Movatterモバイル変換


[0]ホーム

URL:


US20050193429A1 - Integrated data traffic monitoring system - Google Patents

Integrated data traffic monitoring system
Download PDF

Info

Publication number
US20050193429A1
US20050193429A1US11/042,493US4249305AUS2005193429A1US 20050193429 A1US20050193429 A1US 20050193429A1US 4249305 AUS4249305 AUS 4249305AUS 2005193429 A1US2005193429 A1US 2005193429A1
Authority
US
United States
Prior art keywords
packet
event
event data
analysis
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/042,493
Inventor
Robert Demopoulos
David Fladebo
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Barrier Group
Original Assignee
Barrier Group
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Barrier GroupfiledCriticalBarrier Group
Priority to US11/042,493priorityCriticalpatent/US20050193429A1/en
Priority to PCT/US2005/008438prioritypatent/WO2006080930A1/en
Publication of US20050193429A1publicationCriticalpatent/US20050193429A1/en
Priority to US12/592,580prioritypatent/US8832833B2/en
Priority to US14/480,299prioritypatent/US10326777B2/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The present invention includes an integrated data traffic monitoring system monitoring data traffic received from a communication network and destined for a protected network. The monitoring system includes a security appliance and one or more security and monitoring technologies such as hardware and open source and proprietary software products. The security appliance and the security and monitoring technologies may be implemented as separate and distinct modules or combined into a single security appliance. The security and monitoring technologies monitor network data traffic on, or directed to, the protected network. The monitoring system collects data from each of the technologies into an event database and, based on the data, automatically generates rules directing one or more of the technologies to prevent subsequent communications traffic from specific sources from entering the protected network.

Description

Claims (16)

10. A method of screening packets received from a communication network comprising:
receiving a packet associated with one of an e-mail message, a VPN connection, and a web page response, the packet having a source;
performing an intrusion detection analysis on the packet using a set of intrusion detection rules;
if the packet passes the intrusion detection analysis, performing a firewall analysis on the packet using a set of firewall rules;
if the packet passes the firewall analysis, determining if the packet is associated with an e-mail message, a VPN connection or a web page response;
if the packet is associated with an e-mail message, performing a virus analysis on the packet using a set of virus definitions;
if the packet is associated with a VPN connection, performing an authentication analysis on the packet using a set of authentication criteria; and
if the packet fails any of the intrusion detection analysis, the firewall analysis, the virus analysis, or the authentication analysis, automatically generating a new intrusion detection rule to delete any subsequent packets received from the same source as the packet.
16. A computing system for receiving communication packets from a communication network and transmitting the communication packets to a protected network, the computing system comprising:
an intrusion detection module that compares a communication packet to a set of rules and, based on the comparison, either transmits the communication packet to a firewall or deletes the communication packet and transmits event data based on the deleted communication packet to an event database;
an event database that stores an event record based on the event data received from the intrusion detection module and maintains a plurality of event records based on previously received event data; and
an integrated security system that analyzes the event data and the plurality of event records and, based on the results of the analysis, automatically generates at least one rule to the intrusion detection module.
US11/042,4932004-01-232005-01-24Integrated data traffic monitoring systemAbandonedUS20050193429A1 (en)

Priority Applications (4)

Application NumberPriority DateFiling DateTitle
US11/042,493US20050193429A1 (en)2004-01-232005-01-24Integrated data traffic monitoring system
PCT/US2005/008438WO2006080930A1 (en)2005-01-242005-03-15Integrated data traffic monitoring system
US12/592,580US8832833B2 (en)2004-01-232009-11-27Integrated data traffic monitoring system
US14/480,299US10326777B2 (en)2004-01-232014-09-08Integrated data traffic monitoring system

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US53896004P2004-01-232004-01-23
US76893104A2004-01-292004-01-29
US11/042,493US20050193429A1 (en)2004-01-232005-01-24Integrated data traffic monitoring system

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US76893104AContinuation2004-01-232004-01-29

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US12/592,580ContinuationUS8832833B2 (en)2004-01-232009-11-27Integrated data traffic monitoring system

Publications (1)

Publication NumberPublication Date
US20050193429A1true US20050193429A1 (en)2005-09-01

Family

ID=35336629

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US11/042,493AbandonedUS20050193429A1 (en)2004-01-232005-01-24Integrated data traffic monitoring system
US12/592,580Expired - LifetimeUS8832833B2 (en)2004-01-232009-11-27Integrated data traffic monitoring system
US14/480,299Active2026-08-08US10326777B2 (en)2004-01-232014-09-08Integrated data traffic monitoring system

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US12/592,580Expired - LifetimeUS8832833B2 (en)2004-01-232009-11-27Integrated data traffic monitoring system
US14/480,299Active2026-08-08US10326777B2 (en)2004-01-232014-09-08Integrated data traffic monitoring system

Country Status (2)

CountryLink
US (3)US20050193429A1 (en)
WO (1)WO2006080930A1 (en)

Cited By (106)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040052664A1 (en)*2001-01-052004-03-18Atsuji SaitoHigh-pressure fuel feed pump
US20040143764A1 (en)*2003-01-132004-07-22Kartik KaleedhassSystem and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network
US20040199595A1 (en)*2003-01-162004-10-07Scott BanisterElectronic message delivery using a virtual gateway approach
US20050193076A1 (en)*2004-02-172005-09-01Andrew FluryCollecting, aggregating, and managing information relating to electronic messages
US20050283837A1 (en)*2004-06-162005-12-22Michael OlivierMethod and apparatus for managing computer virus outbreaks
US20060023709A1 (en)*2004-08-022006-02-02Hall Michael LInline intrusion detection using a single physical port
US20060064484A1 (en)*2004-09-232006-03-23Derek FawcusMethod and apparatus for controlling data to be routed in a data communications network
US20060064565A1 (en)*2004-09-182006-03-23Banks Andrew David JData processing in a distributed computing system
US20060161983A1 (en)*2005-01-202006-07-20Cothrell Scott AInline intrusion detection
US20060195701A1 (en)*2005-02-112006-08-31Critical Path, Inc., A California CorporationIn-process protection for digital content communication systems
US20060280121A1 (en)*2005-06-132006-12-14Fujitsu LimitedFrame-transfer control device, DoS-attack preventing device, and DoS-attack preventing system
US20060288418A1 (en)*2005-06-152006-12-21Tzu-Jian YangComputer-implemented method with real-time response mechanism for detecting viruses in data transfer on a stream basis
WO2007039357A1 (en)*2005-09-302007-04-12Nokia Siemens Networks Gmbh & Co. KgNetwork access remote front-end processor for a communication network and method for operating a communications system
EP1775910A1 (en)*2005-10-172007-04-18Alcatel LucentApplication layer ingress filtering
US20070209075A1 (en)*2006-03-042007-09-06Coffman Thayne REnabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data
US20070220256A1 (en)*2006-03-202007-09-20Toru YasuiElectronic mechanical device
US20070237129A1 (en)*2006-04-062007-10-11Dennis SychMethod and system for automatic intruder blocking on an Internet Protocol based network
US20080126088A1 (en)*2006-09-212008-05-29Commtouch Software LtdDevice, method and system for detecting unwanted conversational media session
US20080127295A1 (en)*2006-11-282008-05-29Cisco Technology, IncMessaging security device
US20080209558A1 (en)*2007-02-222008-08-28Aladdin Knowledge SystemsSelf-defensive protected software with suspended latent license enforcement
US20080295153A1 (en)*2007-05-242008-11-27Zhidan ChengSystem and method for detection and communication of computer infection status in a networked environment
EP2005353A2 (en)*2006-03-142008-12-24Detica LimitedA method and apparatus for providing network security
WO2009007707A1 (en)*2007-07-102009-01-15Messagelabs LimitedMessage processing
US20090044272A1 (en)*2007-08-072009-02-12Microsoft CorporationResource-reordered remediation of malware threats
US20090064334A1 (en)*2007-08-302009-03-05International Business Machines CorporationAdaptive Autonomic Threat Detection and Quarantine
US20090126005A1 (en)*2007-11-082009-05-14Min Sik KimMethod, apparatus and system for managing malicious-code spreading sites using firewall
US7562389B1 (en)*2004-07-302009-07-14Cisco Technology, Inc.Method and system for network security
US20090222877A1 (en)*2008-02-282009-09-03David DiehlUnified network threat management with rule classification
US7606214B1 (en)*2006-09-142009-10-20Trend Micro IncorporatedAnti-spam implementations in a router at the network layer
US20090265777A1 (en)*2008-04-212009-10-22Zytron Corp.Collaborative and proactive defense of networks and information systems
US20090274053A1 (en)*2008-05-052009-11-05Eaton CorporationMethods, Devices and Computer Program Products For Capturing Events Associated Network Anomalies
US20090300353A1 (en)*2008-04-302009-12-03Viasat, Inc.Trusted network interface
US20100011433A1 (en)*2008-07-142010-01-14Tufin Software Technologies Ltd.Method of configuring a security gateway and system thereof
US20100064042A1 (en)*2008-09-092010-03-11Facetime Communications, Inc.Hash-Based Resource Matching
US20100064353A1 (en)*2008-09-092010-03-11Facetime Communications, Inc.User Mapping Mechanisms
WO2010036701A1 (en)*2008-09-232010-04-01Savvis, Inc.Threat management system and method
US20100085883A1 (en)*2008-10-022010-04-08Facetime Communications, Inc.Application detection architecture and techniques
US20100125663A1 (en)*2008-11-172010-05-20Donovan John JSystems, methods, and devices for detecting security vulnerabilities in ip networks
US20100169975A1 (en)*2008-11-172010-07-01Dnsstuff LlcSystems, methods, and devices for detecting security vulnerabilities in ip networks
US7756930B2 (en)2004-05-282010-07-13Ironport Systems, Inc.Techniques for determining the reputation of a message sender
US7849142B2 (en)2004-05-292010-12-07Ironport Systems, Inc.Managing connections, messages, and directory harvest attacks at a server
US7870610B1 (en)*2007-03-162011-01-11The Board Of Directors Of The Leland Stanford Junior UniversityDetection of malicious programs
US7870200B2 (en)2004-05-292011-01-11Ironport Systems, Inc.Monitoring the flow of messages received at a server
US7873695B2 (en)2004-05-292011-01-18Ironport Systems, Inc.Managing connections and messages at a server by associating different actions for both different senders and different recipients
US20110055924A1 (en)*2009-09-022011-03-03Q1 Labs Inc.Graph structures for event matching
US20110067107A1 (en)*2009-09-172011-03-17Sun Microsystems, Inc.Integrated intrusion deflection, detection and introspection
US7937761B1 (en)*2004-12-172011-05-03Symantec CorporationDifferential threat detection processing
US20110238587A1 (en)*2008-09-232011-09-29Savvis, Inc.Policy management system and method
US20110288971A1 (en)*2007-06-222011-11-24Morega Systems Inc.Distributed digital rights management node module and methods for use therewith
US20120002680A1 (en)*2010-06-302012-01-05Ygdal NaouriInterruption, at least in part, of frame transmission
US20120005542A1 (en)*2010-07-012012-01-05LogRhythm Inc.Log collection, structuring and processing
US20120054823A1 (en)*2010-08-242012-03-01Electronics And Telecommunications Research InstituteAutomated control method and apparatus of ddos attack prevention policy using the status of cpu and memory
US20120192246A1 (en)*2010-11-242012-07-26Tufin Software Technologies Ltd.Method and system for mapping between connectivity requests and a security rule set
JP2012231232A (en)*2011-04-252012-11-22Hitachi LtdCommunication system and device
US20130091584A1 (en)*2011-10-052013-04-11Mcafee, Inc.Distributed System and Method for Tracking and Blocking Malicious Internet Hosts
US8463730B1 (en)2008-10-242013-06-11Vmware, Inc.Rapid evaluation of numerically large complex rules governing network and application transactions
US20130176865A1 (en)*2012-01-052013-07-11International Business Machines CorporationCounteracting Spam in Voice Over Internet Protocol Telephony Systems
US8621065B1 (en)*2008-10-232013-12-31Amazon Technologies, Inc.Dynamic blocking of suspicious electronic submissions
FR2995427A1 (en)*2012-09-122014-03-14TibsysDevice for monitoring frames to be placed at interconnection of home local area network and internet in residential area, has input unit inputting alert state when signature or scenario and/or inconsistency are detected by detecting unit
US20140156720A1 (en)*2012-12-032014-06-05Aruba Networks, Inc.Control plane protection for various tables using storm prevention entries
US8813215B2 (en)2005-11-222014-08-19Fortinet, Inc.Policy-based content filtering
EP2843878A1 (en)*2013-08-302015-03-04Eco-Hive LimitedA monitoring arrangement
US20150067816A1 (en)*2013-08-282015-03-05Cellco Partnership D/B/A Verizon WirelessAutomated security gateway
US20150229661A1 (en)*2011-11-072015-08-13Netflow Logic CorporationMethod and system for confident anomaly detection in computer network traffic
US9141786B2 (en)1996-11-082015-09-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9219755B2 (en)1996-11-082015-12-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9240996B1 (en)*2013-03-282016-01-19Emc CorporationMethod and system for risk-adaptive access control of an application action
US9253155B2 (en)2006-01-132016-02-02Fortinet, Inc.Computerized system and method for advanced network content processing
CN105659245A (en)*2013-11-062016-06-08迈克菲公司Context-aware network forensics
US20160269427A1 (en)*2012-02-012016-09-15Brightpoint Security, Inc.Scalable Network Security Detection And Prevention Platform
US20160330113A1 (en)*2011-12-212016-11-10Nec CorporationCommunication system, node, control device, communication method, and program
US20160373447A1 (en)*2013-07-052016-12-22Nippon Telegraph And Telephone CorporationUnauthorized access detecting system and unauthorized access detecting method
US9559800B1 (en)2008-10-242017-01-31Vmware, Inc.Dynamic packet filtering
US20170063930A1 (en)*2015-08-242017-03-02Empow Cyber Security Ltd.Generation of cyber-attacks investigation policies
CN106506556A (en)*2016-12-292017-03-15北京神州绿盟信息安全科技股份有限公司A kind of network flow abnormal detecting method and device
US9680846B2 (en)2012-02-012017-06-13Servicenow, Inc.Techniques for sharing network security event information
US9710644B2 (en)2012-02-012017-07-18Servicenow, Inc.Techniques for sharing network security event information
US20170237733A1 (en)*2016-02-162017-08-17Fujitsu LimitedApparatus and method to control transfer apparatuses depending on a type of an unauthorized communication occurring in a network
US9930011B1 (en)*2012-11-302018-03-27United Services Automobile Association (Usaa)Private network request forwarding
US10015176B2 (en)2013-07-152018-07-03Cyberseal Ltd.Network protection
CN108762905A (en)*2018-05-242018-11-06苏州乐麟无线信息科技有限公司A kind for the treatment of method and apparatus of multitask event
US10130512B2 (en)2013-09-192018-11-20Natus Medical IncorporatedHeadgear for observation of eye movements
US10230742B2 (en)*2015-01-302019-03-12Anomali IncorporatedSpace and time efficient threat detection
US10333960B2 (en)2017-05-032019-06-25Servicenow, Inc.Aggregating network security data for export
US10348687B2 (en)*2015-12-182019-07-09Worcester Polytechnic InstituteMethod and apparatus for using software defined networking and network function virtualization to secure residential networks
US10552603B2 (en)2000-05-172020-02-04Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US10666620B1 (en)2012-11-302020-05-26United Services Automobile Association (Usaa)Private network request forwarding
US10686805B2 (en)2015-12-112020-06-16Servicenow, Inc.Computer network threat assessment
US10762192B2 (en)*2018-08-222020-09-01Paypal, Inc.Cleartext password detection using machine learning
US10893060B2 (en)*2019-04-052021-01-12Material Security Inc.Defanging malicious electronic files based on trusted user reporting
US11057429B1 (en)*2019-03-292021-07-06Rapid7, Inc.Honeytoken tracker
US20210397697A1 (en)*2020-06-232021-12-23Acronis International GmbhSystems and methods for detecting stored passwords vulnerable to compromise
US11233816B2 (en)*2019-02-152022-01-25Verizon Patent And Licensing Inc.User-determined network traffic filtering
CN114124450A (en)*2021-10-152022-03-01广东电网有限责任公司广州供电局Network security system and method for remote storage battery capacity checking
US20220124183A1 (en)*2015-01-292022-04-21Splunk Inc.Facilitating custom content extraction rule configuration for remote capture agents
CN114510402A (en)*2022-04-192022-05-17深圳市信润富联数字科技有限公司System application level performance monitoring system and method
US11368474B2 (en)*2018-01-232022-06-21Rapid7, Inc.Detecting anomalous internet behavior
US20220224672A1 (en)*2019-07-122022-07-14Hitachi Astemo, Ltd.Gateway device
US11575703B2 (en)2017-05-052023-02-07Servicenow, Inc.Network security threat intelligence sharing
US20230095306A1 (en)*2020-10-272023-03-30Centripetal Networks, Inc.Methods and Systems for Efficient Adaptive Logging of Cyber Threat Incidents
US20230140706A1 (en)*2021-11-012023-05-04Recorded Future, Inc.Pipelined Malware Infrastructure Identification
US11677758B2 (en)*2020-03-042023-06-13Cisco Technology, Inc.Minimizing data flow between computing infrastructures for email security
US11743285B2 (en)*2016-09-262023-08-29Splunk Inc.Correlating forensic and non-forensic data in an information technology environment
US11750663B2 (en)2016-09-262023-09-05Splunk Inc.Threat identification-based collection of forensic data from endpoint devices
US20240103946A1 (en)*2020-10-152024-03-28State Farm Mutual Automobile Insurance CompanyIntelligent error monitoring and alert
US12354461B2 (en)*2012-03-282025-07-08Universal Electronics Inc.Temporary security bypass method and apparatus

Families Citing this family (51)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US8418241B2 (en)2006-11-142013-04-09Broadcom CorporationMethod and system for traffic engineering in secured networks
DE602008004491D1 (en)2008-07-042011-02-24Alcatel Lucent Method and system for a communication network against intruders
US20100256823A1 (en)*2009-04-042010-10-07Cisco Technology, Inc.Mechanism for On-Demand Environmental Services Based on Network Activity
US9529689B2 (en)*2009-11-302016-12-27Red Hat, Inc.Monitoring cloud computing environments
US9065799B2 (en)*2011-04-152015-06-23Lockheed Martin CorporationMethod and apparatus for cyber security
US9270642B2 (en)*2011-10-132016-02-23Rosemount Inc.Process installation network intrusion detection and prevention
CN104025070A (en)*2011-10-242014-09-03施耐德电器工业公司System and method for managing industrial processes
US9055090B2 (en)*2012-06-122015-06-09Verizon Patent And Licensing Inc.Network based device security and controls
US8775672B2 (en)*2012-06-132014-07-08Hulu, LLCArchitecture for simulation of network conditions for video delivery
US9565213B2 (en)2012-10-222017-02-07Centripetal Networks, Inc.Methods and systems for protecting a secured network
US9419963B2 (en)*2013-07-022016-08-16Open Text S.A.System and method for controlling access
KR101502490B1 (en)*2013-10-182015-03-13주식회사 케이티Subscibe terminal and security farm node for monitoring network traffic
CN103916399B (en)*2014-04-152018-09-25浪潮电子信息产业股份有限公司A kind of computer information safe system of defense
FR3026586A1 (en)*2014-09-302016-04-01Orange METHOD FOR ACCESSING DATA RELATING TO AT LEAST ONE OPERATION IMPLEMENTED BY A DEVICE FORMING A NODE OF A NETWORK
CN105765942A (en)*2015-03-182016-07-13策安保安有限公司 Systems and methods for information security threat disruption via a border gateway
CA2994257C (en)2015-07-022022-03-15Reliaquest Holdings, LlcThreat intelligence system and method
DE102016107647B4 (en)2016-03-082018-08-30Viktor Mraz Method and storage medium for securing / monitoring a network
CA2968710A1 (en)*2016-05-312017-11-30Valarie Ann FindlaySecurity threat information gathering and incident reporting systems and methods
WO2018004600A1 (en)2016-06-302018-01-04Sophos LimitedProactive network security using a health heartbeat
US10212023B2 (en)*2016-10-052019-02-19Vmware, Inc.Methods and systems to identify and respond to low-priority event messages
US9692784B1 (en)*2016-10-252017-06-27Fortress Cyber Security, LLCSecurity appliance
CN107181769A (en)*2017-07-282017-09-19山东超越数控电子有限公司A kind of network intrusion prevention system and method
US11494395B2 (en)2017-07-312022-11-08Splunk Inc.Creating dashboards for viewing data in a data storage system based on natural language requests
US11240207B2 (en)2017-08-112022-02-01L3 Technologies, Inc.Network isolation
US11601467B2 (en)2017-08-242023-03-07L3 Technologies, Inc.Service provider advanced threat protection
US11223601B2 (en)2017-09-282022-01-11L3 Technologies, Inc.Network isolation for collaboration software
US11374906B2 (en)2017-09-282022-06-28L3 Technologies, Inc.Data exfiltration system and methods
US11552987B2 (en)*2017-09-282023-01-10L3 Technologies, Inc.Systems and methods for command and control protection
US11336619B2 (en)2017-09-282022-05-17L3 Technologies, Inc.Host process and memory separation
US11550898B2 (en)2017-10-232023-01-10L3 Technologies, Inc.Browser application implementing sandbox based internet isolation
US10841281B2 (en)*2018-03-262020-11-17Kuo ChiangMethods for preventing or detecting computer attacks in a cloud-based environment and apparatuses using the same
US11616758B2 (en)2018-04-042023-03-28Sophos LimitedNetwork device for securing endpoints in a heterogeneous enterprise network
US11140195B2 (en)*2018-04-042021-10-05Sophos LimitedSecure endpoint in a heterogenous enterprise network
US11271950B2 (en)2018-04-042022-03-08Sophos LimitedSecuring endpoints in a heterogenous enterprise network
US10972431B2 (en)2018-04-042021-04-06Sophos LimitedDevice management based on groups of network adapters
US10862864B2 (en)2018-04-042020-12-08Sophos LimitedNetwork device with transparent heartbeat processing
US11803664B2 (en)*2018-10-092023-10-31Ebay Inc.Distributed application architectures using blockchain and distributed file systems
US11075931B1 (en)*2018-12-312021-07-27Stealthbits Technologies LlcSystems and methods for detecting malicious network activity
US11444919B2 (en)2019-05-202022-09-13Woodward, Inc.Mission critical security zone
FR3104761A1 (en)*2019-12-122021-06-18Orange Method for monitoring data passing through user equipment
CN114762389A (en)*2019-12-172022-07-15昕诺飞控股有限公司Route discovery in a network with combinational nodes
RU2743974C1 (en)2019-12-192021-03-01Общество с ограниченной ответственностью "Группа АйБи ТДС"System and method for scanning security of elements of network architecture
RU2722693C1 (en)2020-01-272020-06-03Общество с ограниченной ответственностью «Группа АйБи ТДС»Method and system for detecting the infrastructure of a malicious software or a cybercriminal
US11736496B2 (en)*2020-02-172023-08-22Avanan, Inc.Responsive actions to suspicious e-mail, as inferred from negative user assessment, by third party security systems without modification of existing e-mail clients
US11363062B1 (en)2021-03-312022-06-14Peakstar Technologies Inc.System and method for decentralized internet traffic filtering policy reporting
US20220353279A1 (en)*2021-04-292022-11-03KnowBe4, Inc.Systems and methods for determination of indicators of malicious elements within messages
NL2030861B1 (en)2021-06-012023-03-14Trust LtdSystem and method for external monitoring a cyberattack surface
RU2769075C1 (en)*2021-06-102022-03-28Общество с ограниченной ответственностью "Группа АйБи ТДС"System and method for active detection of malicious network resources
US12164661B1 (en)*2024-01-302024-12-10Grip Security LtdSecurity interface for controlling access to email-data
US12219360B1 (en)2024-07-242025-02-04Netskope, Inc.Cellular IoT security using dynamic policy-driven mechanisms for threat mitigation
US12255898B1 (en)*2024-09-052025-03-18Grip Security LtdManagement of access to external authorized services

Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6363489B1 (en)*1999-11-292002-03-26Forescout Technologies Inc.Method for automatic intrusion detection and deflection in a network
US20020078202A1 (en)*2000-12-152002-06-20Tadanao AndoIP network system having unauthorized intrusion safeguard function
US20020188864A1 (en)*2001-06-062002-12-12Jackson Gary ManuelIntrusion prevention system
US6701440B1 (en)*2000-01-062004-03-02Networks Associates Technology, Inc.Method and system for protecting a computer using a remote e-mail scanning device
US20040255167A1 (en)*2003-04-282004-12-16Knight James MichaelMethod and system for remote network security management
US20050005017A1 (en)*2003-07-032005-01-06Arbor Networks, Inc.Method and system for reducing scope of self-propagating attack code in network
US20050177868A1 (en)*2003-07-112005-08-11Computer Associates Think, Inc.Method and system for protecting against computer viruses
US20050251570A1 (en)*2002-04-182005-11-10John HeasmanIntrusion detection system
US20060031938A1 (en)*2002-10-222006-02-09Unho ChoiIntegrated emergency response system in information infrastructure and operating method therefor
US7213265B2 (en)*2000-11-152007-05-01Lockheed Martin CorporationReal time active network compartmentalization
US7263561B1 (en)*2001-08-242007-08-28Mcafee, Inc.Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6256775B1 (en)1997-12-112001-07-03International Business Machines CorporationFacilities for detailed software performance analysis in a multithreaded processor
US6192518B1 (en)1998-01-222001-02-20Mis Only, Inc.Method for distributing software over network links via electronic mail
US6405250B1 (en)1999-01-252002-06-11Lucent Technologies Inc.Network management system based on passive monitoring and proactive management for formulation behavior state transition models
US6678827B1 (en)*1999-05-062004-01-13Watchguard Technologies, Inc.Managing multiple network security devices from a manager device
TW453072B (en)*1999-08-182001-09-01Alma Baba Technical Res Lab CoSystem for montoring network for cracker attacic
US6526413B2 (en)1999-09-282003-02-25Microsoft CorporationArchitecture for a hierarchical folder structure in hand-held computers
US7159237B2 (en)2000-03-162007-01-02Counterpane Internet Security, Inc.Method and system for dynamic network intrusion monitoring, detection and response
US6993022B1 (en)2000-07-062006-01-31Sony CorporationMethod of and apparatus for directly mapping communications through a router between nodes on different buses within a network of buses
US20020133586A1 (en)2001-01-162002-09-19Carter ShanklinMethod and device for monitoring data traffic and preventing unauthorized access to a network
US20020107953A1 (en)2001-01-162002-08-08Mark OntiverosMethod and device for monitoring data traffic and preventing unauthorized access to a network
US7426730B2 (en)2001-04-192008-09-16Wre-Hol LlcMethod and system for generalized and adaptive transaction processing between uniform information services and applications
US6944660B2 (en)2001-05-042005-09-13Hewlett-Packard Development Company, L.P.System and method for monitoring browser event activities
US6816890B2 (en)2001-05-282004-11-09Hitachi, Ltd.Gateway apparatus with LAC function
WO2003077074A2 (en)2002-03-082003-09-18Snapp Robert FA method for preventing improper correction of a database during an updating process
US6952779B1 (en)*2002-10-012005-10-04Gideon CohenSystem and method for risk detection and analysis in a computer network
US7483972B2 (en)2003-01-082009-01-27Cisco Technology, Inc.Network security monitoring system
US7681235B2 (en)2003-05-192010-03-16Radware Ltd.Dynamic network protection

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6363489B1 (en)*1999-11-292002-03-26Forescout Technologies Inc.Method for automatic intrusion detection and deflection in a network
US6701440B1 (en)*2000-01-062004-03-02Networks Associates Technology, Inc.Method and system for protecting a computer using a remote e-mail scanning device
US7213265B2 (en)*2000-11-152007-05-01Lockheed Martin CorporationReal time active network compartmentalization
US20020078202A1 (en)*2000-12-152002-06-20Tadanao AndoIP network system having unauthorized intrusion safeguard function
US20020188864A1 (en)*2001-06-062002-12-12Jackson Gary ManuelIntrusion prevention system
US7263561B1 (en)*2001-08-242007-08-28Mcafee, Inc.Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient
US20050251570A1 (en)*2002-04-182005-11-10John HeasmanIntrusion detection system
US20060031938A1 (en)*2002-10-222006-02-09Unho ChoiIntegrated emergency response system in information infrastructure and operating method therefor
US20040255167A1 (en)*2003-04-282004-12-16Knight James MichaelMethod and system for remote network security management
US20050005017A1 (en)*2003-07-032005-01-06Arbor Networks, Inc.Method and system for reducing scope of self-propagating attack code in network
US20050177868A1 (en)*2003-07-112005-08-11Computer Associates Think, Inc.Method and system for protecting against computer viruses

Cited By (210)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9141786B2 (en)1996-11-082015-09-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9189621B2 (en)1996-11-082015-11-17Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9219755B2 (en)1996-11-082015-12-22Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US9444844B2 (en)1996-11-082016-09-13Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US10552603B2 (en)2000-05-172020-02-04Finjan, Inc.Malicious mobile code runtime monitoring system and methods
US20040052664A1 (en)*2001-01-052004-03-18Atsuji SaitoHigh-pressure fuel feed pump
US20040143764A1 (en)*2003-01-132004-07-22Kartik KaleedhassSystem and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network
US8799644B2 (en)*2003-01-132014-08-05Karsof Systems LlcSystem and method of preventing the transmission of known and unknown electronic content to and from servers or workstations connected to a common network
US7219131B2 (en)2003-01-162007-05-15Ironport Systems, Inc.Electronic message delivery using an alternate source approach
US20040199595A1 (en)*2003-01-162004-10-07Scott BanisterElectronic message delivery using a virtual gateway approach
US7653695B2 (en)2004-02-172010-01-26Ironport Systems, Inc.Collecting, aggregating, and managing information relating to electronic messages
US20050193076A1 (en)*2004-02-172005-09-01Andrew FluryCollecting, aggregating, and managing information relating to electronic messages
US7756930B2 (en)2004-05-282010-07-13Ironport Systems, Inc.Techniques for determining the reputation of a message sender
US7873695B2 (en)2004-05-292011-01-18Ironport Systems, Inc.Managing connections and messages at a server by associating different actions for both different senders and different recipients
US7870200B2 (en)2004-05-292011-01-11Ironport Systems, Inc.Monitoring the flow of messages received at a server
US7849142B2 (en)2004-05-292010-12-07Ironport Systems, Inc.Managing connections, messages, and directory harvest attacks at a server
US20050283837A1 (en)*2004-06-162005-12-22Michael OlivierMethod and apparatus for managing computer virus outbreaks
US7748038B2 (en)2004-06-162010-06-29Ironport Systems, Inc.Method and apparatus for managing computer virus outbreaks
US7562389B1 (en)*2004-07-302009-07-14Cisco Technology, Inc.Method and system for network security
US7555774B2 (en)*2004-08-022009-06-30Cisco Technology, Inc.Inline intrusion detection using a single physical port
US20060023709A1 (en)*2004-08-022006-02-02Hall Michael LInline intrusion detection using a single physical port
US20060064565A1 (en)*2004-09-182006-03-23Banks Andrew David JData processing in a distributed computing system
US7577737B2 (en)*2004-09-232009-08-18Cisco Technology, Inc.Method and apparatus for controlling data to be routed in a data communications network
US20060064484A1 (en)*2004-09-232006-03-23Derek FawcusMethod and apparatus for controlling data to be routed in a data communications network
US7937761B1 (en)*2004-12-172011-05-03Symantec CorporationDifferential threat detection processing
US20060161983A1 (en)*2005-01-202006-07-20Cothrell Scott AInline intrusion detection
US9009830B2 (en)2005-01-202015-04-14Cisco Technology, Inc.Inline intrusion detection
US7725938B2 (en)2005-01-202010-05-25Cisco Technology, Inc.Inline intrusion detection
US20060195701A1 (en)*2005-02-112006-08-31Critical Path, Inc., A California CorporationIn-process protection for digital content communication systems
US20060195912A1 (en)*2005-02-112006-08-31Critical Path, Inc., A California CorporationSelectively communicating digital content
US20060280121A1 (en)*2005-06-132006-12-14Fujitsu LimitedFrame-transfer control device, DoS-attack preventing device, and DoS-attack preventing system
US20060288418A1 (en)*2005-06-152006-12-21Tzu-Jian YangComputer-implemented method with real-time response mechanism for detecting viruses in data transfer on a stream basis
WO2007039357A1 (en)*2005-09-302007-04-12Nokia Siemens Networks Gmbh & Co. KgNetwork access remote front-end processor for a communication network and method for operating a communications system
DE102005046935B4 (en)*2005-09-302009-07-23Nokia Siemens Networks Gmbh & Co.Kg Network access node computer to a communication network, communication system and method for assigning a protection device
US20090222904A1 (en)*2005-09-302009-09-03Nokia Siemens Networks Gmbh & Co.KgNetwork access node computer for a communication network, communication system and method for operating a communication system
EP1775910A1 (en)*2005-10-172007-04-18Alcatel LucentApplication layer ingress filtering
US9762540B2 (en)*2005-11-222017-09-12Fortinet, Inc.Policy based content filtering
US9729508B2 (en)*2005-11-222017-08-08Fortinet, Inc.Policy-based content filtering
US20150312220A1 (en)*2005-11-222015-10-29Fortinet, Inc.Policy-based content filtering
US20140351918A1 (en)*2005-11-222014-11-27Fortinet, Inc.Policy-based content filtering
US8813215B2 (en)2005-11-222014-08-19Fortinet, Inc.Policy-based content filtering
US10084750B2 (en)*2005-11-222018-09-25Fortinet, Inc.Policy-based content filtering
US9253155B2 (en)2006-01-132016-02-02Fortinet, Inc.Computerized system and method for advanced network content processing
US20070209075A1 (en)*2006-03-042007-09-06Coffman Thayne REnabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data
US8266697B2 (en)*2006-03-042012-09-1121St Century Technologies, Inc.Enabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data
EP2005353A2 (en)*2006-03-142008-12-24Detica LimitedA method and apparatus for providing network security
US20070220256A1 (en)*2006-03-202007-09-20Toru YasuiElectronic mechanical device
US20070237129A1 (en)*2006-04-062007-10-11Dennis SychMethod and system for automatic intruder blocking on an Internet Protocol based network
US7606214B1 (en)*2006-09-142009-10-20Trend Micro IncorporatedAnti-spam implementations in a router at the network layer
US7991919B2 (en)2006-09-212011-08-02Commtouch Software Ltd.Device, method and system for detecting unwanted conversational media session
US20110054888A1 (en)*2006-09-212011-03-03Commtouch Software Ltd.Device, method and system for detecting unwanted conversational media session
US20080126088A1 (en)*2006-09-212008-05-29Commtouch Software LtdDevice, method and system for detecting unwanted conversational media session
US20110046949A1 (en)*2006-09-212011-02-24Commtouch Software Ltd.Device, method and system for detecting unwanted conversational media session
US7849186B2 (en)2006-09-212010-12-07Commtouch Software Ltd.Device, method and system for detecting unwanted conversational media session
US20110047269A1 (en)*2006-09-212011-02-24Commtouch Software Ltd.Device, method and system for detecting unwanted conversational media session
US8190737B2 (en)2006-09-212012-05-29Commtouch Software Ltd.Device, method and system for detecting unwanted conversational media session
US8195795B2 (en)2006-09-212012-06-05Commtouch Software Ltd.Device, method and system for detecting unwanted conversational media session
US9077739B2 (en)2006-11-282015-07-07Cisco Technology, Inc.Messaging security device
US8484733B2 (en)*2006-11-282013-07-09Cisco Technology, Inc.Messaging security device
US20080127295A1 (en)*2006-11-282008-05-29Cisco Technology, IncMessaging security device
US20080209558A1 (en)*2007-02-222008-08-28Aladdin Knowledge SystemsSelf-defensive protected software with suspended latent license enforcement
US7870610B1 (en)*2007-03-162011-01-11The Board Of Directors Of The Leland Stanford Junior UniversityDetection of malicious programs
US20080295153A1 (en)*2007-05-242008-11-27Zhidan ChengSystem and method for detection and communication of computer infection status in a networked environment
US20110288971A1 (en)*2007-06-222011-11-24Morega Systems Inc.Distributed digital rights management node module and methods for use therewith
WO2009007707A1 (en)*2007-07-102009-01-15Messagelabs LimitedMessage processing
US20090019121A1 (en)*2007-07-102009-01-15Messagelabs LimitedMessage processing
US20090044272A1 (en)*2007-08-072009-02-12Microsoft CorporationResource-reordered remediation of malware threats
US8087061B2 (en)*2007-08-072011-12-27Microsoft CorporationResource-reordered remediation of malware threats
US20090064334A1 (en)*2007-08-302009-03-05International Business Machines CorporationAdaptive Autonomic Threat Detection and Quarantine
US20090126005A1 (en)*2007-11-082009-05-14Min Sik KimMethod, apparatus and system for managing malicious-code spreading sites using firewall
US20090222877A1 (en)*2008-02-282009-09-03David DiehlUnified network threat management with rule classification
US8561129B2 (en)*2008-02-282013-10-15Mcafee, IncUnified network threat management with rule classification
US20090265777A1 (en)*2008-04-212009-10-22Zytron Corp.Collaborative and proactive defense of networks and information systems
WO2009132047A3 (en)*2008-04-212009-12-30Zytron Corp.Collaborative and proactive defense of networks and information systems
US20090300353A1 (en)*2008-04-302009-12-03Viasat, Inc.Trusted network interface
US8627060B2 (en)2008-04-302014-01-07Viasat, Inc.Trusted network interface
WO2009134900A3 (en)*2008-04-302010-02-18Viasat, Inc.Trusted network interface
US20090274053A1 (en)*2008-05-052009-11-05Eaton CorporationMethods, Devices and Computer Program Products For Capturing Events Associated Network Anomalies
US8279768B2 (en)*2008-05-052012-10-02Eaton CorporationMethods, devices and computer program products for capturing events associated network anomalies
US8490171B2 (en)*2008-07-142013-07-16Tufin Software Technologies Ltd.Method of configuring a security gateway and system thereof
US20100011433A1 (en)*2008-07-142010-01-14Tufin Software Technologies Ltd.Method of configuring a security gateway and system thereof
US8122129B2 (en)*2008-09-092012-02-21Actiance, Inc.Hash-based resource matching
US20100064042A1 (en)*2008-09-092010-03-11Facetime Communications, Inc.Hash-Based Resource Matching
US20100064353A1 (en)*2008-09-092010-03-11Facetime Communications, Inc.User Mapping Mechanisms
US8220056B2 (en)*2008-09-232012-07-10Savvis, Inc.Threat management system and method
WO2010036701A1 (en)*2008-09-232010-04-01Savvis, Inc.Threat management system and method
US20110239303A1 (en)*2008-09-232011-09-29Savvis, Inc.Threat management system and method
US20110238587A1 (en)*2008-09-232011-09-29Savvis, Inc.Policy management system and method
US20100085883A1 (en)*2008-10-022010-04-08Facetime Communications, Inc.Application detection architecture and techniques
US8484338B2 (en)2008-10-022013-07-09Actiance, Inc.Application detection architecture and techniques
US8621065B1 (en)*2008-10-232013-12-31Amazon Technologies, Inc.Dynamic blocking of suspicious electronic submissions
US9237162B1 (en)2008-10-232016-01-12Amazon Technologies, Inc.Dynamic blocking of suspicious electronic submissions
US8463730B1 (en)2008-10-242013-06-11Vmware, Inc.Rapid evaluation of numerically large complex rules governing network and application transactions
US8688823B1 (en)2008-10-242014-04-01Vmware, Inc.Association of network traffic to enterprise users in a terminal services environment
US9559800B1 (en)2008-10-242017-01-31Vmware, Inc.Dynamic packet filtering
US20100169975A1 (en)*2008-11-172010-07-01Dnsstuff LlcSystems, methods, and devices for detecting security vulnerabilities in ip networks
US8806632B2 (en)2008-11-172014-08-12Solarwinds Worldwide, LlcSystems, methods, and devices for detecting security vulnerabilities in IP networks
US20100125663A1 (en)*2008-11-172010-05-20Donovan John JSystems, methods, and devices for detecting security vulnerabilities in ip networks
US20110055924A1 (en)*2009-09-022011-03-03Q1 Labs Inc.Graph structures for event matching
US9413598B2 (en)*2009-09-022016-08-09International Business Machines CorporationGraph structures for event matching
US8413241B2 (en)*2009-09-172013-04-02Oracle America, Inc.Integrated intrusion deflection, detection and introspection
US20110067107A1 (en)*2009-09-172011-03-17Sun Microsystems, Inc.Integrated intrusion deflection, detection and introspection
US8953631B2 (en)*2010-06-302015-02-10Intel CorporationInterruption, at least in part, of frame transmission
US20120002680A1 (en)*2010-06-302012-01-05Ygdal NaouriInterruption, at least in part, of frame transmission
US9384112B2 (en)*2010-07-012016-07-05Logrhythm, Inc.Log collection, structuring and processing
US10122575B2 (en)2010-07-012018-11-06LogRhythm Inc.Log collection, structuring and processing
US20120005542A1 (en)*2010-07-012012-01-05LogRhythm Inc.Log collection, structuring and processing
US20120054823A1 (en)*2010-08-242012-03-01Electronics And Telecommunications Research InstituteAutomated control method and apparatus of ddos attack prevention policy using the status of cpu and memory
US20150074755A1 (en)*2010-11-242015-03-12Tufin Software Technologies Ltd.Method and system for mapping between connectivity requests and a security rule set
US9313175B2 (en)*2010-11-242016-04-12Tufin Software Technologes Ltd.Method and system for mapping between connectivity requests and a security rule set
US20120192246A1 (en)*2010-11-242012-07-26Tufin Software Technologies Ltd.Method and system for mapping between connectivity requests and a security rule set
US8914841B2 (en)*2010-11-242014-12-16Tufin Software Technologies Ltd.Method and system for mapping between connectivity requests and a security rule set
JP2012231232A (en)*2011-04-252012-11-22Hitachi LtdCommunication system and device
US9385991B2 (en)2011-10-052016-07-05Mcafee, Inc.Distributed system and method for tracking and blocking malicious internet hosts
EP2764660A4 (en)*2011-10-052015-07-22Mcafee Inc DISTRIBUTED SYSTEM AND METHOD FOR RETRIEVING AND DISMISSING SOUGHT INTERNET HOSTS
US8726385B2 (en)*2011-10-052014-05-13Mcafee, Inc.Distributed system and method for tracking and blocking malicious internet hosts
US20130091584A1 (en)*2011-10-052013-04-11Mcafee, Inc.Distributed System and Method for Tracking and Blocking Malicious Internet Hosts
CN103858381A (en)*2011-10-052014-06-11迈克菲股份有限公司Distributed system and method for tracking and blocking malicious internet hosts
US10033697B2 (en)2011-10-052018-07-24Mcafee, LlcDistributed system and method for tracking and blocking malicious internet hosts
US9843488B2 (en)*2011-11-072017-12-12Netflow Logic CorporationMethod and system for confident anomaly detection in computer network traffic
US20180337836A1 (en)*2011-11-072018-11-22Netflow Logic CorporationMethod and system for confident anomaly detection in computer network traffic
US20150229661A1 (en)*2011-11-072015-08-13Netflow Logic CorporationMethod and system for confident anomaly detection in computer network traffic
US11805143B2 (en)2011-11-072023-10-31Netflow Logic CorporationMethod and system for confident anomaly detection in computer network traffic
US10542024B2 (en)*2011-11-072020-01-21Netflow Logic CorporationMethod and system for confident anomaly detection in computer network traffic
US11089041B2 (en)2011-11-072021-08-10Netflow Logic CorporationMethod and system for confident anomaly detection in computer network traffic
US20160330113A1 (en)*2011-12-212016-11-10Nec CorporationCommunication system, node, control device, communication method, and program
US10171352B2 (en)*2011-12-212019-01-01Nec CorporationCommunication system, node, control device, communication method, and program
US8953471B2 (en)*2012-01-052015-02-10International Business Machines CorporationCounteracting spam in voice over internet protocol telephony systems
US20130176865A1 (en)*2012-01-052013-07-11International Business Machines CorporationCounteracting Spam in Voice Over Internet Protocol Telephony Systems
US9756082B1 (en)2012-02-012017-09-05Servicenow, Inc.Scalable network security with fast response protocol
US10628582B2 (en)2012-02-012020-04-21Servicenow, Inc.Techniques for sharing network security event information
US9680846B2 (en)2012-02-012017-06-13Servicenow, Inc.Techniques for sharing network security event information
US9710644B2 (en)2012-02-012017-07-18Servicenow, Inc.Techniques for sharing network security event information
US11388200B2 (en)*2012-02-012022-07-12Servicenow, Inc.Scalable network security detection and prevention platform
US11222111B2 (en)2012-02-012022-01-11Servicenow, Inc.Techniques for sharing network security event information
US10412103B2 (en)*2012-02-012019-09-10Servicenow, Inc.Techniques for sharing network security event information
US10225288B2 (en)*2012-02-012019-03-05Servicenow, Inc.Scalable network security detection and prevention platform
US20160269427A1 (en)*2012-02-012016-09-15Brightpoint Security, Inc.Scalable Network Security Detection And Prevention Platform
US10032020B2 (en)2012-02-012018-07-24Servicenow, Inc.Techniques for sharing network security event information
US12354461B2 (en)*2012-03-282025-07-08Universal Electronics Inc.Temporary security bypass method and apparatus
FR2995427A1 (en)*2012-09-122014-03-14TibsysDevice for monitoring frames to be placed at interconnection of home local area network and internet in residential area, has input unit inputting alert state when signature or scenario and/or inconsistency are detected by detecting unit
US11368433B1 (en)2012-11-302022-06-21United Services Automobile Association (Usaa)Private network request forwarding
US10630645B1 (en)2012-11-302020-04-21United Services Automobile Association (Usaa)Private network request forwarding
US11399010B1 (en)2012-11-302022-07-26United Services Automobile Association (Usaa)Private network request forwarding
US12074852B1 (en)2012-11-302024-08-27United Services Automobile Association (Usaa)Private network request forwarding
US9930012B1 (en)2012-11-302018-03-27United Services Automobile Association (Usaa)Private network request forwarding
US9930011B1 (en)*2012-11-302018-03-27United Services Automobile Association (Usaa)Private network request forwarding
US12063205B1 (en)2012-11-302024-08-13United Services Automobile Association (Usaa)Private network request forwarding
US10666620B1 (en)2012-11-302020-05-26United Services Automobile Association (Usaa)Private network request forwarding
US20140156720A1 (en)*2012-12-032014-06-05Aruba Networks, Inc.Control plane protection for various tables using storm prevention entries
US9800503B2 (en)*2012-12-032017-10-24Aruba Networks, Inc.Control plane protection for various tables using storm prevention entries
US10263916B2 (en)2012-12-032019-04-16Hewlett Packard Enterprise Development LpSystem and method for message handling in a network device
US20160088005A1 (en)*2013-03-282016-03-24Emc CorporationMethod and system for risk-adaptive access control of an application action
US9240996B1 (en)*2013-03-282016-01-19Emc CorporationMethod and system for risk-adaptive access control of an application action
US9992213B2 (en)*2013-03-282018-06-05Emc CorporationRisk-adaptive access control of an application action based on threat detection data
US20160373447A1 (en)*2013-07-052016-12-22Nippon Telegraph And Telephone CorporationUnauthorized access detecting system and unauthorized access detecting method
US10142343B2 (en)*2013-07-052018-11-27Nippon Telegraph And Telephone CorporationUnauthorized access detecting system and unauthorized access detecting method
US10015176B2 (en)2013-07-152018-07-03Cyberseal Ltd.Network protection
US20150067816A1 (en)*2013-08-282015-03-05Cellco Partnership D/B/A Verizon WirelessAutomated security gateway
US9548993B2 (en)*2013-08-282017-01-17Verizon Patent And Licensing Inc.Automated security gateway
EP2843878A1 (en)*2013-08-302015-03-04Eco-Hive LimitedA monitoring arrangement
US9596213B2 (en)2013-08-302017-03-14Eco Hive LimitedMonitoring arrangement
US10130512B2 (en)2013-09-192018-11-20Natus Medical IncorporatedHeadgear for observation of eye movements
CN105659245A (en)*2013-11-062016-06-08迈克菲公司Context-aware network forensics
EP3066608A4 (en)*2013-11-062017-04-12McAfee, Inc.Context-aware network forensics
KR101836016B1 (en)*2013-11-062018-03-07맥아피, 엘엘씨Context-aware network forensics
US20220124183A1 (en)*2015-01-292022-04-21Splunk Inc.Facilitating custom content extraction rule configuration for remote capture agents
US11973852B2 (en)*2015-01-292024-04-30Splunk Inc.Generating event data at remote capture agents based on identified network addresses
US10616248B2 (en)2015-01-302020-04-07Anomali IncorporatedSpace and time efficient threat detection
US10230742B2 (en)*2015-01-302019-03-12Anomali IncorporatedSpace and time efficient threat detection
US20170063930A1 (en)*2015-08-242017-03-02Empow Cyber Security Ltd.Generation of cyber-attacks investigation policies
US10193919B2 (en)2015-08-242019-01-29Empow Cyber Security, LtdRisk-chain generation of cyber-threats
US10601853B2 (en)*2015-08-242020-03-24Empow Cyber Security Ltd.Generation of cyber-attacks investigation policies
US10686805B2 (en)2015-12-112020-06-16Servicenow, Inc.Computer network threat assessment
US10348687B2 (en)*2015-12-182019-07-09Worcester Polytechnic InstituteMethod and apparatus for using software defined networking and network function virtualization to secure residential networks
US10560452B2 (en)*2016-02-162020-02-11Fujitsu LimitedApparatus and method to control transfer apparatuses depending on a type of an unauthorized communication occurring in a network
US20170237733A1 (en)*2016-02-162017-08-17Fujitsu LimitedApparatus and method to control transfer apparatuses depending on a type of an unauthorized communication occurring in a network
US11750663B2 (en)2016-09-262023-09-05Splunk Inc.Threat identification-based collection of forensic data from endpoint devices
US11743285B2 (en)*2016-09-262023-08-29Splunk Inc.Correlating forensic and non-forensic data in an information technology environment
WO2018121157A1 (en)*2016-12-292018-07-05北京神州绿盟信息安全科技股份有限公司Network traffic anomaly detection method and apparatus
CN106506556A (en)*2016-12-292017-03-15北京神州绿盟信息安全科技股份有限公司A kind of network flow abnormal detecting method and device
US11451566B2 (en)2016-12-292022-09-20NSFOCUS Information Technology Co., Ltd.Network traffic anomaly detection method and apparatus
US11223640B2 (en)2017-05-032022-01-11Servicenow, Inc.Aggregating network security data for export
US11743278B2 (en)2017-05-032023-08-29Servicenow, Inc.Aggregating network security data for export
US10333960B2 (en)2017-05-032019-06-25Servicenow, Inc.Aggregating network security data for export
US11575703B2 (en)2017-05-052023-02-07Servicenow, Inc.Network security threat intelligence sharing
US11595423B2 (en)*2018-01-232023-02-28Rapid7, Inc.Honeypot network with dynamically updated alert modules for detecting anomalous connections
US11368474B2 (en)*2018-01-232022-06-21Rapid7, Inc.Detecting anomalous internet behavior
US20220286471A1 (en)*2018-01-232022-09-08Rapid7, Inc.Honeypot Network with Dynamically Updated Alert Modules for Detecting Anomalous Connections
CN108762905A (en)*2018-05-242018-11-06苏州乐麟无线信息科技有限公司A kind for the treatment of method and apparatus of multitask event
US10762192B2 (en)*2018-08-222020-09-01Paypal, Inc.Cleartext password detection using machine learning
US11711395B2 (en)2019-02-152023-07-25Verizon Patent And Licensing Inc.User-determined network traffic filtering
US11233816B2 (en)*2019-02-152022-01-25Verizon Patent And Licensing Inc.User-determined network traffic filtering
US11057428B1 (en)*2019-03-282021-07-06Rapid7, Inc.Honeytoken tracker
US11057429B1 (en)*2019-03-292021-07-06Rapid7, Inc.Honeytoken tracker
US10893060B2 (en)*2019-04-052021-01-12Material Security Inc.Defanging malicious electronic files based on trusted user reporting
US11856007B2 (en)2019-04-052023-12-26Material Security Inc.Defanging malicious electronic files based on trusted user reporting
US12149503B2 (en)*2019-07-122024-11-19Hitachi Astemo, Ltd.Gateway device
US20220224672A1 (en)*2019-07-122022-07-14Hitachi Astemo, Ltd.Gateway device
US11677758B2 (en)*2020-03-042023-06-13Cisco Technology, Inc.Minimizing data flow between computing infrastructures for email security
US11651067B2 (en)*2020-06-232023-05-16Acronis International GmbhSystems and methods for detecting stored passwords vulnerable to compromise
US20210397697A1 (en)*2020-06-232021-12-23Acronis International GmbhSystems and methods for detecting stored passwords vulnerable to compromise
US12282379B2 (en)*2020-10-152025-04-22State Farm Mutual Automobile Insurance CompanyError monitoring and prevention in computing systems based on future fault prediction and historical values of a network characteristic
US20240103946A1 (en)*2020-10-152024-03-28State Farm Mutual Automobile Insurance CompanyIntelligent error monitoring and alert
US11736440B2 (en)*2020-10-272023-08-22Centripetal Networks, LlcMethods and systems for efficient adaptive logging of cyber threat incidents
US20230095306A1 (en)*2020-10-272023-03-30Centripetal Networks, Inc.Methods and Systems for Efficient Adaptive Logging of Cyber Threat Incidents
US12113771B2 (en)2020-10-272024-10-08Centripetal Networks, LlcMethods and systems for efficient adaptive logging of cyber threat incidents
CN114124450A (en)*2021-10-152022-03-01广东电网有限责任公司广州供电局Network security system and method for remote storage battery capacity checking
US20230140706A1 (en)*2021-11-012023-05-04Recorded Future, Inc.Pipelined Malware Infrastructure Identification
CN114510402A (en)*2022-04-192022-05-17深圳市信润富联数字科技有限公司System application level performance monitoring system and method

Also Published As

Publication numberPublication date
US20140380456A1 (en)2014-12-25
US8832833B2 (en)2014-09-09
WO2006080930A1 (en)2006-08-03
US10326777B2 (en)2019-06-18
US20100257598A1 (en)2010-10-07

Similar Documents

PublicationPublication DateTitle
US10326777B2 (en)Integrated data traffic monitoring system
US8631495B2 (en)Systems and methods for message threat management
US9185127B2 (en)Network protection service
US9160755B2 (en)Trusted communication network
US20200106742A1 (en)Methods and Systems for Efficient Network Protection
US8108930B2 (en)Secure self-organizing and self-provisioning anomalous event detection systems
US7007302B1 (en)Efficient management and blocking of malicious code and hacking attempts in a network environment
EP1488316B1 (en)Systems and methods for enhancing electronic communication security
US20070097976A1 (en)Suspect traffic redirection
US20030110392A1 (en)Detecting intrusions
US20070244974A1 (en)Bounce Management in a Trusted Communication Network
US10135785B2 (en)Network security system to intercept inline domain name system requests
US20060010209A1 (en)Server for sending electronics messages
WO2007146690A2 (en)Systems and methods for graphically displaying messaging traffic
JP2006319982A (en)Worm-specifying and non-activating method and apparatus in communications network
US20060206615A1 (en)Systems and methods for dynamic and risk-aware network security
JP2009515426A (en) High reliability communication network
US7634809B1 (en)Detecting unsanctioned network servers
US20220239676A1 (en)Cyber-safety threat detection system
US20110185166A1 (en)Slider Control for Security Grouping and Enforcement
EP1629623A1 (en)Systems and methods for dynamic and risk-aware network security
US12425369B1 (en)Reflex-reaction server leakage containment system
Aljahdali et al.STREAMLINING THREAT RESPONSE AND AUTOMATING CRITICAL USE CASES WITH SECURITY ORCHESTRATION, AUTOMATION AND RESPONSE (SOAR)

Legal Events

DateCodeTitleDescription
STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp