发明名称 Intrusion detection
摘要 A system daemon starts through normal system startup procedures and reads its configuration file to determine which data entities (e.g., directories and files) are to be monitored. The monitoring includes a valid MD5 signature, correct permissions, ownership of the file, and an existence of the file. If any modification are made to the data entities, then the system daemon generates an alarm (intended for the administrator of the host) that an intrusion has taken place. Once an intrusion is detected, then the isolating steps or commands are issued in a real-time continuous manner to protect the host system from attack or intrusion.
申请公布号 US7565690(B2) 申请公布日期 2009.07.21
申请号 US20030605689 申请日期 2003.10.17
申请人 AT&T INTELLECTUAL PROPERTY I, L.P. 发明人 DOHERTY JAMES M.;ADAMS THOMAS LEE;MUELLER STEPHEN MARK
分类号 G06F7/04;G06F;G06F11/30;H04L9/00;H04L9/32;H04L29/06 主分类号 G06F7/04
代理机构 代理人
主权项
地址