Senate Dems Pull All-Nighter on Global Warming
- Copper Plunges on China Jitters
- Obama Seeks Overtime Pay for Salaried Workers
- U.S. Stocks Sink for 3rd Day in a Row
- Vestas Ramps Up Hiring to Build Wind Turbines
- Justin Bieber Comes Between Taylor Swift and Selena Gomez
- World Wide Web Turns 25
- Dianne Feinstein Accuses CIA of Spying on Congress