Movatterモバイル変換


[0]ホーム

URL:


US20050050334A1 - Network traffic management by a virus/worm monitor in a distributed network - Google Patents

Network traffic management by a virus/worm monitor in a distributed network
Download PDF

Info

Publication number
US20050050334A1
US20050050334A1US10/683,579US68357903AUS2005050334A1US 20050050334 A1US20050050334 A1US 20050050334A1US 68357903 AUS68357903 AUS 68357903AUS 2005050334 A1US2005050334 A1US 2005050334A1
Authority
US
United States
Prior art keywords
virus
computer
worm
network
infected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/683,579
Inventor
Yung Liang
Yi Chen
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Trend Micro Inc
Original Assignee
Trend Micro Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Trend Micro IncfiledCriticalTrend Micro Inc
Priority to US10/683,579priorityCriticalpatent/US20050050334A1/en
Assigned to TREND MICRO INCORPORATEDreassignmentTREND MICRO INCORPORATEDASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: LIANG, YUNG CHANG, CHEN, YI FEN
Publication of US20050050334A1publicationCriticalpatent/US20050050334A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A network level virus monitoring system capable of monitoring a flow of network traffic in any of a number of inspection modes depending upon the particular needs of a system administrator. The system includes a network virus sensor self registration module coupled to a network virus/worm sensor arranged to automatically self register the associated network virus/worm sensor. The monitoring provides an early warning of a virus attack thereby facilitating quarantine procedures directed at containing a virus outbreak. By providing such an early warning, the network virus monitor reduces the number of computers ultimately affected by the virus attack resulting in a concomitant reduction in both the cost of repair to the system and the amount of downtime. In this way, the inventive network virus monitor provides a great improvement in system uptime and reduction in system losses.

Description

Claims (33)

US10/683,5792003-08-292003-10-09Network traffic management by a virus/worm monitor in a distributed networkAbandonedUS20050050334A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US10/683,579US20050050334A1 (en)2003-08-292003-10-09Network traffic management by a virus/worm monitor in a distributed network

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US48131303P2003-08-292003-08-29
US10/683,579US20050050334A1 (en)2003-08-292003-10-09Network traffic management by a virus/worm monitor in a distributed network

Publications (1)

Publication NumberPublication Date
US20050050334A1true US20050050334A1 (en)2005-03-03

Family

ID=34272450

Family Applications (8)

Application NumberTitlePriority DateFiling Date
US10/683,579AbandonedUS20050050334A1 (en)2003-08-292003-10-09Network traffic management by a virus/worm monitor in a distributed network
US10/683,584Active2025-12-24US7512808B2 (en)2003-08-292003-10-09Anti-computer viral agent suitable for innoculation of computing devices
US10/683,874AbandonedUS20050050337A1 (en)2003-08-292003-10-09Anti-virus security policy enforcement
US10/683,554Active2025-11-28US7287278B2 (en)2003-08-292003-10-09Innoculation of computing devices against a selected computer virus
US10/684,330Active2025-11-25US7523493B2 (en)2003-08-292003-10-09Virus monitor and methods of use thereof
US10/683,873Expired - LifetimeUS7386888B2 (en)2003-08-292003-10-09Network isolation techniques suitable for virus protection
US10/683,582Expired - LifetimeUS7565550B2 (en)2003-08-292003-10-09Automatic registration of a virus/worm monitor in a distributed network
US12/485,435Expired - Fee RelatedUS8291498B1 (en)2003-08-292009-06-16Computer virus detection and response in a wide area network

Family Applications After (7)

Application NumberTitlePriority DateFiling Date
US10/683,584Active2025-12-24US7512808B2 (en)2003-08-292003-10-09Anti-computer viral agent suitable for innoculation of computing devices
US10/683,874AbandonedUS20050050337A1 (en)2003-08-292003-10-09Anti-virus security policy enforcement
US10/683,554Active2025-11-28US7287278B2 (en)2003-08-292003-10-09Innoculation of computing devices against a selected computer virus
US10/684,330Active2025-11-25US7523493B2 (en)2003-08-292003-10-09Virus monitor and methods of use thereof
US10/683,873Expired - LifetimeUS7386888B2 (en)2003-08-292003-10-09Network isolation techniques suitable for virus protection
US10/683,582Expired - LifetimeUS7565550B2 (en)2003-08-292003-10-09Automatic registration of a virus/worm monitor in a distributed network
US12/485,435Expired - Fee RelatedUS8291498B1 (en)2003-08-292009-06-16Computer virus detection and response in a wide area network

Country Status (4)

CountryLink
US (8)US20050050334A1 (en)
CN (2)CN100530208C (en)
TW (2)TWI362206B (en)
WO (2)WO2005022441A2 (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050091538A1 (en)*2003-10-272005-04-28AlcatelMethod, a network protection means, a network node, a network, and a computer software product for disinfection
US20050120231A1 (en)*2003-12-012005-06-02Fujitsu LimitedMethod and system for controlling network connection, and computer product
US20060117387A1 (en)*2004-11-302006-06-01Gunsalus Bradley WPropagation protection of email within a network
US20060130142A1 (en)*2004-11-302006-06-15Mester Michael LPropagation protection within a network
US20060156405A1 (en)*2005-01-122006-07-13International Business Machines CorporationMethod and system for offloading real-time virus scanning during data transfer to storage peripherals
US20070056020A1 (en)*2005-09-072007-03-08Internet Security Systems, Inc.Automated deployment of protection agents to devices connected to a distributed computer network
WO2007107766A1 (en)*2006-03-222007-09-27British Telecommunications Public Limited CompanyMethod and apparatus for automated testing software
US20080127295A1 (en)*2006-11-282008-05-29Cisco Technology, IncMessaging security device
US20080144523A1 (en)*2006-12-142008-06-19Fujitsu LimitedTraffic Monitoring Apparatus, Entry Managing Apparatus, and Network System
WO2005117356A3 (en)*2004-05-242009-04-16Toshiba America Res IncQuarantine networking
US20090113548A1 (en)*2007-10-312009-04-30Bank Of America CorporationExecutable Download Tracking System
US20090138573A1 (en)*2005-04-222009-05-28Alexander Wade CampbellMethods and apparatus for blocking unwanted software downloads
US7571483B1 (en)*2005-08-252009-08-04Lockheed Martin CorporationSystem and method for reducing the vulnerability of a computer network to virus threats
US20090254984A1 (en)*2008-04-042009-10-08Microsoft CorporationHardware interface for enabling direct access and security assessment sharing
US20090265766A1 (en)*2008-04-172009-10-22Zeus Technology LimitedSupplying Web Pages
US20110184877A1 (en)*2010-01-262011-07-28Bank Of America CorporationInsider threat correlation tool
US20110185056A1 (en)*2010-01-262011-07-28Bank Of America CorporationInsider threat correlation tool
US8024473B1 (en)*2007-07-192011-09-20Mcafee, Inc.System, method, and computer program product to automate the flagging of obscure network flows as at least potentially unwanted
US20110289580A1 (en)*2009-02-192011-11-24Hiroaki OnumaNetwork security system and remote machine isolation method
US8544100B2 (en)2010-04-162013-09-24Bank Of America CorporationDetecting secure or encrypted tunneling in a computer network
CN103593616A (en)*2013-11-292014-02-19国网安徽省电力公司淮南供电公司System and method for preventing and controlling USB flash disk viruses in enterprise information network
US8782794B2 (en)2010-04-162014-07-15Bank Of America CorporationDetecting secure or encrypted tunneling in a computer network
US8793789B2 (en)2010-07-222014-07-29Bank Of America CorporationInsider threat correlation tool
US8800034B2 (en)2010-01-262014-08-05Bank Of America CorporationInsider threat correlation tool
WO2016160847A1 (en)*2015-04-032016-10-06Area 1 Security, Inc.Distribution of security rules among sensor computers
US10366129B2 (en)2015-12-042019-07-30Bank Of America CorporationData security threat control monitoring system
US10931706B2 (en)*2019-03-202021-02-23Booz Allen Hamilton Inc.System and method for detecting and identifying a cyber-attack on a network

Families Citing this family (457)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9219755B2 (en)1996-11-082015-12-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US7058822B2 (en)2000-03-302006-06-06Finjan Software, Ltd.Malicious mobile code runtime monitoring system and methods
US8079086B1 (en)1997-11-062011-12-13Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US8225408B2 (en)*1997-11-062012-07-17Finjan, Inc.Method and system for adaptive rule-based content scanners
US7975305B2 (en)*1997-11-062011-07-05Finjan, Inc.Method and system for adaptive rule-based content scanners for desktop computers
EP1540446A2 (en)2002-08-272005-06-15TD Security, Inc., dba Trust Digital, LLCEnterprise-wide security system for computer devices
AU2003279950A1 (en)*2002-10-102004-05-04Rocksteady Networks, Inc.System and method for providing access control
WO2004036371A2 (en)*2002-10-162004-04-29Rocksteady Networks, Inc.System and method for dynamic bandwidth provisioning
US7624438B2 (en)2003-08-202009-11-24Eric WhiteSystem and method for providing a secure connection between networked computers
US20050097199A1 (en)*2003-10-102005-05-05Keith WoodardMethod and system for scanning network devices
US20050086526A1 (en)*2003-10-172005-04-21Panda Software S.L. (Sociedad Unipersonal)Computer implemented method providing software virus infection information in real time
US7752320B2 (en)*2003-11-252010-07-06Avaya Inc.Method and apparatus for content based authentication for network access
FR2864411B1 (en)*2003-12-232006-03-03Cit Alcatel TERMINAL WITH MEANS OF PROTECTION AGAINST THE DYSFUNCTION OF CERTAIN JAVA APPLICATIONS
US8635661B2 (en)*2003-12-232014-01-21Mcafee, Inc.System and method for enforcing a security policy on mobile devices using dynamically generated security profiles
US7610624B1 (en)*2004-01-122009-10-27Novell, Inc.System and method for detecting and preventing attacks to a target computer system
US7756996B2 (en)*2004-01-302010-07-13Finjan, Inc.Embedding management data within HTTP messages
US20050177748A1 (en)*2004-02-102005-08-11Seiichi KatanoVirus protection for multi-function peripherals
US8166554B2 (en)2004-02-262012-04-24Vmware, Inc.Secure enterprise network
US9584522B2 (en)*2004-02-262017-02-28Vmware, Inc.Monitoring network traffic by using event log information
US8024779B2 (en)*2004-02-262011-09-20Packetmotion, Inc.Verifying user authentication
US8214875B2 (en)*2004-02-262012-07-03Vmware, Inc.Network security policy enforcement using application session information and object attributes
US7941827B2 (en)2004-02-262011-05-10Packetmotion, Inc.Monitoring network traffic by using a monitor device
US8543710B2 (en)*2004-03-102013-09-24Rpx CorporationMethod and system for controlling network access
US7610621B2 (en)2004-03-102009-10-27Eric WhiteSystem and method for behavior-based firewall modeling
US7665130B2 (en)*2004-03-102010-02-16Eric WhiteSystem and method for double-capture/double-redirect to a different location
US8782654B2 (en)2004-03-132014-07-15Adaptive Computing Enterprises, Inc.Co-allocating a reservation spanning different compute resources types
US9268607B2 (en)2004-03-132016-02-23Adaptive Computing Enterprises, Inc.System and method of providing a self-optimizing reservation in space of compute resources
US8561177B1 (en)2004-04-012013-10-15Fireeye, Inc.Systems and methods for detecting communication channels of bots
US8006305B2 (en)*2004-06-142011-08-23Fireeye, Inc.Computer worm defense system and method
US8539582B1 (en)2004-04-012013-09-17Fireeye, Inc.Malware containment and security analysis on connection
US8584239B2 (en)2004-04-012013-11-12Fireeye, Inc.Virtual machine with dynamic data flow analysis
US7587537B1 (en)2007-11-302009-09-08Altera CorporationSerializer-deserializer circuits formed from input-output circuit registers
US8898788B1 (en)2004-04-012014-11-25Fireeye, Inc.Systems and methods for malware attack prevention
US8549638B2 (en)*2004-06-142013-10-01Fireeye, Inc.System and method of containing computer worms
US8528086B1 (en)2004-04-012013-09-03Fireeye, Inc.System and method of detecting computer worms
US9106694B2 (en)2004-04-012015-08-11Fireeye, Inc.Electronic message analysis for malware detection
US9027135B1 (en)2004-04-012015-05-05Fireeye, Inc.Prospective client identification using malware attack detection
US8793787B2 (en)*2004-04-012014-07-29Fireeye, Inc.Detecting malicious network content using virtual environment components
US8881282B1 (en)2004-04-012014-11-04Fireeye, Inc.Systems and methods for malware attack detection and identification
US8204984B1 (en)2004-04-012012-06-19Fireeye, Inc.Systems and methods for detecting encrypted bot command and control communication channels
US8375444B2 (en)2006-04-202013-02-12Fireeye, Inc.Dynamic signature creation and enforcement
US8566946B1 (en)2006-04-202013-10-22Fireeye, Inc.Malware containment on connection
US8171553B2 (en)2004-04-012012-05-01Fireeye, Inc.Heuristic based capture with replay to virtual machine
US7822937B2 (en)*2004-05-032010-10-26Gateway, Inc.Method and apparatus for modifying reserve area of disk drive or memory
US8266670B1 (en)*2004-05-062012-09-11American Express Travel Related Services Company, Inc.System and method for dynamic security provisioning of data resources
US7827294B2 (en)2004-05-062010-11-02American Express Travel Related Services Company, Inc.System and method for dynamic security provisioning of computing resources
US8407792B2 (en)*2004-05-192013-03-26Ca, Inc.Systems and methods for computer security
US8042180B2 (en)*2004-05-212011-10-18Computer Associates Think, Inc.Intrusion detection based on amount of network traffic
US7620986B1 (en)*2004-06-142009-11-17Xangati, Inc.Defenses against software attacks in distributed computing environments
US20060005032A1 (en)*2004-06-152006-01-05Adam CainMethod and system for enabling trust-based authorization over a network
US7624445B2 (en)*2004-06-152009-11-24International Business Machines CorporationSystem for dynamic network reconfiguration and quarantine in response to threat conditions
US20070266388A1 (en)2004-06-182007-11-15Cluster Resources, Inc.System and method for providing advanced reservations in a compute environment
US7765594B1 (en)*2004-08-182010-07-27Symantec CorporationDynamic security deputization
US8176490B1 (en)2004-08-202012-05-08Adaptive Computing Enterprises, Inc.System and method of interfacing a workload manager and scheduler with an identity manager
US8214901B2 (en)*2004-09-172012-07-03Sri InternationalMethod and apparatus for combating malicious code
US8234705B1 (en)*2004-09-272012-07-31Radix Holdings, LlcContagion isolation and inoculation
US7849506B1 (en)*2004-10-122010-12-07Avaya Inc.Switching device, method, and computer program for efficient intrusion detection
US8032937B2 (en)*2004-10-262011-10-04The Mitre CorporationMethod, apparatus, and computer program product for detecting computer worms in a network
US8271980B2 (en)2004-11-082012-09-18Adaptive Computing Enterprises, Inc.System and method of providing system jobs within a compute environment
US20060101277A1 (en)*2004-11-102006-05-11Meenan Patrick ADetecting and remedying unauthorized computer programs
US20060117385A1 (en)*2004-11-302006-06-01Mester Michael LMonitoring propagation protection within a network
US7464118B2 (en)*2004-12-032008-12-09International Business Machines CorporationAlgorithm for maximizing application availability during automated enterprise deployments
US7716660B2 (en)*2004-12-142010-05-11Microsoft CorporationMethod and system for downloading updates
US7810158B2 (en)*2004-12-162010-10-05At&T Intellectual Property I, L.P.Methods and systems for deceptively trapping electronic worms
US20060156399A1 (en)*2004-12-302006-07-13Parmar Pankaj NSystem and method for implementing network security using a sequestered partition
US7310669B2 (en)*2005-01-192007-12-18Lockdown Networks, Inc.Network appliance for vulnerability assessment auditing over multiple networks
US20060164199A1 (en)*2005-01-262006-07-27Lockdown Networks, Inc.Network appliance for securely quarantining a node on a network
US8520512B2 (en)*2005-01-262013-08-27Mcafee, Inc.Network appliance for customizable quarantining of a node on a network
US7810138B2 (en)2005-01-262010-10-05Mcafee, Inc.Enabling dynamic authentication with different protocols on the same port for a switch
US8565726B2 (en)*2008-11-062013-10-22Mcafee, Inc.System, method and device for mediating connections between policy source servers, corporate repositories, and mobile devices
US8495700B2 (en)*2005-02-282013-07-23Mcafee, Inc.Mobile data security system and methods
US8863143B2 (en)2006-03-162014-10-14Adaptive Computing Enterprises, Inc.System and method for managing a hybrid compute environment
US9075657B2 (en)2005-04-072015-07-07Adaptive Computing Enterprises, Inc.On-demand access to compute resources
US8930536B2 (en)2005-03-162015-01-06Adaptive Computing Enterprises, Inc.Virtual private cluster
US9231886B2 (en)2005-03-162016-01-05Adaptive Computing Enterprises, Inc.Simple integration of an on-demand compute environment
US7739682B1 (en)2005-03-242010-06-15The Weather Channel, Inc.Systems and methods for selectively blocking application installation
US8359645B2 (en)*2005-03-252013-01-22Microsoft CorporationDynamic protection of unpatched machines
US8516583B2 (en)2005-03-312013-08-20Microsoft CorporationAggregating the knowledge base of computer systems to proactively protect a computer from malware
US7647621B2 (en)*2005-04-222010-01-12Mcafee, Inc.System, method and computer program product for applying electronic policies
US8161554B2 (en)*2005-04-262012-04-17Cisco Technology, Inc.System and method for detection and mitigation of network worms
US7860006B1 (en)*2005-04-272010-12-28Extreme Networks, Inc.Integrated methods of performing network switch functions
US20060256730A1 (en)*2005-05-122006-11-16Compton Richard AIntelligent quarantine device
US20060259967A1 (en)*2005-05-132006-11-16Microsoft CorporationProactively protecting computers in a networking environment from malware
US20060282525A1 (en)*2005-06-102006-12-14Giles James RMethod and apparatus for delegating responses to conditions in computing systems
FR2887385B1 (en)*2005-06-152007-10-05Advestigo Sa METHOD AND SYSTEM FOR REPORTING AND FILTERING MULTIMEDIA INFORMATION ON A NETWORK
CN100401224C (en)*2005-06-232008-07-09福建东方微点信息安全有限责任公司Computer anti-virus protection system and method
US7877803B2 (en)*2005-06-272011-01-25Hewlett-Packard Development Company, L.P.Automated immune response for a computer
GB0513375D0 (en)2005-06-302005-08-03Retento LtdComputer security
US9705911B2 (en)*2005-06-302017-07-11Nokia Technologies OySystem and method for using quarantine networks to protect cellular networks from viruses and worms
US20070011732A1 (en)*2005-07-052007-01-11Yang-Hung PengNetwork device for secure packet dispatching via port isolation
US8028337B1 (en)*2005-08-302011-09-27Sprint Communications Company L.P.Profile-aware filtering of network traffic
US7636946B2 (en)*2005-08-312009-12-22Microsoft CorporationUnwanted file modification and transactions
US9191396B2 (en)*2005-09-082015-11-17International Business Machines CorporationIdentifying source of malicious network messages
EP1936892A4 (en)*2005-10-152009-02-11Huawei Tech Co LtdA system for controlling the security of network and a method thereof
JP4546382B2 (en)*2005-10-262010-09-15株式会社日立製作所 Device quarantine method and device quarantine system
US20070101422A1 (en)*2005-10-312007-05-03Carpenter Michael AAutomated network blocking method and system
US8291093B2 (en)2005-12-082012-10-16Microsoft CorporationPeer-to-peer remediation
US8255996B2 (en)2005-12-302012-08-28Extreme Networks, Inc.Network threat detection and mitigation
US7757269B1 (en)2006-02-022010-07-13Mcafee, Inc.Enforcing alignment of approved changes and deployed changes in the software change life-cycle
WO2007099507A2 (en)*2006-03-022007-09-07International Business Machines CorporationOperating a network monitoring entity
JP2007241712A (en)*2006-03-092007-09-20Fujitsu Ltd Security server monitoring device and load balancing system
JP5087850B2 (en)*2006-03-142012-12-05富士通株式会社 Service mediation method, service mediation device, and service mediation system
US8424088B1 (en)*2006-03-142013-04-16Symantec CorporationBarricading a computer system when installing or migrating software
JP2007249579A (en)*2006-03-152007-09-27Fujitsu Ltd Worm countermeasure parameter determination program, worm countermeasure parameter determination apparatus, node number determination program, node number determination apparatus, and node number restriction system
US8443446B2 (en)*2006-03-272013-05-14Telecom Italia S.P.A.Method and system for identifying malicious messages in mobile communication networks, related network and computer program product therefor
US7895573B1 (en)2006-03-272011-02-22Mcafee, Inc.Execution environment file inventory
JP5144075B2 (en)*2006-03-302013-02-13日本碍子株式会社 Honeycomb structure and manufacturing method thereof
US7873999B1 (en)*2006-03-312011-01-18Symantec CorporationCustomized alerting of users to probable data theft
US8191145B2 (en)*2006-04-272012-05-29The Invention Science Fund I, LlcVirus immunization using prioritized routing
US8151353B2 (en)2006-04-272012-04-03The Invention Science Fund I, LlcMulti-network virus immunization with trust aspects
US7849508B2 (en)*2006-04-272010-12-07The Invention Science Fund I, LlcVirus immunization using entity-sponsored bypass network
US9258327B2 (en)2006-04-272016-02-09Invention Science Fund I, LlcMulti-network virus immunization
US8117654B2 (en)*2006-06-302012-02-14The Invention Science Fund I, LlcImplementation of malware countermeasures in a network device
US7917956B2 (en)*2006-04-272011-03-29The Invention Science Fund I, LlcMulti-network virus immunization
US7934260B2 (en)2006-04-272011-04-26The Invention Science Fund I, LlcVirus immunization using entity-sponsored bypass network
US8613095B2 (en)*2006-06-302013-12-17The Invention Science Fund I, LlcSmart distribution of a malware countermeasure
US8863285B2 (en)*2006-04-272014-10-14The Invention Science Fund I, LlcVirus immunization using prioritized routing
US8966630B2 (en)*2006-04-272015-02-24The Invention Science Fund I, LlcGenerating and distributing a malware countermeasure
US8539581B2 (en)*2006-04-272013-09-17The Invention Science Fund I, LlcEfficient distribution of a malware countermeasure
US7895657B2 (en)*2006-05-052011-02-22Broadcom CorporationSwitching network employing virus detection
US7751397B2 (en)2006-05-052010-07-06Broadcom CorporationSwitching network employing a user challenge mechanism to counter denial of service attacks
US7596137B2 (en)*2006-05-052009-09-29Broadcom CorporationPacket routing and vectoring based on payload comparison with spatially related templates
US7948977B2 (en)*2006-05-052011-05-24Broadcom CorporationPacket routing with payload analysis, encapsulation and service module vectoring
US20070258437A1 (en)*2006-05-052007-11-08Broadcom Corporation, A California CorporationSwitching network employing server quarantine functionality
US8223965B2 (en)2006-05-052012-07-17Broadcom CorporationSwitching network supporting media rights management
US7735139B1 (en)*2006-05-172010-06-08Trend Micro IncorporatedIn-line scanning of network data in an asymmetric routing environment
US8316439B2 (en)*2006-05-192012-11-20Iyuko Services L.L.C.Anti-virus and firewall system
US8151337B2 (en)*2006-06-302012-04-03Microsoft CorporationApplying firewalls to virtualized environments
US8230505B1 (en)2006-08-112012-07-24Avaya Inc.Method for cooperative intrusion prevention through collaborative inference
US8136162B2 (en)*2006-08-312012-03-13Broadcom CorporationIntelligent network interface controller
US8259568B2 (en)2006-10-232012-09-04Mcafee, Inc.System and method for controlling mobile device access to a network
JP4931553B2 (en)*2006-10-312012-05-16富士通株式会社 Network connection device
CA2706721C (en)*2006-11-272016-05-31Smobile Systems, Inc.Wireless intrusion prevention system and method
US8091134B2 (en)*2006-11-292012-01-03Lenovo (Singapore) Pte. Ltd.System and method for autonomic peer-to-peer virus inoculation
US8250657B1 (en)2006-12-292012-08-21Symantec CorporationWeb site hygiene-based computer security
US8312536B2 (en)2006-12-292012-11-13Symantec CorporationHygiene-based computer security
US8332929B1 (en)2007-01-102012-12-11Mcafee, Inc.Method and apparatus for process enforced configuration management
US20080196103A1 (en)*2007-02-092008-08-14Chao-Yu LinMethod for analyzing abnormal network behaviors and isolating computer virus attacks
CN101022459B (en)*2007-03-052010-05-26华为技术有限公司 System and method for preventing virus from invading network
US20080222729A1 (en)*2007-03-052008-09-11Songqing ChenContainment of Unknown and Polymorphic Fast Spreading Worms
US8310923B1 (en)2007-03-272012-11-13Amazon Technologies, Inc.Monitoring a network site to detect adverse network conditions
US8429749B2 (en)*2007-03-272013-04-23National Institute Of Advanced Industrial Science And TechnologyPacket data comparator as well as virus filter, virus checker and network system using the same
US7831537B2 (en)*2007-04-052010-11-09International Business Machines CorporationSystem and method of adaptive generation of problem determination decision procedures
US20080295153A1 (en)*2007-05-242008-11-27Zhidan ChengSystem and method for detection and communication of computer infection status in a networked environment
US9961094B1 (en)2007-07-252018-05-01Xangati, IncSymptom detection using behavior probability density, network monitoring of multiple observation value types, and network monitoring using orthogonal profiling dimensions
US8451731B1 (en)2007-07-252013-05-28Xangati, Inc.Network monitoring using virtual packets
US8639797B1 (en)2007-08-032014-01-28Xangati, Inc.Network monitoring of behavior probability density
US8271642B1 (en)*2007-08-292012-09-18Mcafee, Inc.System, method, and computer program product for isolating a device associated with at least potential data leakage activity, based on user input
US8041773B2 (en)2007-09-242011-10-18The Research Foundation Of State University Of New YorkAutomatic clustering for self-organizing grids
US8019689B1 (en)2007-09-272011-09-13Symantec CorporationDeriving reputation scores for web sites that accept personally identifiable information
US8646081B1 (en)*2007-10-152014-02-04Sprint Communications Company L.P.Method and system to detect a security event in a packet flow and block the packet flow at an egress point in a communication network
US20090228963A1 (en)*2007-11-262009-09-10Nortel Networks LimitedContext-based network security
CN101946466B (en)*2007-12-212015-01-28英特尔公司Peer-to-peer streaming and API services for plural applications
TWI406151B (en)*2008-02-272013-08-21Asustek Comp IncAntivirus protection method and electronic device with antivirus protection
US8499063B1 (en)2008-03-312013-07-30Symantec CorporationUninstall and system performance based software application reputation
US8341740B2 (en)*2008-05-212012-12-25Alcatel LucentMethod and system for identifying enterprise network hosts infected with slow and/or distributed scanning malware
US8887249B1 (en)*2008-05-282014-11-11Zscaler, Inc.Protecting against denial of service attacks using guard tables
US8938806B1 (en)2008-06-262015-01-20Emc CorporationPartial pattern detection with commonality factoring
US8595282B2 (en)*2008-06-302013-11-26Symantec CorporationSimplified communication of a reputation score for an entity
US8312539B1 (en)2008-07-112012-11-13Symantec CorporationUser-assisted security system
CN101340680B (en)*2008-08-122012-01-04华为终端有限公司Method and apparatus for implementing virus defending and virus killing by bi-core terminal
US8826443B1 (en)*2008-09-182014-09-02Symantec CorporationSelective removal of protected content from web requests sent to an interactive website
US8413251B1 (en)2008-09-302013-04-02Symantec CorporationUsing disposable data misuse to determine reputation
US8799450B2 (en)2008-10-142014-08-05Mcafee, Inc.Server-based system, method, and computer program product for scanning data on a client using only a subset of the data
US8463730B1 (en)*2008-10-242013-06-11Vmware, Inc.Rapid evaluation of numerically large complex rules governing network and application transactions
US9559800B1 (en)2008-10-242017-01-31Vmware, Inc.Dynamic packet filtering
US8850571B2 (en)2008-11-032014-09-30Fireeye, Inc.Systems and methods for detecting malicious network content
US8997219B2 (en)2008-11-032015-03-31Fireeye, Inc.Systems and methods for detecting malicious PDF network content
US20100198909A1 (en)*2009-02-032010-08-05Fluke CorporationMethod and apparatus for the continuous collection and correlation of application transactions across all tiers of an n-tier application
US8904520B1 (en)2009-03-192014-12-02Symantec CorporationCommunication-based reputation system
US8826424B2 (en)*2009-03-272014-09-02Sophos LimitedRun-time additive disinfection of malware functions
US8381289B1 (en)2009-03-312013-02-19Symantec CorporationCommunication-based host reputation system
US10992555B2 (en)2009-05-292021-04-27Virtual Instruments Worldwide, Inc.Recording, replay, and sharing of live network monitoring views
EP2278513A1 (en)*2009-07-152011-01-26Nagravision SAMethod for preventing the use of a cloned user unit communicating with a server
WO2011027352A1 (en)*2009-09-032011-03-10Mcafee, Inc.Network access control
US9077654B2 (en)2009-10-302015-07-07Iii Holdings 2, LlcSystem and method for data center security enhancements leveraging managed server SOCs
US9054990B2 (en)2009-10-302015-06-09Iii Holdings 2, LlcSystem and method for data center security enhancements leveraging server SOCs or server fabrics
US9876735B2 (en)2009-10-302018-01-23Iii Holdings 2, LlcPerformance and power optimized computer system architectures and methods leveraging power optimized tree fabric interconnect
US8599863B2 (en)2009-10-302013-12-03Calxeda, Inc.System and method for using a multi-protocol fabric module across a distributed server interconnect fabric
US9069929B2 (en)2011-10-312015-06-30Iii Holdings 2, LlcArbitrating usage of serial port in node card of scalable and modular servers
US9465771B2 (en)2009-09-242016-10-11Iii Holdings 2, LlcServer on a chip and node cards comprising one or more of same
US20130107444A1 (en)2011-10-282013-05-02Calxeda, Inc.System and method for flexible storage and networking provisioning in large scalable processor installations
US20110103391A1 (en)2009-10-302011-05-05Smooth-Stone, Inc. C/O Barry EvansSystem and method for high-performance, low-power data center interconnect fabric
US8832829B2 (en)2009-09-302014-09-09Fireeye, Inc.Network-based binary file extraction and analysis for malware detection
US11720290B2 (en)2009-10-302023-08-08Iii Holdings 2, LlcMemcached server functionality in a cluster of data processing nodes
US10877695B2 (en)2009-10-302020-12-29Iii Holdings 2, LlcMemcached server functionality in a cluster of data processing nodes
US9648102B1 (en)2012-12-272017-05-09Iii Holdings 2, LlcMemcached server functionality in a cluster of data processing nodes
US20110107422A1 (en)*2009-10-302011-05-05Patrick Choy Ming WongEmail worm detection methods and devices
US9311269B2 (en)2009-10-302016-04-12Iii Holdings 2, LlcNetwork proxy for high-performance, low-power data center interconnect fabric
US9680770B2 (en)2009-10-302017-06-13Iii Holdings 2, LlcSystem and method for using a multi-protocol fabric module across a distributed server interconnect fabric
US20110138469A1 (en)*2009-12-032011-06-09Recursion Software, Inc.System and method for resolving vulnerabilities in a computer network
US20110141967A1 (en)*2009-12-142011-06-16Lane Sean LMethods and apparatus related to substantially real-time data transmission and analysis for sensors
US8438270B2 (en)2010-01-262013-05-07Tenable Network Security, Inc.System and method for correlating network identities and addresses
US8302198B2 (en)2010-01-282012-10-30Tenable Network Security, Inc.System and method for enabling remote registry service security audits
US8341745B1 (en)2010-02-222012-12-25Symantec CorporationInferring file and website reputations by belief propagation leveraging machine reputation
US8707440B2 (en)*2010-03-222014-04-22Tenable Network Security, Inc.System and method for passively identifying encrypted and interactive network sessions
US10210162B1 (en)2010-03-292019-02-19Carbonite, Inc.Log file management
US8935384B2 (en)2010-05-062015-01-13Mcafee Inc.Distributed data revocation using data commands
US8510836B1 (en)2010-07-062013-08-13Symantec CorporationLineage-based reputation system
US8938800B2 (en)*2010-07-282015-01-20Mcafee, Inc.System and method for network level protection against malicious software
TWI414166B (en)*2010-08-202013-11-01Cybertan Technology Inc An asynchronous scanning method and device for a network device
US8732797B2 (en)*2010-08-312014-05-20Microsoft CorporationHost usability and security via an isolated environment
JP5712562B2 (en)*2010-10-292015-05-07セイコーエプソン株式会社 Content output system, content server, and content output method
TWI435235B (en)2010-11-042014-04-21Inst Information IndustryComputer worm curing system and method and computer readable storage medium for storing computer worm curing system and method
US9064116B2 (en)*2010-11-082015-06-23Intel CorporationTechniques for security management provisioning at a data storage device
CN102004877B (en)*2010-11-192013-01-23珠海市君天电子科技有限公司Method for monitoring source of computer virus
US8806638B1 (en)*2010-12-102014-08-12Symantec CorporationSystems and methods for protecting networks from infected computing devices
US9112830B2 (en)2011-02-232015-08-18Mcafee, Inc.System and method for interlocking a host and a gateway
KR101215326B1 (en)*2011-04-132012-12-26한국전자통신연구원Apparatus and method for defending distributed denial of service attack of mobile terminal
US20120311710A1 (en)*2011-06-032012-12-06Voodoosoft Holdings, LlcComputer program, method, and system for preventing execution of viruses and malware
US9594881B2 (en)2011-09-092017-03-14Mcafee, Inc.System and method for passive threat detection using virtual memory inspection
US20130074181A1 (en)*2011-09-192013-03-21Cisco Technology, Inc.Auto Migration of Services Within a Virtual Data Center
US8677472B1 (en)*2011-09-272014-03-18Emc CorporationMulti-point collection of behavioral data relating to a virtualized browsing session with a secure server
US8726385B2 (en)*2011-10-052014-05-13Mcafee, Inc.Distributed system and method for tracking and blocking malicious internet hosts
US8713668B2 (en)2011-10-172014-04-29Mcafee, Inc.System and method for redirected firewall discovery in a network environment
KR101252787B1 (en)*2011-12-062013-04-09이청종Security management system with multiple gateway servers and method thereof
IL217279A0 (en)2011-12-292012-02-29Israel RagutskiMethod and system for ensuring authenticity of ip data served by a service provider
US8776235B2 (en)*2012-01-102014-07-08International Business Machines CorporationStorage device with internalized anti-virus protection
US8683598B1 (en)*2012-02-022014-03-25Symantec CorporationMechanism to evaluate the security posture of a computer system
US9032520B2 (en)2012-02-222015-05-12iScanOnline, Inc.Remote security self-assessment framework
US9367707B2 (en)2012-02-232016-06-14Tenable Network Security, Inc.System and method for using file hashes to track data leakage and document propagation in a network
US9519782B2 (en)2012-02-242016-12-13Fireeye, Inc.Detecting malicious network content
US8826429B2 (en)2012-04-022014-09-02The Boeing CompanyInformation security management
IL219499B (en)2012-04-302019-02-28Verint Systems LtdSystem and method for malware detection
US9055090B2 (en)*2012-06-122015-06-09Verizon Patent And Licensing Inc.Network based device security and controls
US9715325B1 (en)2012-06-212017-07-25Open Text CorporationActivity stream based interaction
CN103124259B (en)*2012-06-272016-05-25上海感信信息科技股份有限公司A kind of rete mirabile information interactive device and exchange method thereof
US9124472B1 (en)2012-07-252015-09-01Symantec CorporationProviding file information to a client responsive to a file download stability prediction
WO2014033894A1 (en)*2012-08-312014-03-06株式会社日立製作所Method for monitoring service performance
CN103780589A (en)*2012-10-242014-05-07腾讯科技(深圳)有限公司Virus prompting method, client-terminal device and server
US8973146B2 (en)2012-12-272015-03-03Mcafee, Inc.Herd based scan avoidance system in a network environment
US10572665B2 (en)2012-12-282020-02-25Fireeye, Inc.System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
US9525700B1 (en)2013-01-252016-12-20REMTCS Inc.System and method for detecting malicious activity and harmful hardware/software modifications to a vehicle
US9332028B2 (en)2013-01-252016-05-03REMTCS Inc.System, method, and apparatus for providing network security
IL224482B (en)2013-01-292018-08-30Verint Systems LtdSystem and method for keyword spotting using representative dictionary
US9159035B1 (en)2013-02-232015-10-13Fireeye, Inc.Framework for computer application analysis of sensitive information tracking
US8990944B1 (en)2013-02-232015-03-24Fireeye, Inc.Systems and methods for automatically detecting backdoors
US9824209B1 (en)2013-02-232017-11-21Fireeye, Inc.Framework for efficient security coverage of mobile software applications that is usable to harden in the field code
US9367681B1 (en)2013-02-232016-06-14Fireeye, Inc.Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
US9009822B1 (en)2013-02-232015-04-14Fireeye, Inc.Framework for multi-phase analysis of mobile applications
US9176843B1 (en)2013-02-232015-11-03Fireeye, Inc.Framework for efficient security coverage of mobile software applications
US9195829B1 (en)2013-02-232015-11-24Fireeye, Inc.User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US9009823B1 (en)2013-02-232015-04-14Fireeye, Inc.Framework for efficient security coverage of mobile software applications installed on mobile devices
US9565202B1 (en)2013-03-132017-02-07Fireeye, Inc.System and method for detecting exfiltration content
US9355247B1 (en)2013-03-132016-05-31Fireeye, Inc.File extraction from memory dump for malicious content analysis
US9626509B1 (en)2013-03-132017-04-18Fireeye, Inc.Malicious content analysis with multi-version application support within single operating environment
US9104867B1 (en)2013-03-132015-08-11Fireeye, Inc.Malicious content analysis using simulated user interaction without user involvement
US10649970B1 (en)*2013-03-142020-05-12Invincea, Inc.Methods and apparatus for detection of functionality
US9311479B1 (en)2013-03-142016-04-12Fireeye, Inc.Correlation and consolidation of analytic data for holistic view of a malware attack
US9430646B1 (en)2013-03-142016-08-30Fireeye, Inc.Distributed systems and methods for automatically detecting unknown bots and botnets
US9251343B1 (en)2013-03-152016-02-02Fireeye, Inc.Detecting bootkits resident on compromised computers
WO2014149827A1 (en)*2013-03-152014-09-25REMTCS Inc.Artificial neural network interface and methods of training the same for various use cases
US10713358B2 (en)2013-03-152020-07-14Fireeye, Inc.System and method to extract and utilize disassembly features to classify software intent
US9501645B2 (en)*2013-03-152016-11-22Rudolf H. HendelSystem and method for the protection of computers and computer networks against cyber threats
WO2014145805A1 (en)2013-03-152014-09-18Mandiant, LlcSystem and method employing structured intelligence to verify and contain threats at endpoints
US9495180B2 (en)2013-05-102016-11-15Fireeye, Inc.Optimized resource allocation for virtual machines within a malware content detection system
US9635039B1 (en)2013-05-132017-04-25Fireeye, Inc.Classifying sets of malicious indicators for detecting command and control communications associated with malware
IL226747B (en)2013-06-042019-01-31Verint Systems LtdSystem and method for malware detection learning
US9536091B2 (en)2013-06-242017-01-03Fireeye, Inc.System and method for detecting time-bomb malware
US10133863B2 (en)2013-06-242018-11-20Fireeye, Inc.Zero-day discovery system
US9300686B2 (en)2013-06-282016-03-29Fireeye, Inc.System and method for detecting malicious links in electronic messages
US9888016B1 (en)2013-06-282018-02-06Fireeye, Inc.System and method for detecting phishing using password prediction
US8955138B1 (en)*2013-07-112015-02-10Symantec CorporationSystems and methods for reevaluating apparently benign behavior on computing devices
US9456003B2 (en)2013-07-242016-09-27At&T Intellectual Property I, L.P.Decoupling hardware and software components of network security devices to provide security software as a service in a distributed computing environment
WO2015021210A1 (en)*2013-08-062015-02-12Medknex Software, LlcSystem and methods for protecting and using digital data
CN105474225B (en)*2013-08-142019-05-14慧与发展有限责任合伙企业Computing resource is monitored automatically in data center based on cloud
US9690936B1 (en)2013-09-302017-06-27Fireeye, Inc.Multistage system and method for analyzing obfuscated content for malware
US9294501B2 (en)2013-09-302016-03-22Fireeye, Inc.Fuzzy hash of behavioral results
US10089461B1 (en)2013-09-302018-10-02Fireeye, Inc.Page replacement code injection
US9628507B2 (en)2013-09-302017-04-18Fireeye, Inc.Advanced persistent threat (APT) detection center
US9736179B2 (en)2013-09-302017-08-15Fireeye, Inc.System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
US9171160B2 (en)2013-09-302015-10-27Fireeye, Inc.Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US10515214B1 (en)2013-09-302019-12-24Fireeye, Inc.System and method for classifying malware within content created during analysis of a specimen
US10192052B1 (en)2013-09-302019-01-29Fireeye, Inc.System, apparatus and method for classifying a file as malicious using static scanning
US10075460B2 (en)2013-10-162018-09-11REMTCS Inc.Power grid universal detection and countermeasure overlay intelligence ultra-low latency hypervisor
WO2015060857A1 (en)2013-10-242015-04-30Mcafee, Inc.Agent assisted malicious application blocking in a network environment
US9094450B2 (en)2013-11-012015-07-28Xerox CorporationMethod and apparatus for a centrally managed network virus detection and outbreak protection
US9921978B1 (en)2013-11-082018-03-20Fireeye, Inc.System and method for enhanced security of storage devices
US9189627B1 (en)2013-11-212015-11-17Fireeye, Inc.System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
CN103929413A (en)*2013-12-162014-07-16汉柏科技有限公司Method and device for preventing cloud network from being attacked
US9703974B1 (en)*2013-12-202017-07-11Amazon Technologies, Inc.Coordinated file system security via rules
US9747446B1 (en)2013-12-262017-08-29Fireeye, Inc.System and method for run-time object classification
US9756074B2 (en)2013-12-262017-09-05Fireeye, Inc.System and method for IPS and VM-based detection of suspicious objects
US9292686B2 (en)2014-01-162016-03-22Fireeye, Inc.Micro-virtualization architecture for threat-aware microvisor deployment in a node of a network environment
US9262635B2 (en)2014-02-052016-02-16Fireeye, Inc.Detection efficacy of virtual machine-based analysis with application specific events
US9241010B1 (en)2014-03-202016-01-19Fireeye, Inc.System and method for network behavior detection
US10242185B1 (en)2014-03-212019-03-26Fireeye, Inc.Dynamic guest image creation and rollback
US9591015B1 (en)2014-03-282017-03-07Fireeye, Inc.System and method for offloading packet processing and static analysis operations
US9432389B1 (en)2014-03-312016-08-30Fireeye, Inc.System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US9223972B1 (en)2014-03-312015-12-29Fireeye, Inc.Dynamically remote tuning of a malware content detection system
US9088508B1 (en)*2014-04-112015-07-21Level 3 Communications, LlcIncremental application of resources to network traffic flows based on heuristics and business policies
US9940459B1 (en)2014-05-192018-04-10Invincea, Inc.Methods and devices for detection of malware
US9594912B1 (en)2014-06-062017-03-14Fireeye, Inc.Return-oriented programming detection
US9973531B1 (en)2014-06-062018-05-15Fireeye, Inc.Shellcode detection
US9438623B1 (en)2014-06-062016-09-06Fireeye, Inc.Computer exploit detection using heap spray pattern matching
US10686759B2 (en)2014-06-222020-06-16Webroot, Inc.Network threat prediction and blocking
US10084813B2 (en)2014-06-242018-09-25Fireeye, Inc.Intrusion prevention and remedy system
US10805340B1 (en)2014-06-262020-10-13Fireeye, Inc.Infection vector and malware tracking with an interactive user display
US9398028B1 (en)2014-06-262016-07-19Fireeye, Inc.System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
US10002252B2 (en)2014-07-012018-06-19Fireeye, Inc.Verification of trusted threat-aware microvisor
US10721267B1 (en)*2014-07-182020-07-21NortonLifeLock Inc.Systems and methods for detecting system attacks
IL233776B (en)2014-07-242019-02-28Verint Systems LtdSystem and method for range matching
US9363280B1 (en)2014-08-222016-06-07Fireeye, Inc.System and method of detecting delivery of malware using cross-customer data
US10162969B2 (en)*2014-09-102018-12-25Honeywell International Inc.Dynamic quantification of cyber-security risks in a control system
US10671726B1 (en)2014-09-222020-06-02Fireeye Inc.System and method for malware analysis using thread-level event monitoring
US9773112B1 (en)2014-09-292017-09-26Fireeye, Inc.Exploit detection of malware and malware families
US10027689B1 (en)2014-09-292018-07-17Fireeye, Inc.Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
US9690933B1 (en)2014-12-222017-06-27Fireeye, Inc.Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US10075455B2 (en)2014-12-262018-09-11Fireeye, Inc.Zero-day rotating guest image profile
US9934376B1 (en)2014-12-292018-04-03Fireeye, Inc.Malware detection appliance architecture
US9838417B1 (en)2014-12-302017-12-05Fireeye, Inc.Intelligent context aware user interaction for malware detection
US10560842B2 (en)2015-01-282020-02-11Verint Systems Ltd.System and method for combined network-side and off-air monitoring of wireless networks
US9690606B1 (en)2015-03-252017-06-27Fireeye, Inc.Selective system call monitoring
US10148693B2 (en)2015-03-252018-12-04Fireeye, Inc.Exploit detection system
IL238001B (en)2015-03-292020-05-31Verint Systems LtdSystem and method for identifying communication session participants based on traffic patterns
US9438613B1 (en)2015-03-302016-09-06Fireeye, Inc.Dynamic content activation for automated analysis of embedded objects
US9654496B1 (en)*2015-03-312017-05-16Juniper Networks, Inc.Obtaining suspect objects based on detecting suspicious activity
US9483644B1 (en)2015-03-312016-11-01Fireeye, Inc.Methods for detecting file altering malware in VM based analysis
US10474813B1 (en)2015-03-312019-11-12Fireeye, Inc.Code injection technique for remediation at an endpoint of a network
US10417031B2 (en)2015-03-312019-09-17Fireeye, Inc.Selective virtualization for security threat detection
CN104809394B (en)*2015-04-082017-04-05北京奇虎科技有限公司Method, device and terminal for searching and killing viruses
US9654485B1 (en)2015-04-132017-05-16Fireeye, Inc.Analytics-based security monitoring system and method
US10230740B2 (en)*2015-04-212019-03-12Cujo LLCNetwork security analysis for smart appliances
US10135633B2 (en)*2015-04-212018-11-20Cujo LLCNetwork security analysis for smart appliances
US9781131B2 (en)*2015-04-222017-10-03Aktiebolaget SkfSystems and methods for securing remote configuration
US9594904B1 (en)2015-04-232017-03-14Fireeye, Inc.Detecting malware based on reflection
US10395133B1 (en)2015-05-082019-08-27Open Text CorporationImage box filtering for optical character recognition
US10599844B2 (en)2015-05-122020-03-24Webroot, Inc.Automatic threat detection of executable files based on static data analysis
US10102073B2 (en)*2015-05-202018-10-16Dell Products, L.P.Systems and methods for providing automatic system stop and boot-to-service OS for forensics analysis
US10142353B2 (en)2015-06-052018-11-27Cisco Technology, Inc.System for monitoring and managing datacenters
US10536357B2 (en)2015-06-052020-01-14Cisco Technology, Inc.Late data detection in data center
US10033766B2 (en)*2015-06-052018-07-24Cisco Technology, Inc.Policy-driven compliance
US10726127B1 (en)2015-06-302020-07-28Fireeye, Inc.System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US11113086B1 (en)2015-06-302021-09-07Fireeye, Inc.Virtual system and method for securing external network connectivity
US10289686B1 (en)2015-06-302019-05-14Open Text CorporationMethod and system for using dynamic content types
US10642753B1 (en)2015-06-302020-05-05Fireeye, Inc.System and method for protecting a software component running in virtual machine using a virtualization layer
US10454950B1 (en)2015-06-302019-10-22Fireeye, Inc.Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US9690938B1 (en)2015-08-052017-06-27Invincea, Inc.Methods and apparatus for machine learning based malware detection
US10715542B1 (en)2015-08-142020-07-14Fireeye, Inc.Mobile application risk analysis
SG10201507051WA (en)*2015-09-032017-04-27Certis Cisco Security Pte LtdSystem and method for high frequency heuristic data acquisition and analytics of information security events
US10176321B2 (en)2015-09-222019-01-08Fireeye, Inc.Leveraging behavior-based rules for malware family classification
US10033747B1 (en)2015-09-292018-07-24Fireeye, Inc.System and method for detecting interpreter-based exploit attacks
US10706149B1 (en)2015-09-302020-07-07Fireeye, Inc.Detecting delayed activation malware using a primary controller and plural time controllers
US10601865B1 (en)2015-09-302020-03-24Fireeye, Inc.Detection of credential spearphishing attacks using email analysis
US10210329B1 (en)2015-09-302019-02-19Fireeye, Inc.Method to detect application execution hijacking using memory protection
US10817606B1 (en)2015-09-302020-10-27Fireeye, Inc.Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
US9825976B1 (en)2015-09-302017-11-21Fireeye, Inc.Detection and classification of exploit kits
US9825989B1 (en)2015-09-302017-11-21Fireeye, Inc.Cyber attack early warning system
IL242218B (en)2015-10-222020-11-30Verint Systems LtdSystem and method for maintaining a dynamic dictionary
IL242219B (en)2015-10-222020-11-30Verint Systems LtdSystem and method for keyword searching using both static and dynamic dictionaries
US10284575B2 (en)2015-11-102019-05-07Fireeye, Inc.Launcher for setting analysis environment variations for malware detection
US10846117B1 (en)2015-12-102020-11-24Fireeye, Inc.Technique for establishing secure communication between host and guest processes of a virtualization architecture
US10447728B1 (en)2015-12-102019-10-15Fireeye, Inc.Technique for protecting guest processes using a layered virtualization architecture
US10108446B1 (en)2015-12-112018-10-23Fireeye, Inc.Late load technique for deploying a virtualization layer underneath a running operating system
WO2017106206A1 (en)2015-12-182017-06-22Cujo LLCIntercepting intra-network communication for smart appliance behavior analysis
US10050998B1 (en)2015-12-302018-08-14Fireeye, Inc.Malicious message analysis system
US10565378B1 (en)2015-12-302020-02-18Fireeye, Inc.Exploit of privilege detection framework
US10133866B1 (en)2015-12-302018-11-20Fireeye, Inc.System and method for triggering analysis of an object for malware in response to modification of that object
US10621338B1 (en)2015-12-302020-04-14Fireeye, Inc.Method to detect forgery and exploits using last branch recording registers
US9824216B1 (en)2015-12-312017-11-21Fireeye, Inc.Susceptible environment detection system
US11552986B1 (en)2015-12-312023-01-10Fireeye Security Holdings Us LlcCyber-security framework for application of virtual features
US10581874B1 (en)2015-12-312020-03-03Fireeye, Inc.Malware detection system with contextual analysis
US10785255B1 (en)2016-03-252020-09-22Fireeye, Inc.Cluster configuration within a scalable malware detection system
US10616266B1 (en)2016-03-252020-04-07Fireeye, Inc.Distributed malware detection system and submission workflow thereof
US10671721B1 (en)2016-03-252020-06-02Fireeye, Inc.Timeout management services
US10601863B1 (en)2016-03-252020-03-24Fireeye, Inc.System and method for managing sensor enrollment
US10445506B2 (en)2016-03-302019-10-15Airwatch LlcDetecting vulnerabilities in managed client devices
US10826933B1 (en)2016-03-312020-11-03Fireeye, Inc.Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
US10893059B1 (en)2016-03-312021-01-12Fireeye, Inc.Verification and enhancement using detection systems located at the network periphery and endpoint devices
IL245299B (en)2016-04-252021-05-31Verint Systems LtdSystem and method for decrypting communication exchanged on a wireless local area network
CN106027513B (en)*2016-05-152019-01-08广东技术师范学院Propagation characteristic analysis method of the computer virus under SDN mobile environment
US10050982B1 (en)*2016-05-192018-08-14Symantec CorporationSystems and methods for reverse-engineering malware protocols
TWI599905B (en)*2016-05-232017-09-21緯創資通股份有限公司Protecting method and system for malicious code, and monitor apparatus
US10169585B1 (en)2016-06-222019-01-01Fireeye, Inc.System and methods for advanced malware detection through placement of transition events
AU2017281232B2 (en)2016-06-222020-02-13Invincea, Inc.Methods and apparatus for detecting whether a string of characters represents malicious activity using machine learning
GB2566657B8 (en)2016-06-302022-04-13Sophos LtdProactive network security using a health heartbeat
US10462173B1 (en)2016-06-302019-10-29Fireeye, Inc.Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US10972495B2 (en)2016-08-022021-04-06Invincea, Inc.Methods and apparatus for detecting and identifying malware by mapping feature data into a semantic space
US10592678B1 (en)2016-09-092020-03-17Fireeye, Inc.Secure communications between peers using a verified virtual trusted platform module
US10491627B1 (en)2016-09-292019-11-26Fireeye, Inc.Advanced malware detection using similarity analysis
IL248306B (en)2016-10-102019-12-31Verint Systems LtdSystem and method for generating data sets for learning to identify user actions
JP6908874B2 (en)*2016-10-272021-07-28コニカミノルタ株式会社 Information processing systems, information processing equipment and programs
US10795991B1 (en)2016-11-082020-10-06Fireeye, Inc.Enterprise search
US10587647B1 (en)2016-11-222020-03-10Fireeye, Inc.Technique for malware detection capability comparison of network security devices
US10552610B1 (en)2016-12-222020-02-04Fireeye, Inc.Adaptive virtual machine snapshot update framework for malware behavioral analysis
US10581879B1 (en)2016-12-222020-03-03Fireeye, Inc.Enhanced malware detection for generated objects
US10523609B1 (en)2016-12-272019-12-31Fireeye, Inc.Multi-vector malware detection and analysis
US10904286B1 (en)2017-03-242021-01-26Fireeye, Inc.Detection of phishing attacks using similarity analysis
WO2018183207A1 (en)*2017-03-272018-10-04Cujo LLCSecuring port forwarding through a network traffic hub
US10902119B1 (en)2017-03-302021-01-26Fireeye, Inc.Data extraction system for malware analysis
US10791138B1 (en)2017-03-302020-09-29Fireeye, Inc.Subscription-based malware detection
US10848397B1 (en)2017-03-302020-11-24Fireeye, Inc.System and method for enforcing compliance with subscription requirements for cyber-attack detection service
US10798112B2 (en)2017-03-302020-10-06Fireeye, Inc.Attribute-controlled malware detection
IL252037B (en)2017-04-302021-12-01Verint Systems LtdSystem and method for identifying relationships between users of computer applications
IL252041B (en)2017-04-302020-09-30Verint Systems LtdSystem and method for tracking users of computer applications
US10897472B1 (en)*2017-06-022021-01-19Enigma Networkz, LLCIT computer network threat analysis, detection and containment
GB201709812D0 (en)*2017-06-202017-08-02IbmIdentification of software components based on filtering of corresponding events
US10503904B1 (en)2017-06-292019-12-10Fireeye, Inc.Ransomware detection and mitigation
US10601848B1 (en)2017-06-292020-03-24Fireeye, Inc.Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
US10855700B1 (en)2017-06-292020-12-01Fireeye, Inc.Post-intrusion detection of cyber-attacks during lateral movement within networks
US10893068B1 (en)2017-06-302021-01-12Fireeye, Inc.Ransomware file modification prevention technique
CN107733873A (en)*2017-09-192018-02-23北京北信源软件股份有限公司A kind of viral early warning system and method
US10747872B1 (en)2017-09-272020-08-18Fireeye, Inc.System and method for preventing malware evasion
US10805346B2 (en)2017-10-012020-10-13Fireeye, Inc.Phishing attack detection
US11108809B2 (en)2017-10-272021-08-31Fireeye, Inc.System and method for analyzing binary code for malware classification using artificial neural network techniques
WO2019093098A1 (en)2017-11-082019-05-16ソニー株式会社Information processing device, moving apparatus, method, and program
US11271955B2 (en)2017-12-282022-03-08Fireeye Security Holdings Us LlcPlatform and method for retroactive reclassification employing a cybersecurity-based global data store
US11240275B1 (en)2017-12-282022-02-01Fireeye Security Holdings Us LlcPlatform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
US11005860B1 (en)2017-12-282021-05-11Fireeye, Inc.Method and system for efficient cybersecurity analysis of endpoint events
IL256690B (en)2018-01-012022-02-01Cognyte Tech Israel LtdSystem and method for identifying pairs of related application users
US10728034B2 (en)2018-02-232020-07-28Webroot Inc.Security privilege escalation exploit detection and mitigation
US11470109B2 (en)*2018-03-252022-10-11British Telecommunications Public Limited CompanyMalware barrier
US11533333B2 (en)*2018-03-252022-12-20British Telecommunications Public Limited CompanyMalware infection prediction
US10826931B1 (en)2018-03-292020-11-03Fireeye, Inc.System and method for predicting and mitigating cybersecurity system misconfigurations
US11558401B1 (en)2018-03-302023-01-17Fireeye Security Holdings Us LlcMulti-vector malware detection data sharing system for improved detection
US10956477B1 (en)2018-03-302021-03-23Fireeye, Inc.System and method for detecting malicious scripts through natural language processing modeling
US11003773B1 (en)2018-03-302021-05-11Fireeye, Inc.System and method for automatically generating malware detection rule recommendations
US10862864B2 (en)2018-04-042020-12-08Sophos LimitedNetwork device with transparent heartbeat processing
US11271950B2 (en)2018-04-042022-03-08Sophos LimitedSecuring endpoints in a heterogenous enterprise network
US11140195B2 (en)2018-04-042021-10-05Sophos LimitedSecure endpoint in a heterogenous enterprise network
US10972431B2 (en)2018-04-042021-04-06Sophos LimitedDevice management based on groups of network adapters
US11616758B2 (en)*2018-04-042023-03-28Sophos LimitedNetwork device for securing endpoints in a heterogeneous enterprise network
US11438357B2 (en)2018-06-222022-09-06Senseon Tech LtdEndpoint network sensor and related cybersecurity infrastructure
GB201810294D0 (en)*2018-06-222018-08-08Senseon Tech LtdCybe defence system
US11075930B1 (en)2018-06-272021-07-27Fireeye, Inc.System and method for detecting repetitive cybersecurity attacks constituting an email campaign
US11314859B1 (en)2018-06-272022-04-26FireEye Security Holdings, Inc.Cyber-security system and method for detecting escalation of privileges within an access token
US11228491B1 (en)2018-06-282022-01-18Fireeye Security Holdings Us LlcSystem and method for distributed cluster configuration monitoring and management
US11316900B1 (en)2018-06-292022-04-26FireEye Security Holdings Inc.System and method for automatically prioritizing rules for cyber-threat detection and mitigation
GB201812171D0 (en)2018-07-262018-09-12Senseon Tech LtdCyber defence system
IL260986B (en)2018-08-052021-09-30Verint Systems LtdSystem and method for using a user-action log to learn to classify encrypted traffic
US11182473B1 (en)2018-09-132021-11-23Fireeye Security Holdings Us LlcSystem and method for mitigating cyberattacks against processor operability by a guest process
US11763004B1 (en)2018-09-272023-09-19Fireeye Security Holdings Us LlcSystem and method for bootkit detection
US11368475B1 (en)2018-12-212022-06-21Fireeye Security Holdings Us LlcSystem and method for scanning remote services to locate stored objects with malware
US12074887B1 (en)2018-12-212024-08-27Musarubra Us LlcSystem and method for selectively processing content after identification and removal of malicious content
CN109525610A (en)*2019-01-112019-03-26高艳云Network big data analysis terminal
WO2020188524A1 (en)2019-03-202020-09-24Verint Systems Ltd.System and method for de-anonymizing actions and messages on networks
US11314863B2 (en)2019-03-272022-04-26Webroot, Inc.Behavioral threat detection definition and compilation
CN110365649B (en)*2019-06-172022-12-02北京旷视科技有限公司Data transmission method, data access device, data output device and system
US11258806B1 (en)2019-06-242022-02-22Mandiant, Inc.System and method for automatically associating cybersecurity intelligence to cyberthreat actors
US11556640B1 (en)2019-06-272023-01-17Mandiant, Inc.Systems and methods for automated cybersecurity analysis of extracted binary string sets
US11392700B1 (en)2019-06-282022-07-19Fireeye Security Holdings Us LlcSystem and method for supporting cross-platform data verification
US11356462B2 (en)*2019-08-292022-06-07Bank Of America CorporationDetecting and identifying devices at enterprise locations to protect enterprise-managed information and resources
US11330006B2 (en)2019-08-292022-05-10Bank Of America CorporationDetecting and identifying devices at enterprise locations to protect enterprise-managed information and resources
US11652848B1 (en)*2019-09-262023-05-16Amazon Technologies, Inc.Distributed evaluation of networking security rules
US11886585B1 (en)2019-09-272024-01-30Musarubra Us LlcSystem and method for identifying and mitigating cyberattacks through malicious position-independent code execution
US11637862B1 (en)2019-09-302023-04-25Mandiant, Inc.System and method for surfacing cyber-security threats with a self-learning recommendation engine
GB201915265D0 (en)2019-10-222019-12-04Senseon Tech LtdAnomaly detection
EP4046337A1 (en)2019-11-032022-08-24Cognyte Technologies Israel LtdSystem and method for identifying exchanges of encrypted communication traffic
EP4085588A1 (en)2019-12-312022-11-09Stryker CorporationOperating devices in an operating room
US11695617B2 (en)*2020-02-052023-07-04Nippon Telegraph And Telephone CorporationAlarm monitoring system, alarm monitoring method, and program
US11431629B2 (en)2020-08-122022-08-30Micron Technology, Inc.Data packet management
GB2602628B (en)2020-12-312023-03-29British TelecommIdentifying Computer Systems for Malware Infection Mitigation
US11307952B1 (en)2021-04-302022-04-19Bank Of America CorporationSystem for computing system configuration file state mirroring on peer computing devices
US11599523B2 (en)*2021-04-302023-03-07Bank Of America CorporationSystem for computing system configuration file state identification using decentralized multidimensional snapshots
US20240037229A1 (en)*2022-07-282024-02-01Pure Storage, Inc.Monitoring for Security Threats in a Container System
US12368695B2 (en)*2023-01-302025-07-22Hewlett Packard Enterprise Development LpCompacting traffic separation policies in campus networks
CN117240623B (en)*2023-11-132024-02-02杭州海康威视数字技术股份有限公司Worm virus blocking system, method and device for guaranteeing service continuity

Citations (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5485575A (en)*1994-11-211996-01-16International Business Machines CorporationAutomatic analysis of a computer virus structure and means of attachment to its hosts
US5548725A (en)*1992-12-281996-08-20Sony CorporationSystem for transmitting command and/or data in a single packet and automatically reporting status a predetermined time after receiving a command
US5623600A (en)*1995-09-261997-04-22Trend Micro, IncorporatedVirus detection and removal apparatus for computer networks
US5832208A (en)*1996-09-051998-11-03Cheyenne Software International Sales Corp.Anti-virus agent for use with databases and mail servers
US5889943A (en)*1995-09-261999-03-30Trend Micro IncorporatedApparatus and method for electronic mail virus detection and elimination
US5918008A (en)*1995-06-021999-06-29Fujitsu LimitedStorage device having function for coping with computer virus
US5920698A (en)*1997-01-061999-07-06Digital Equipment CorporationAutomatic detection of a similar device at the other end of a wire in a computer network
US6269400B1 (en)*1998-07-222001-07-31International Business Machines CorporationMethod for discovering and registering agents in a distributed network
US6338141B1 (en)*1998-09-302002-01-08Cybersoft, Inc.Method and apparatus for computer virus detection, analysis, and removal in real time
US20020107953A1 (en)*2001-01-162002-08-08Mark OntiverosMethod and device for monitoring data traffic and preventing unauthorized access to a network
US20020133586A1 (en)*2001-01-162002-09-19Carter ShanklinMethod and device for monitoring data traffic and preventing unauthorized access to a network
US6480471B1 (en)*1998-12-212002-11-12Hewlett-Packard CompanyHardware sampler for statistical monitoring of network traffic
US20030055994A1 (en)*2001-07-062003-03-20Zone Labs, Inc.System and methods providing anti-virus cooperative enforcement
US20030055962A1 (en)*2001-07-062003-03-20Freund Gregor P.System providing internet access management with router-based policy enforcement
US20030145228A1 (en)*2002-01-312003-07-31Janne SuuronenSystem and method of providing virus protection at a gateway
US20030156894A1 (en)*2002-02-212003-08-21Musashi Seimitsu Industry Co., Ltd.Ball joint
US20030191963A1 (en)*2002-04-042003-10-09Joel BalissatMethod and system for securely scanning network traffic
US20040042418A1 (en)*2002-09-032004-03-04Fujitsu LimitedFault tolerant network routing
US6711686B1 (en)*1999-06-292004-03-23Dell Usa L.P.Security management tool for managing security attributes in computer systems
US20040139179A1 (en)*2002-12-052004-07-15Siemens Information & Communication Networks, Inc.Method and system for router misconfiguration autodetection
US20040139196A1 (en)*2003-01-092004-07-15Dell Products L.P.System and method for releasing device reservations
US6892241B2 (en)*2001-09-282005-05-10Networks Associates Technology, Inc.Anti-virus policy enforcement system and method
US6910134B1 (en)*2000-08-292005-06-21Netrake CorporationMethod and device for innoculating email infected with a virus
US20050148281A1 (en)*2003-11-172005-07-07Jorge Sanchez-CastroToy vehicles and play sets with contactless identification
US7010807B1 (en)*2001-04-132006-03-07Sonicwall, Inc.System and method for network virus protection
US7080407B1 (en)*2000-06-272006-07-18Cisco Technology, Inc.Virus detection and removal system and method for network-based systems
US20060212572A1 (en)*2000-10-172006-09-21Yehuda AfekProtecting against malicious traffic
US7117533B1 (en)*2001-08-032006-10-03Mcafee, Inc.System and method for providing dynamic screening of transient messages in a distributed computing environment

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US2889943A (en)*1950-06-291959-06-09Plant Pattie Louise MooreMeans for evacuating cars of the hopper type
DK170490B1 (en)*1992-04-281995-09-18Multi Inform As Data Processing Plant
US5440723A (en)*1993-01-191995-08-08International Business Machines CorporationAutomatic immune system for computers and computer networks
US5925637A (en)*1997-05-151999-07-20Bayer CorporationInhibition of matrix metalloproteases by substituted biaryl oxobutyric acids
US6035423A (en)*1997-12-312000-03-07Network Associates, Inc.Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6338151B1 (en)*1998-08-212002-01-08International Business Machines CorporationInput/output recovery which is based an error rate and a current state of the computer environment
JP2000148276A (en)*1998-11-052000-05-26Fujitsu Ltd Security monitoring device, security monitoring method, and security monitoring program recording medium
US6321338B1 (en)*1998-11-092001-11-20Sri InternationalNetwork surveillance
US20030191957A1 (en)*1999-02-192003-10-09Ari HypponenDistributed computer virus detection and scanning
US6721721B1 (en)*2000-06-152004-04-13International Business Machines CorporationVirus checking and reporting for computer database search results
US6901519B1 (en)*2000-06-222005-05-31Infobahn, Inc.E-mail virus protection system and method
US7181769B1 (en)*2000-08-252007-02-20Ncircle Network Security, Inc.Network security system having a device profiler communicatively coupled to a traffic monitor
US7743147B2 (en)2001-04-202010-06-22Hewlett-Packard Development Company, L.P.Automated provisioning of computing networks using a network database data model
AU2002322692A1 (en)2001-08-032003-02-24Networks Associates Technology, Inc.System and method for providing passive screening of transient messages in a distributed computing environment
US7331061B1 (en)*2001-09-072008-02-12Secureworks, Inc.Integrated computer security management system and method
US8327446B2 (en)*2002-05-062012-12-04Trend Micro Inc.Antivirus stand-alone network or internet appliance and methods therefor
JP4439169B2 (en)*2002-09-102010-03-24株式会社アルバック Vacuum processing method and vacuum apparatus

Patent Citations (28)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5548725A (en)*1992-12-281996-08-20Sony CorporationSystem for transmitting command and/or data in a single packet and automatically reporting status a predetermined time after receiving a command
US5485575A (en)*1994-11-211996-01-16International Business Machines CorporationAutomatic analysis of a computer virus structure and means of attachment to its hosts
US5918008A (en)*1995-06-021999-06-29Fujitsu LimitedStorage device having function for coping with computer virus
US5623600A (en)*1995-09-261997-04-22Trend Micro, IncorporatedVirus detection and removal apparatus for computer networks
US5889943A (en)*1995-09-261999-03-30Trend Micro IncorporatedApparatus and method for electronic mail virus detection and elimination
US5832208A (en)*1996-09-051998-11-03Cheyenne Software International Sales Corp.Anti-virus agent for use with databases and mail servers
US5920698A (en)*1997-01-061999-07-06Digital Equipment CorporationAutomatic detection of a similar device at the other end of a wire in a computer network
US6269400B1 (en)*1998-07-222001-07-31International Business Machines CorporationMethod for discovering and registering agents in a distributed network
US6338141B1 (en)*1998-09-302002-01-08Cybersoft, Inc.Method and apparatus for computer virus detection, analysis, and removal in real time
US6480471B1 (en)*1998-12-212002-11-12Hewlett-Packard CompanyHardware sampler for statistical monitoring of network traffic
US6711686B1 (en)*1999-06-292004-03-23Dell Usa L.P.Security management tool for managing security attributes in computer systems
US7080407B1 (en)*2000-06-272006-07-18Cisco Technology, Inc.Virus detection and removal system and method for network-based systems
US6910134B1 (en)*2000-08-292005-06-21Netrake CorporationMethod and device for innoculating email infected with a virus
US20060212572A1 (en)*2000-10-172006-09-21Yehuda AfekProtecting against malicious traffic
US20020133586A1 (en)*2001-01-162002-09-19Carter ShanklinMethod and device for monitoring data traffic and preventing unauthorized access to a network
US20020107953A1 (en)*2001-01-162002-08-08Mark OntiverosMethod and device for monitoring data traffic and preventing unauthorized access to a network
US7010807B1 (en)*2001-04-132006-03-07Sonicwall, Inc.System and method for network virus protection
US20030055962A1 (en)*2001-07-062003-03-20Freund Gregor P.System providing internet access management with router-based policy enforcement
US20030055994A1 (en)*2001-07-062003-03-20Zone Labs, Inc.System and methods providing anti-virus cooperative enforcement
US7117533B1 (en)*2001-08-032006-10-03Mcafee, Inc.System and method for providing dynamic screening of transient messages in a distributed computing environment
US6892241B2 (en)*2001-09-282005-05-10Networks Associates Technology, Inc.Anti-virus policy enforcement system and method
US20030145228A1 (en)*2002-01-312003-07-31Janne SuuronenSystem and method of providing virus protection at a gateway
US20030156894A1 (en)*2002-02-212003-08-21Musashi Seimitsu Industry Co., Ltd.Ball joint
US20030191963A1 (en)*2002-04-042003-10-09Joel BalissatMethod and system for securely scanning network traffic
US20040042418A1 (en)*2002-09-032004-03-04Fujitsu LimitedFault tolerant network routing
US20040139179A1 (en)*2002-12-052004-07-15Siemens Information & Communication Networks, Inc.Method and system for router misconfiguration autodetection
US20040139196A1 (en)*2003-01-092004-07-15Dell Products L.P.System and method for releasing device reservations
US20050148281A1 (en)*2003-11-172005-07-07Jorge Sanchez-CastroToy vehicles and play sets with contactless identification

Cited By (47)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20050091538A1 (en)*2003-10-272005-04-28AlcatelMethod, a network protection means, a network node, a network, and a computer software product for disinfection
US20050120231A1 (en)*2003-12-012005-06-02Fujitsu LimitedMethod and system for controlling network connection, and computer product
WO2005117356A3 (en)*2004-05-242009-04-16Toshiba America Res IncQuarantine networking
US7478424B2 (en)2004-11-302009-01-13Cymtec Systems, Inc.Propagation protection within a network
US20060117387A1 (en)*2004-11-302006-06-01Gunsalus Bradley WPropagation protection of email within a network
US20060130142A1 (en)*2004-11-302006-06-15Mester Michael LPropagation protection within a network
US20060156405A1 (en)*2005-01-122006-07-13International Business Machines CorporationMethod and system for offloading real-time virus scanning during data transfer to storage peripherals
US7716741B2 (en)*2005-01-122010-05-11International Business Machines CorporationMethod and system for offloading real-time virus scanning during data transfer to storage peripherals
US9325738B2 (en)2005-04-222016-04-26Blue Coat Systems, Inc.Methods and apparatus for blocking unwanted software downloads
US8316446B1 (en)*2005-04-222012-11-20Blue Coat Systems, Inc.Methods and apparatus for blocking unwanted software downloads
US20090138573A1 (en)*2005-04-222009-05-28Alexander Wade CampbellMethods and apparatus for blocking unwanted software downloads
US7571483B1 (en)*2005-08-252009-08-04Lockheed Martin CorporationSystem and method for reducing the vulnerability of a computer network to virus threats
US8904529B2 (en)2005-09-072014-12-02International Business Machines CorporationAutomated deployment of protection agents to devices connected to a computer network
EP1934743A4 (en)*2005-09-072012-02-22IbmAutomated deployment of protection agents to devices connected to a distributed computer network
US9325725B2 (en)2005-09-072016-04-26International Business Machines CorporationAutomated deployment of protection agents to devices connected to a distributed computer network
US20070056020A1 (en)*2005-09-072007-03-08Internet Security Systems, Inc.Automated deployment of protection agents to devices connected to a distributed computer network
WO2007107766A1 (en)*2006-03-222007-09-27British Telecommunications Public Limited CompanyMethod and apparatus for automated testing software
US9329973B2 (en)2006-03-222016-05-03British Telecommunications Public Limited CompanyMethod and apparatus for automated testing software
US20090119778A1 (en)*2006-03-222009-05-07Dhiraj BhuyanMethod and apparatus for automated testing software
US9077739B2 (en)2006-11-282015-07-07Cisco Technology, Inc.Messaging security device
US20080127295A1 (en)*2006-11-282008-05-29Cisco Technology, IncMessaging security device
US8484733B2 (en)*2006-11-282013-07-09Cisco Technology, Inc.Messaging security device
US20080144523A1 (en)*2006-12-142008-06-19Fujitsu LimitedTraffic Monitoring Apparatus, Entry Managing Apparatus, and Network System
US8024473B1 (en)*2007-07-192011-09-20Mcafee, Inc.System, method, and computer program product to automate the flagging of obscure network flows as at least potentially unwanted
US8560715B1 (en)2007-07-192013-10-15Mcafee IncSystem, method, and computer program product to automate the flagging of obscure flows as at least potentially unwanted
US20090113548A1 (en)*2007-10-312009-04-30Bank Of America CorporationExecutable Download Tracking System
US8959624B2 (en)*2007-10-312015-02-17Bank Of America CorporationExecutable download tracking system
US20090254984A1 (en)*2008-04-042009-10-08Microsoft CorporationHardware interface for enabling direct access and security assessment sharing
US8739289B2 (en)*2008-04-042014-05-27Microsoft CorporationHardware interface for enabling direct access and security assessment sharing
US8332515B2 (en)*2008-04-172012-12-11Riverbed Technology, Inc.System and method for serving web pages
US20090265766A1 (en)*2008-04-172009-10-22Zeus Technology LimitedSupplying Web Pages
US20110289580A1 (en)*2009-02-192011-11-24Hiroaki OnumaNetwork security system and remote machine isolation method
US9038187B2 (en)2010-01-262015-05-19Bank Of America CorporationInsider threat correlation tool
US20110185056A1 (en)*2010-01-262011-07-28Bank Of America CorporationInsider threat correlation tool
US8799462B2 (en)2010-01-262014-08-05Bank Of America CorporationInsider threat correlation tool
US8800034B2 (en)2010-01-262014-08-05Bank Of America CorporationInsider threat correlation tool
US20110184877A1 (en)*2010-01-262011-07-28Bank Of America CorporationInsider threat correlation tool
US8782209B2 (en)2010-01-262014-07-15Bank Of America CorporationInsider threat correlation tool
US8544100B2 (en)2010-04-162013-09-24Bank Of America CorporationDetecting secure or encrypted tunneling in a computer network
US8782794B2 (en)2010-04-162014-07-15Bank Of America CorporationDetecting secure or encrypted tunneling in a computer network
US8719944B2 (en)2010-04-162014-05-06Bank Of America CorporationDetecting secure or encrypted tunneling in a computer network
US8793789B2 (en)2010-07-222014-07-29Bank Of America CorporationInsider threat correlation tool
CN103593616A (en)*2013-11-292014-02-19国网安徽省电力公司淮南供电公司System and method for preventing and controlling USB flash disk viruses in enterprise information network
WO2016160847A1 (en)*2015-04-032016-10-06Area 1 Security, Inc.Distribution of security rules among sensor computers
US9560070B1 (en)2015-04-032017-01-31Area 1 Security, Inc.Distribution of security rules among sensor computers
US10366129B2 (en)2015-12-042019-07-30Bank Of America CorporationData security threat control monitoring system
US10931706B2 (en)*2019-03-202021-02-23Booz Allen Hamilton Inc.System and method for detecting and identifying a cyber-attack on a network

Also Published As

Publication numberPublication date
TW200518521A (en)2005-06-01
TW200529621A (en)2005-09-01
US20050050337A1 (en)2005-03-03
US20050050335A1 (en)2005-03-03
CN1871571A (en)2006-11-29
WO2005022440A8 (en)2005-04-14
US20050050336A1 (en)2005-03-03
CN100530208C (en)2009-08-19
US8291498B1 (en)2012-10-16
WO2005022441A2 (en)2005-03-10
WO2005022440A1 (en)2005-03-10
WO2005022441A3 (en)2005-04-14
US7287278B2 (en)2007-10-23
US7512808B2 (en)2009-03-31
CN1871612A (en)2006-11-29
TWI362196B (en)2012-04-11
US7386888B2 (en)2008-06-10
US7565550B2 (en)2009-07-21
US20050050378A1 (en)2005-03-03
US20050050338A1 (en)2005-03-03
US20050050359A1 (en)2005-03-03
US7523493B2 (en)2009-04-21
TWI362206B (en)2012-04-11

Similar Documents

PublicationPublication DateTitle
US7386888B2 (en)Network isolation techniques suitable for virus protection
US12192170B2 (en)System and method for implementing content and network security inside a chip
US11882128B2 (en)Improving incident classification and enrichment by leveraging context from multiple security agents
JP6086968B2 (en) System and method for local protection against malicious software
US7836506B2 (en)Threat protection network
US9325725B2 (en)Automated deployment of protection agents to devices connected to a distributed computer network
US11856008B2 (en)Facilitating identification of compromised devices by network access control (NAC) or unified threat management (UTM) security services by leveraging context from an endpoint detection and response (EDR) agent
US8566941B2 (en)Method and system for cloaked observation and remediation of software attacks
WO2001084270A2 (en)Method and system for intrusion detection in a computer network
US12363135B2 (en)Enabling enhanced network security operation by leveraging context from multiple security agents
Shouman et al.Multiagent-Based Intrusion Prevention System

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:TREND MICRO INCORPORATED, JAPAN

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LIANG, YUNG CHANG;CHEN, YI FEN;REEL/FRAME:014949/0336;SIGNING DATES FROM 20031012 TO 20031020

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp