throbber
USOO7359962B2
`
`(12)
`
`United States Patent
`Willebeek-LeMair et al.
`
`(10) Patent No.:
`(45) Date of Patent:
`
`US 7,359,962 B2
`Apr. 15, 2008
`
`(54) NETWORK SECURITY SYSTEM
`INTEGRATION
`(75) Inventors: Marc Willebeek-LeMair, Austin, TX
`(US); Craig Cantrell, Austin, TX (US);
`Dennis g Austin,TX (US). John
`McHale, Austin, TX (US); Brian
`Smith, Fort Worth, TX (US)
`
`(73) Assignee: 3Com Corporation, Marlborough, MA
`(US)
`Subject to any disclaimer, the term of this
`patent is extended or adjusted under 35
`U.S.C. 154(b) by 714 days.
`
`(*) Notice:
`
`(21) Appl. No.: 10/136,889
`(22) Filed:
`Apr. 30, 2002
`9
`Prior Publication Data
`US 2003/0204632 A1
`Oct. 30, 2003
`
`(65)
`
`(51) Int. Cl.
`(2006.01)
`G06F 5/73
`(52) U.S. Cl. ...................... 709/223; 709/224; 709/229;
`726/23: 726/24; 726/25
`(58) Field of Classification Search
`709/203
`- - - - - - - -
`709/223-224, 226 229, 249,227, 228; 713/201202;
`726/22, 23, 24, 25
`See application file for complete search history.
`References Cited
`U.S. PATENT DOCUMENTS
`
`(56)
`
`9, 1998 Bennett
`5,813,001 A
`5,835,726 A * 11/1998 Shwed et al. ............... 709,229
`5,878,231 A * 3/1999 Baehr et al. ................ 709/245
`6,134,591 A * 10/2000 Nickles ...................... 709,229
`6,219,706 B1
`4/2001 Fan et al.
`6.269.447 B1 *
`7/2001 Maloney et al. ............ T13 201
`6.279,113 B1* 8/2001 Vaidya ....................... T13 201
`6,279,173 B1* 8/2001 Denzin et al. ................. 4,213
`6,453,345 B2
`9, 2002 Trcka et al.
`6,477,651 B1 * 1 1/2002 Teal ............................ T26/23
`
`12/2002 Gleichauf et al.
`6,499,107 B1
`6.513,122 B1* 1/2003 Magdych et al. ........... T13 201
`6,519,703 B1
`2/2003 Joyce ......................... T13 201
`oyce
`6,550,012 B1 * 4/2003 Villa et al. ............
`... 713,201
`6,553,377 B1 * 4/2003 Eschelbeck et al. .......... 707/10
`6,611,875 B1
`8/2003 Chopra et al.
`6,651,099 B1
`1 1/2003 Dietz et al.
`6,654,882 B1 * 1 1/2003 Froutan et al. ............. T13,153
`6,711,615 B2
`3/2004 Porras et al.
`6,715,084 B2
`3/2004 Aaron et al. .................. T26/23
`6,725,378 B1
`4/2004 Schuba et al.
`6,735,702 B1* 5/2004 Yavatkar et al. ............ T13 201
`6,738,814 B1
`5/2004 Cox et al.
`6,816,973 B1 * 1 1/2004 Gleichauf et al. ............ T26, 13
`6,901,517 B1 *
`5/2005 Redmore ..........
`... 713,201
`6,957.348 B1 * 10/2005 Flowers et al. ............... T26/23
`6,968,377 B1 * 1 1/2005 Gleichauf et al. .......... TO9,224
`7,031,316 B2
`4/2006 Maher, III et al.
`
`(Continued)
`OTHER PUBLICATIONS
`
`Zeltser, et al., “Inside Network Perimeter Security: Stateful Firew
`als,” Que Publishing, on-line article at quepublishing.com, Apr. 29.
`
`(Continued)
`Primary Examiner LaShonda Jacobs
`(74) Attorney, Agent, or Firm Gardere Wynne Sewell LLP
`
`(57)
`
`ABSTRACT
`
`A network discovery functionality, intrusion detector func
`tionality and firewalling functionality are integrated together
`to form a network security system presenting a self-deploy
`ing and self-hardening security defense for a network.
`
`40 Claims, 4 Drawing Sheets
`
`
`
`Signature
`Creation
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 1 of 18
`
`

`

`US 7,359,962 B2
`Page 2
`
`U.S. PATENT DOCUMENTS
`7,073,198 B1* 7/2006 Flowers et al. ............... 726/25
`7,084,760 B2 * 8/2006 Himberger et al. ......... 340/540
`2001/0052014 A1* 12/2001 Sheymov et al. ........... 709/225
`2002/0023227 A1* 2/2002 Sheymov et al. ........... 713/201
`2002/0116639 A1* 8, 2002 Chefalas et al. ..... ... 713,201
`2003. O135749 A1* 7, 2003 Gales et al. ...
`... 713,200
`2003. O149888 A1* 8, 2003 Yadav ........
`... 713,200
`2003. O154399 A1* 8, 2003 Zuk et al. ...
`... 713,201
`2003. O159060 A1* 8, 2003 Gales et al. ...
`... 713,200
`2004/0093.513 A1* 5, 2004 Cantrell et al.
`... 713,201
`2004/0098623 A1* 5, 2004 Scheidell .......
`713,201
`2004/025O124 A1* 12/2004 Chelsa et al. ...
`713,201
`2005/0229254 A1* 10/2005 Singh et al. .................. T26/23
`
`
`
`2006/0059558 A1* 3/2006 Selep et al. ................... T26/23
`OTHER PUBLICATIONS
`- -
`d.
`TM
`& 8
`What F.R.S.E.S.E ashots.
`CO Jul. 19, 2005.
`Addressin th Limitati
`f Deep Packet I
`ti
`ith Com
`gne Limitations of LJeep FacKel Inspection W1
`O
`plete Content Protection.” Fortinet, Inc., White Paper, dated Jan.
`2004 www.fortine.com.
`Ido Dubawski “Firewall Evolution—Deep Packet Inspection.”
`on-line article at www.securityfocus.com, Jul. 29, 2003.
`Thomas Porter, “The Perils of Deep Packet Inspection ’’ on-line
`article at www.securityfocus.com Jan. 11, 2005
`J. J.
`
`* cited by examiner
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 2 of 18
`
`

`

`U.S. Patent
`
`Apr. 15, 2008
`
`Sheet 1 of 4
`
`US 7,359,962 B2
`
`Signoture
`Creation
`
`Enterprise
`Resources
`
`
`
`
`
`
`
`
`
`fir?t re
`2. t
`
`40
`(2)
`
`
`
`
`
`
`
`L- NETWORK DEFENSE
`
`-
`
`\-20
`
`
`
`
`
`MONITOR TRAFFIC
`
`RECOGNIZE NEW MACHINE
`
`TRICGER NETWORK SCAN
`
`
`
`
`
`
`
`INSTANTATE DETECTION
`FIG. 5
`
`400
`
`402
`
`404
`
`406
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 3 of 18
`
`

`

`U.S. Patent
`
`Apr. 15, 2008
`
`Sheet 2 of 4
`
`US 7,359,962 B2
`
`
`
`Network
`Discovery
`Functionality
`(NDF)
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`SECURITY MANAGEMENT AGENT
`Y126
`
`
`
`Intrusion
`Detector
`Functionality
`(IDF)
`
`
`
`Firewalling
`Functionality
`
`FIG. 2
`
`10
`
`THREAT
`AGGREGATION
`
`NETWORK
`ADMIN
`
`142
`
`Protected
`Network
`
`122
`122
`
`
`
`
`
`
`
`
`
`
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 4 of 18
`
`

`

`U.S. Patent
`
`Apr. 15, 2008
`
`Sheet 3 of 4
`
`US 7,359,962 B2
`
`
`
`
`
`SCAN NETWORK
`
`200
`
`
`
`DISCOVER WULNERABILITY
`
`202
`
`
`
`
`
`
`
`NOTIFY ACENT
`
`RETRIEVE DETECTION
`SIGNATURE
`
`
`
`INSTANTATE ON IDF
`AND/OR FIREWALLING
`
`RESPOND
`FIG. 3
`
`204
`
`
`
`206
`
`208
`
`210
`
`212
`
`
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 5 of 18
`
`

`

`U.S. Patent
`
`Apr. 15, 2008
`
`Sheet 4 of 4
`
`US 7,359,962 B2
`
`UNTRUSTED
`
`
`
`14
`
`520
`
`HTTP SERVER
`522
`
`10
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 6 of 18
`
`

`

`US 7,359,962 B2
`
`1.
`NETWORK SECURITY SYSTEM
`INTEGRATION
`
`BACKGROUND OF THE INVENTION
`
`2
`include malicious eavesdropping, which allows a hacker to
`misappropriate confidential communication transmitted
`over the Internet. If confidential communications get into the
`wrong hands, damage to the business of the enterprise or, at
`the very least, damage its reputation may arise. There is also
`a significant cost and negative publicity resulting from
`denial of service attacks. In an attempt to combat all of these
`types of attacks, enterprises have been increasing their
`security budgets to address heightened network vulnerabil
`ity concerns.
`To prevent network security breaches, enterprises have
`deployed firewalls at the access points where their networks
`connect to the Internet or other networks. Firewalls are
`hardware or software devices that filter the content that
`flows into and out of an enterprise's network. The firewall is
`designed to block unauthorized access to the network,
`allowing only connections that are approved by the network
`administrator. However, because of the increased sophisti
`cation of hackers, and the existence of automated attack
`tools, firewalls alone have proven to be inadequate measures
`to fully protect many networks. Consequently, many enter
`prises have been compelled to add additional network Secu
`rity systems, including intrusion detection systems (IDSS)
`and vulnerability assessment scanners (VASs). Both the IDS
`and VAS assess the vulnerability of a network to attack.
`Intrusion detection systems are designed to expose intruders,
`break off the intrusion, examine the intruder's point of entry
`and prevent future intruders from using the same entry point.
`Vulnerability assessment Scanners, on the other hand, are
`designed to discover Vulnerabilities of a network system,
`allowing network managers to find and patch network
`security holes before they are discovered by hackers.
`The first generation of firewalls, intrusion detection sys
`tems and Vulnerability assessment scanners generally were
`designed to secure low bandwidth connections to the Inter
`net. As network connection speeds have increased, these
`early types of security products have created significant
`performance bottlenecks in networks, slowing down con
`nection speeds.
`As the security needs of enterprises continued to evolve,
`the single-function low speed firewall, IDS and VAS prod
`ucts are no longer capable of cost-effectively meeting the
`performance and manageability needs of organizations. To
`deploy a complete firewall, intrusion detection system and
`Vulnerability assessment Scanner Solution, an enterprise
`often must purchase a series of separate, expensive devices
`and license expensive security software, often from multiple
`vendors, which do not communicate with each other and
`cannot be interfaced with one management console system.
`This can result in a network security architecture that is more
`expensive and complex to install and manage and, as a result
`of this increased complexity, potentially less secure than a
`network that is based on a single vendor's products or an
`integrated solution. More specifically, enterprises have
`found it difficult, if not impossible, to integrate the firewall,
`IDS and VAS solutions together. Most security appliances
`require an enterprise to reconfigure network addressing to
`insert the appliances into its network and also require the
`enterprise to compromise network design in ways that
`reduce redundancy and, therefore, network reliability. Many
`times these issues have led to a significant decrease in the
`enterprise's network connection speed as more devices are
`added to the network.
`An enterprise requires abroad array of high-performance,
`cost-effective products to secure their networks. To reduce
`cost and network complexity, the enterprise must increas
`ingly look for high-performance network security solutions
`
`1. Technical Field of the Invention
`The present invention relates to network security and, in
`particular, to an integration of a firewalling functionality,
`intrusion detector functionality and network discovery func
`tionality to provide for a unified network defense structure.
`2. Description of Related Art
`Over the past few years, Internet usage has grown rapidly
`as an increasing number of computer users connect to the
`information Super-highway. With Internet usage becoming
`more prevalent, enterprises are increasingly using the Inter
`net to conduct their business. Enterprises are also exploiting
`the world-wide networking advantages of the Internet by
`connecting their internal networks to the Internet, thereby
`expanding their operations, facilitating communications
`within the enterprise, enabling e-commerce and transaction
`processing, and communicating with customers, Suppliers
`and business partners. Connection to the Internet may be
`made at any one of a variety of access points, including
`major corporate offices, branch offices, remote user loca
`tions, Internet data centers and e-business Web sites.
`While Internet usage is increasing, the access speed at
`which individuals and enterprises connect to the Internet is
`also increasing. Consumers and Smaller enterprises are shift
`ing from dial-up modem connections to broadband connec
`tions, using cable or digital Subscriber line, or DSL,
`modems. These broadband connections enable users to
`access the Internet at speeds up to 20 times faster than a
`dial-up modem. Similarly, larger enterprises are moving
`from T1 connections and T3 connections to higher speed
`OC-3 connections and gigabit Ethernet connections. Web
`site connection speeds are also increasing as many Web
`sites, which were originally operated from an enterprise's
`own facilities, have been outsourced to Internet data centers,
`which deliver higher bandwidth connections.
`As enterprises increasingly use the Internet to conduct
`business, the amount of confidential and sensitive informa
`tion that is delivered over, and is accessible through, the
`Internet is also increasing. Unlike the private, dedicated
`communications networks that enterprises have used for
`business for the last several decades, which were relatively
`secure from outside intruders, the Internet and networks
`connected to an enterprise are Susceptible to security threats
`and malicious eavesdropping due to their openness and ease
`of access. Recently, there has been an increase in the
`frequency of attempted breaches of network security, or
`hacker attacks, intended to access this confidential informa
`tion or to otherwise interfere with network communications.
`Network attacks are becoming not only more prevalent
`but also more Sophisticated and severe, resulting in part from
`the availability of tools and information on how to conduct
`these attacks, an increase in hacker Sophistication, an
`increase in the number of network access points that are
`Vulnerable to attack and an increase in the overall amount of
`confidential information accessible through or delivered
`over the Internet. These attacks include distributed denial of
`service attacks, in which an attacker floods a Web site with
`large numbers of packets or connection requests that over
`whelm the Web site and prevent legitimate users from
`accessing it. Other types of attacks are designed not just to
`prevent access to a Web site, but also to penetrate its security
`and allow a hacker to take control of a server and deface the
`Web site or steal sensitive information. Still other attacks
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`55
`
`60
`
`65
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 7 of 18
`
`

`

`US 7,359,962 B2
`
`3
`that can integrate firewall, IDS and Vulnerability assessment
`capabilities into one system or appliance. It is also clear that
`entities desire a comprehensive network security Solution
`from a single vendor that can scale from low-bandwidth
`connections to high bandwidth connections while delivering
`very high-speed network performance and availability. In
`response to this preference, existing security vendors have
`started to include additional capabilities in their single
`function products. However, these products were not origi
`nally designed to deliver multiple functions and, as a result,
`the addition of these functions tends to decrease both
`product and network performance and increase product
`complexity as well as significantly increase cost.
`The present invention addresses the foregoing and other
`concerns with a single vendor Solution that integrates the
`functionalities performed by a firewall, IDS and VAS for
`network security into one system or appliance Supported on
`a single platform.
`
`SUMMARY OF THE INVENTION
`
`Generally speaking, the present invention integrates a
`network discovery functionality, an intrusion detector func
`tionality and a firewalling functionality together Such that a
`self-deploying and self-hardening security defense is pro
`vided for a network. Self-deployed security defense is
`achieved by having the included defense functionalities
`work together to automate threat detection and threat
`response operations. Self-hardening security defense is
`achieved by having the included functionalities implement
`threat detection and threat response operations in an opti
`mized manner that mitigates instances of false detection.
`In accordance with one aspect of the present invention,
`network protection is provided by having an intrusion detec
`tor functionality analyze network traffic to identify entering
`content that is potentially harmful to the network. An alert
`is then generated in response to the detection of Such traffic.
`A firewalling functionality then responds to the alert by
`blocking entrance of the detected traffic that is potentially
`harmful.
`In accordance with another aspect of the present inven
`tion.network protection is provided by having an inspection
`agent extract features (for example, packet features) from
`entering traffic. These features are evaluated by the inspec
`tion agent using threat detection signatures to detect the
`existence of potentially harmful content in the traffic. If
`harmful content is detected, an entrance sentry responds to
`the agent detection by denying the traffic admission to the
`network.
`In an embodiment of the invention, a network discovery
`functionality scans the network being protected to identify
`computer system and network device vulnerabilities. These
`Vulnerabilities are used to tune the detection signature to
`detect those Vulnerabilities in the context of the network
`being protected. The tuned threat detection signature is then
`utilized by the inspection agent to evaluate traffic features.
`This evaluation may be performed either at the packet level
`or session level.
`In accordance with yet another aspect of the present
`invention, network protection is provided by scanning a
`network to identify computer system and network device
`Vulnerabilities. A detection signature is then tailored to
`address the identified vulnerability in the context of a
`configuration of the network being protected. The signature
`is then instantiated on an intrusion detector functionality
`and/or a firewalling functionality. With respect to the intru
`sion detector functionality, network traffic is analyzed in
`
`4
`view of the instantiated detection signature to identify
`entering content that is potentially harmful to the network.
`With respect to the firewalling functionality, network traffic
`is analyzed in view of the instantiated detection signature to
`block entering traffic that is potentially harmful to the
`network.
`In accordance with yet another aspect of the present
`invention, network protection is provided by having an
`intrusion detector functionality recognize, from monitored
`traffic to and from the network being protected, that a new
`network machine is present. Responsive thereto, network
`discovery scanning of the network is triggered to determine
`whether the addition of the new network machine raises a
`Vulnerability concern. If so, a detection signature for that
`Vulnerability concernis instantiated on the intrusion detector
`to protect the new network machine against the Vulnerability
`COC.
`In accordance with still another aspect of the present
`invention, a trusted network is scanned to obtain Vulnerabil
`ity information concerning the network elements therein. As
`a result of this scan, first and second vulnerability informa
`tion is generated concerning the network elements con
`nected to a first and second physical interface, respectively.
`Responsive to the Vulnerability information, first and second
`detection signatures are instantiated to monitor traffic over
`the first and second physical interfaces, respectively, for any
`threats to the trusted network.
`
`BRIEF DESCRIPTION OF THE DRAWINGS
`
`A more complete understanding of the method and appa
`ratus of the present invention may be acquired by reference
`to the following Detailed Description when taken in con
`junction with the accompanying Drawings wherein:
`FIG. 1 is a block diagram for a unified network defense
`system in accordance with the present invention;
`FIG. 2 is a block diagram for an exemplary integrated
`architecture of a unified network defense system in accor
`dance with the present invention;
`FIG. 3 is a flow diagram illustrating an exemplary opera
`tion of the system of FIGS. 1 and 2:
`FIG. 4 is a flow diagram illustrating an exemplary opera
`tion of the system of FIGS. 1 and 2:
`FIG. 5 is a flow diagram illustrating an exemplary opera
`tion of the system of FIGS. 1 and 2; and
`FIG. 6 is a block diagram of a threat prevention appliance
`that utilizes the unified network defense system of FIGS. 1
`and 2.
`
`10
`
`15
`
`25
`
`30
`
`35
`
`40
`
`45
`
`50
`
`DETAILED DESCRIPTION OF THE DRAWINGS
`
`Network security systems, generally speaking, are a com
`pendium of three devices: a Vulnerability assessment scan
`ner (VAS); an intrusion detection system (IDS); and a
`firewall. In the prior art, these devices are disparate, often
`Supplied by different vendors, and are rarely designed or
`installed in a way that facilitates collaborative defense
`efforts. This legacy defense system architecture leaves much
`to be desired in terms of dynamic response, dynamic con
`figuration, integration, cooperation and collaboration. The
`present invention addresses the foregoing and other con
`CS.
`Reference is now made to FIG. 1 wherein there is shown
`a block diagram of a unified network defense system 10 in
`accordance with the present invention. The system 10 is
`configured to integrate a network discovery functionality, an
`intrusion detection functionality and a firewalling function
`
`55
`
`60
`
`65
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 8 of 18
`
`

`

`US 7,359,962 B2
`
`10
`
`15
`
`5
`ality together to act as a single, highly intelligent, highly
`adaptive, network-based information security system. The
`system 10 is advantageously self-deploying (i.e., the various
`components of the system work together to automate the
`threat detection and response operation) and self-hardening
`(i.e., the operation of the threat detection and response
`functionality is optimized to mitigate instances of false
`detection).
`The system 10 includes an enterprise resource database 12
`containing enterprise (i.e., a protected network 14) specific
`data 16 identifying machines (hosts) in the network, services
`provided by the hosts, and potential computer system and
`network device Vulnerabilities associated with those
`machines and services in the context of the network con
`figuration. This data 16 may be collected in any one of a
`number of well known ways, including, for example, the use
`of a separate, prior art, Vulnerability assessment Scanner 18
`device (configured internally or externally) that operates to
`assess the protected network 14 in a conventional manner.
`The system 10 further includes a signature database 20
`that stores detection signatures 22 (comprising, for example,
`security rules, policies and algorithms) that are designed to
`mitigate or avert network damage from detected Vulnerabili
`ties. These signatures 22 may be obtained from any one of
`a number of well known sources, including, for example,
`machine (host) manufacturers, service Suppliers, the Inter
`net, and the like. Additionally, the signatures 22 may be
`created by an administrator 24 of the protected network 14.
`Still further, the signatures 22 may be supplied by a entity 26
`in the business of signature creation, where that entity
`operates to collect threat information (for example, worm,
`virus, trojan, DoS, Access, Failure, Reconnaissance, other
`suspicious traffic, and the like) from around the world,
`analyze that information and design detection signatures 22
`that can be used by others to mitigate or avert network
`damage from the collected threats.
`The system 10 still further includes an inspection agent 28
`that operates to inspect traffic 30 that is entering the pro
`tected network 14. The traffic 30 generally comprises packet
`32 traffic, with each packet including a header portion 34 and
`a payload portion 36. The inspection operation performed by
`the inspection agent 28 involves first extracting 38 from the
`traffic 30 certain packet features of interest for inspection.
`More specifically, the extraction of packet features may
`comprise features 38(1) from the header portion 34 (such as,
`45
`for example, destination and Source IP address, destination
`and source ports, and the like) and/or features 38(2) from the
`payload portion 36 (Such as, for example, character Strings,
`regular expressions, and the like).
`The inspection operation performed by the inspection
`agent 28 next involves comparing 40 the extracted packet
`features against the detection signatures 22 obtained from
`the signature database 20. These detection signatures 22,
`generally speaking, include an object defining criteria (for
`example, TCP, HTTP and URI related criteria) that must be
`met by one or more of the extracted packet features in order
`to detect a potential threat to the network 14 posed by the
`inspected traffic 30.
`In the event that the comparison 40 operation performed
`by the inspection agent 28 is satisfied (i.e., there is a criteria
`match), any one (or more than one) of a number of possible
`actions (specified by an object within the detection signature
`22 itself) may be taken by the system 10. For example, the
`inspection agent 28 may issue an alarm report 50 to the
`administrator 24. The identification of the threatened
`machine (host) or service is provided using information
`contained in the report 50. The inspection agent 28 may also
`
`55
`
`6
`move immediately to block the threatening traffic 30 (as will
`be described in more detail herein) or terminate a session
`associated with the threatening traffic 30 (perhaps using a
`TCP reset).
`The detection signatures 22 may be applied by the inspec
`tion agent 28 as they are obtained from the database 20 (i.e.,
`without alteration or change). Alternatively, the detection
`signatures 22 retrieved from the database 20 may be tailored
`by the inspection agent 28 and optimized to the needs and
`configuration of the particular network 14 being protected.
`To that end, the agent 28 considers the enterprise (i.e.,
`network 14) specific data 16 stored in the enterprise
`resources database 12, and modifies the detection signature
`22 to ensure that the detection criteria and response actions
`are tailored to the network 14. More specifically, the enter
`prise specific data 16 is considered by the agent 28 when
`instantiating a detection signature 22 so that the signature
`(either through its criteria or its response instructions) is
`instantiated in a way that minimizes the likelihood that false
`positive alarms will be generated.
`As discussed above, the inspection agent 28 may act,
`following the detection of threatening traffic, to immediately
`block the threatening traffic 30 from entering the network
`14. To accomplish this goal, the system 10 further includes
`a gatekeeping functionality performed by an entrance Sentry
`42. The entrance Sentry 42 is an in-line component of the
`system 10. By “in-line' it is meant that all traffic 30 must
`pass through the entrance Sentry 42 before entering the
`protected network 14. Responsive to the detection of threat
`ening traffic 30, the inspection agent 28 issues a blocking
`command 54 to the entrance sentry 42. This command 54
`includes sufficient information to allow the entrance sentry
`42 to identify the threatening traffic 30 and deny it entry to
`the protected network 14. The sentry 42 then compares 44
`the command 54 information against the traffic 30 (more
`specifically, against each packet 32). In the event there is a
`match, the matching traffic 30/packet 32 is denied entry to
`the network 14 and is discarded. Otherwise, entrance to the
`network 14 is permitted.
`To assist the sentry 42 in being able to stop entry of the
`specific piece of traffic determined by the inspection agent
`28 to be threatening, the system 10 further includes a buffer
`46 to temporarily store the packets 32 and slow their passage
`through the system 10 for a length of time sufficient to allow
`the extraction 38, comparison 40 and issuance of the com
`mand 54 to occur before the packets reach the sentry. It will,
`of course be recognized that other techniques known to
`those skilled in the art for delaying the passage of the
`packets through the system 10 may be employed as needed.
`Additionally, in some applications of the system 10, no
`buffer may be required. Still further, it will be recognized
`that the buffer 46 may be included within the entrance sentry
`42.
`The entrance sentry 42 further functions in another pro
`tection mode. In this mode, detection (blocking) signatures
`22 are downloaded either directly from the database 20 to
`the entrance sentry 42 (see, reference 56) or indirectly
`through the inspection agent 28 (see, reference 58). The
`sentry 42 operates to comparing 44 the packets 32 passing
`in-line therethrough against the downloaded detection
`(blocking) signatures 22. As discussed above, the detection
`(blocking) signatures 22, generally speaking, include an
`object defining criteria that must be matched by the packets
`32 in order to detect a packet 32 in the traffic 30 that should
`be blocked. More specifically, and in a manner similar to that
`performed by the comparison operation 40 of the inspection
`agent 28, the Sentry 42 examines features in the header
`
`25
`
`30
`
`35
`
`40
`
`50
`
`60
`
`65
`
`Ex.1005
`CISCO SYSTEMS, INC. / Page 9 of 18
`
`

`

`US 7,359,962 B2
`
`7
`portion of the packets 32 in comparison to the (blocking)
`signature defined detection criteria to make the threat detec
`tion determination and block passage of that packet.
`In the event that the comparison 44 operation performed
`by the sentry 42 with respect to the detection (blocking)
`signature 22' is satisfied (i.e., there is a criteria match), any
`one (or more than one) of a number of possible actions
`(specified by an object within the detection (blocking)
`signature 22' itself) may be taken by the system 10. For
`example, the sentry 42 may issue an alarm report 50 to the
`administrator 24. The identification of the threatened
`machine (host) or service is typically available from the
`information contained in the report 50. The sentry 42 may
`also move immediately to terminate a session associated
`with the threatening traffic 30 (perhaps using a TCP reset).
`Where the detection (blocking) signatures 22 are directly
`downloaded 56, they are applied by the sentry 42 as they are
`obtained from the database 20 (i.e., without alteration or
`change). Alternatively, when indirectly downloaded 58 from
`the database 20, the detection (blocking) signatures 22 may
`be tailored by the inspection agent 28 and optimized to the
`needs and configuration of the particular network 14 being
`protected. To that end, the agent 28 considers the enterprise
`(i.e., network 14) specific data 16 stored in the enterprise
`resources database 12, and modifies the detection (blocking)
`signature 22' to ensure that the detection criteria and
`response actions are tailored to the network 14. More
`specifically, the enterprise specific data 16 is considered by
`the agent 28 when instantiating a detection (blocking) sig
`nature 22" on the entrance Sentry 42 so that the signature
`(either through its criteria or its response instructions) is
`instantiated in a way that minimizes that likelihood that false
`positive alarms will be generated.
`The comparison operation 40 performed by the inspection
`agent 28 on the extracted 38 packets 32 may be implemented
`on either or both the packet level or the session level. On a
`packet level, the inspection agent 28 considers each packet
`32 individually when applying the detection signatures 22.
`On a session level, the inspection agent 28 considers a
`plurality of related packets 32 together when applying the
`detection signatures 22. To assist in session level compari
`son 40, the system 10 further includes a state information
`memory 60 that stores historical packet related data.
`Examples of the types of historical packet related data that
`may be retained by the memory 60 include:
`reassembly of fragmented packets;
`reassembly of TCP session flows:
`maintenance of negotiated ephemeral ports (for example,
`FTP establishes a dynamic port over which to exchange
`data);
`connection establishment state (proper handshake
`between communicating hosts such as, for example, the
`well-defined exchange for TCP in establishing a con
`nection); and
`protocol and application level state information (ensuring
`that applications or protocols are transitioning to well
`defined states that do not violate the specifications of
`those applications or protocols or exploit known Vul
`nerabilities in those applications or protocols). For a
`session level comparison, the agent 28 not only con
`siders the extracted 38 packet features (header and
`payload) for the current packet 32 under examination,
`but also historical packet related data retrieved from the
`memory 60. In the event of a match between the
`signature 22 criteria and the combined extracted packet
`
`40
`
`45
`
`8
`features and historical packet related data, the agent 28
`detects a potential threat to the network 14 posed by the
`traffic 30.
`The system 10 may operate in a scenario (see, also, FIGS.
`3 and 4) where the VAS 18 completes a scan of the network
`14, updates the database 12 and further informs the inspec
`tion agent 28 of a discovered network vulnerability. Respon
`sive thereto, the inspection agent 28 retrieves an appropri

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket