Jon-Michael C. Brook - Clearwater FL, US Matthew C. Rixon - Sarasota FL, US Randall S. Brooks - Tampa FL, US Troy Dean Rockwood - Thousand Oaks CA, US
Assignee:
Raytheon Company - Waltham MA
International Classification:
G06F 3/00 G06F 11/30
US Classification:
715736, 715853, 709224, 719318
Abstract:
A method for interfacing with a user of an enterprise intrusion detection system, the method comprises receiving at least one packet flow, each packet flow originating from a unique node in the intrusion detection system and comprising descriptive information and a plurality of packet headers. The descriptive information of a first subset of the received packet flows is communicated to a user based at least in part on a filtering ruleset. A second subset of the received packet flows is concealed from the user based at least in part on the filtering ruleset. In response to receiving a command from the user, the plurality of packet headers for at least one packet flow in the first subset is communicated to the user.
Vertically Extensible Intrusion Detection System And Method
Jon-Michael C. Brook - Clearwater FL, US Matthew C. Rixon - Sarasota FL, US Randall S. Brooks - Tampa FL, US Troy Dean Rockwood - Thousand Oaks CA, US
Assignee:
Raytheon Company - Waltham MA
International Classification:
G06F 15/16 G06F 15/173
US Classification:
709224, 709225, 709227, 709236, 709246
Abstract:
A method for vertically extensible intrusion detection for an enterprise comprises receiving a first packet flow from a first node, the first packet flow comprising at least a portion of packet headers received at the first node during a first timeframe and receiving a second packet flow, the second packet flow comprising at least a portion of packet headers received at the second node during a second timeframe. The first and second packet flow are processed to detect an attack on the enterprise system. In response to the attack, an alert message is communicated to a master server, a response message is received from the master server, the response message comprising a signature to impede the attack, and the response message is automatically communicated to the first node and the second node.
Dynamic Rule Generation For An Enterprise Intrusion Detection System
A method for dynamically generating rules for an enterprise intrusion detection system comprises receiving a packet flow from a sensor. The packet flow is dynamically processed to detect if the packet flow represents an attack on the enterprise system. A response message is automatically generated in response to the attack, the response message comprising a signature to identify the attack. The response message is automatically communicated to a response message file, the response message file comprising at least one response message.
Method And System For Adjudicating Text Against A Defined Policy
A computerized method of adjudicating text against a policy includes receiving one or more system policies, creating a system datastructure for each received system policy, receiving an input message comprising a text to be adjudicated, selecting a system policy from the one or more received system policies based on the input message, and processing the text to be adjudicated and the system datastructure corresponding to the selected system policy to determine if a prohibited word is present in the text to be adjudicated. The one or more system policies include one or more prohibited words and a first hit value corresponding to each prohibited word. The system datastructure includes a plurality of linked lists corresponding the letters of the alphabet and a head linked list operable to store one or more found prohibited words.
Noah Z. Stahl - St. Petersburg FL, US Wendy S. Bartlett - Seminole FL, US Randall S. Brooks - Apollo Beach FL, US
Assignee:
Raytheon Company - Waltham MA
International Classification:
G06F 7/04
US Classification:
726 4, 726 2, 707783
Abstract:
A method for providing secure document management includes receiving a document from a user having an associated security access profile and generating a security label to be stored as an attribute of the document. The security label includes a clearance component selected from an authorized subset of clearance components that are determined based on the security access profile associated with the user, and also includes one or more secondary security components selected from an authorized subset of secondary security components that are determined based on the clearance component of the security label and the security access profile associated with the user. The method includes storing the document in a document repository storing a plurality of documents each having an associated security label, and determining whether a third-party user is authorized to access the document based on a comparison of a security access profile of the third-party user and the security label associated with the document.
Enabling Multi-Level Security In A Single-Level Security Computing System
Daniel Teijido - Clearwater FL, US Randall S. Brooks - Apollo Beach FL, US
Assignee:
Raytheon Company - Waltham MA
International Classification:
H04L 9/00
US Classification:
713166, 713165, 726 13, 726 1, 707705
Abstract:
According to an embodiment, a system may comprise a mass storage device that is operable to be coupled to one or more processors. The mass storage device may comprise a base operating system that is operable to be executed by the one or more processors. The base operating system may be operable to implement a single security level. The mass storage device may also comprise a virtual operating system that is operable to be executed by the one or more processors. The virtual operating system may be executed using a virtualization tool that is executed by the base operating system. The virtual operating system may be operable to process information according to a plurality of security levels and communicate the information to one or more computing systems. The information may be communicated according to the plurality of security levels of the information.
Randall Brooks - Tampa FL, US Matthew Rixon - Tampa FL, US Jonathan Goding - Tampa FL, US
International Classification:
G06F 12/14
US Classification:
726023000
Abstract:
According to one embodiment of the invention, a system for preventing a network attack is provided. The system includes a computer having a processor and a computer-readable medium. The system also includes a shield program stored in the computer-readable medium. The shield program is operable, when executed by the processor, to transmit an agent to each of one or more nodes in a network in response to an attack directed to the network. The agent is operable to initiate a reduction of the effect of the attack on the node.
System And Method For Transferring Information Through A Trusted Network
A networking method includes receiving a first data packet from a computing node at a middleware process of a first computing system, adding, by the middleware process, a Common Internet Protocol Security Option (CIPSO) label to the data packet to form a modified packet, and transmitting, by a separation kernel, the modified packet to a second computing system. The first computing system includes an embedded operating system, and the computing node is coupled to the first computing system. The second computing system includes a CIPSO compliant operating system.
Raytheon Intelligence & Space
Principal Engineering Fellow
Raytheon
Engineering Fellow
Raytheon May 2005 - Dec 2006
Principal Software Engineer
Raytheon Network Centric Systems Feb 2001 - May 2005
Principal Software Engineer
Raytheon Technical Services Company Oct 1999 - Feb 2001
Senior Software Engineer Ii
Education:
Purdue University 1992 - 1997
Bachelors, Bachelor of Science, Computer Science
Purdue University;Bs, Computer Science;1992 – 1997;
Bachelors, Bachelor of Science, Computer Science
Skills:
Information Assurance Systems Engineering Cissp Computer Security Vulnerability Assessment Information Security Security Integration Dod System Architecture Software Engineering Earned Value Management Software Development Security Clearance System Design Enterprise Architecture Intrusion Detection Configuration Management Dodaf Engineering Software Assurance Supply Chain Risk Management Telelogic Doors
Languages:
Spanish English
Certifications:
Certificate of Cloud Security Knowledge (Ccsk). Certified Secure Software Lifecycle Professional (Csslp) Information Systems Security Management Professional (Issmp) Information Systems Security Architecture Professional (Issap) Information Systems Security Engineering Professional (Issep) Certified Information Systems Security Professional (Cissp)