PTAB

IPR2021-01258

NetScout Systems Inc v. Longhorn HD LLC

Key Events
Petition
petition

1. Case Identification

2. Patent Overview

  • Title: Intrusion Detection System and Method
  • Brief Description: The ’846 patent describes an intrusion detection system (IDS) that performs anomaly-based event detection. The system is configured to analyze network traffic at a granular level by generating and analyzing multi-dimensional vectors derived from individual network packet fields stored in a database to identify network attacks while minimizing false positives.

3. Grounds for Unpatentability

Ground 1: Claims 1-5 and 7-11 are obvious over Rhodes in view of McCreery

  • Prior Art Relied Upon: Rhodes (“Multiple Self-Organizing Maps for Intrusion Detection,” a 2000 conference paper) and McCreery (Patent 5,787,253).
  • Core Argument for this Ground:
    • Prior Art Mapping: Petitioner argued that Rhodes taught an anomaly-based IDS that uses Kohonen self-organizing maps (SOMs) to analyze network traffic and detect intrusions. Rhodes described capturing packets, extracting features, and using "vectorization techniques" to create inputs for the SOM. However, Petitioner contended Rhodes did not expressly teach storing the parsed packet fields in a database. McCreery, which relates to network traffic monitoring, allegedly supplied this missing element by disclosing a system that captures raw packets, extracts information from packet data fields, and stores this information in data tables within a centralized database for subsequent analysis.
    • Motivation to Combine: A Person of Ordinary Skill in the Art (POSITA) would combine McCreery's well-known data storage and parsing techniques with Rhodes's anomaly detection system. This combination would predictably enhance Rhodes's system by allowing for more robust querying, processing, and off-line analysis of packet field data. Petitioner noted that Rhodes itself contemplated applying its methods to data from "network monitoring," which is precisely what McCreery described.
    • Expectation of Success: A POSITA would have had a high expectation of success because the combination involved applying a known data storage technique (from McCreery) to improve a similar network analysis system (Rhodes), a straightforward modification that would yield predictable benefits.

Ground 2: Claim 6 is obvious over Rhodes in view of McCreery and Lee

  • Prior Art Relied Upon: Rhodes, McCreery, and Lee (“Data Mining Approaches for Intrusion Detection,” a 1998 USENIX paper).
  • Core Argument for this Ground:
    • Prior Art Mapping: This ground built upon the IDS disclosed by the combination of Rhodes and McCreery. Petitioner argued that claim 6 added the limitation of a "weighted classifier" configured to weight anomalous correlations. The base combination resulted in a system that could classify anomalies based on a set threshold. Lee allegedly taught a method to improve classifier accuracy by using a rule-learning program (RIPPER) that associated "confidence information" with its rules. When input data violated a rule, Lee's system assigned a "score" that could be incremented based on the confidence level, effectively creating a "weighted classifier."
    • Motivation to Combine: A POSITA would be motivated to incorporate Lee’s confidence-based scoring into the Rhodes/McCreery IDS to improve classification accuracy and reduce false positives. This would be particularly useful in situations where detected activity only slightly exceeded a simple alarm threshold, allowing the system to make a more nuanced determination of whether the activity was truly anomalous.
    • Expectation of Success: The modification required applying a known technique (confidence-based classification) to address a known problem (false positives) in a similar system (anomaly detection), leading to a high expectation of success.

Ground 3: Claim 12 is obvious over Rhodes in view of McCreery and Wetherall

  • Prior Art Relied Upon: Rhodes, McCreery, and Wetherall (Patent 7,970,886).
  • Core Argument for this Ground:
    • Prior Art Mapping: This ground also built upon the Rhodes/McCreery IDS. Petitioner asserted that claim 12 added monitoring network traffic "destined for multiple target devices in multiple independent network domains." While the base combination described a single-network IDS, Wetherall allegedly disclosed a monitor/regulator system designed to observe and regulate network traffic sourced from or destined for multiple, independent network domains to protect against attacks.
    • Motivation to Combine: A POSITA would have been motivated to apply the IDS of Rhodes/McCreery to the multi-domain network architecture taught by Wetherall. This would create a more robust and scalable security system capable of providing intrusion detection across multiple networks, a logical and predictable extension of the base IDS technology. Wetherall itself contemplated integration with IDS features.
    • Expectation of Success: A POSITA would have expected success in this combination, as it involved applying an existing IDS to a broader, known network architecture to expand its protective reach, which was a well-understood engineering goal.

4. Key Claim Construction Positions

  • For the purposes of the inter partes review (IPR) proceeding only, Petitioner proposed adopting the claim constructions advanced by the Patent Owner in co-pending litigation.
  • This construction asserted that all claim terms should be given their plain and ordinary meaning, thereby preempting potential disputes over claim scope.

5. Arguments Regarding Discretionary Denial

  • Petitioner argued extensively that the Board should not exercise discretionary denial under 35 U.S.C. §314(a) based on the Fintiv factors.
  • Petitioner asserted that it was not a party to a previously filed IPR by Unified Patents and that the grounds presented in this petition were substantially different and non-overlapping.
  • The parallel district court litigation was argued to be in its infancy, with minimal investment by the court or the parties in the invalidity issues.
  • To further reduce any overlap, Petitioner stipulated that if the IPR were instituted, it would not pursue invalidity in the district court based on the same grounds or prior art combinations.
  • Petitioner contended that the strong merits of its unpatentability arguments weighed heavily in favor of institution.

6. Relief Requested

  • Petitioner requested the institution of an IPR and the cancellation of claims 1-12 of the ’846 patent as unpatentable.