Movatterモバイル変換


[0]ホーム

URL:


US20060021021A1 - Security event data normalization - Google Patents

Security event data normalization
Download PDF

Info

Publication number
US20060021021A1
US20060021021A1US11/149,083US14908305AUS2006021021A1US 20060021021 A1US20060021021 A1US 20060021021A1US 14908305 AUS14908305 AUS 14908305AUS 2006021021 A1US2006021021 A1US 2006021021A1
Authority
US
United States
Prior art keywords
event
data
network
tag
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/149,083
Inventor
Rajesh Patel
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netforensics Inc
Original Assignee
HIGH TOWER SOFTWARE Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HIGH TOWER SOFTWARE IncfiledCriticalHIGH TOWER SOFTWARE Inc
Priority to US11/149,083priorityCriticalpatent/US20060021021A1/en
Assigned to HIGH TOWER SOFTWARE, INC.reassignmentHIGH TOWER SOFTWARE, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: RATEL, RAJESH
Publication of US20060021021A1publicationCriticalpatent/US20060021021A1/en
Priority to US12/418,815prioritypatent/US9060024B2/en
Assigned to NETFORENSICS, INC.reassignmentNETFORENSICS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HIGH TOWER SOFTWARE, INC.
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Normalizing security event data from multiple different network agents. The data from the multiple different agents is categorized and tagged with a descriptor that includes information about the nature of the event. Multiple different events from multiple different devices can therefore be evaluated using a common format which is common for the multiple different devices from different vendors.

Description

Claims (10)

US11/149,0832004-06-082005-06-08Security event data normalizationAbandonedUS20060021021A1 (en)

Priority Applications (2)

Application NumberPriority DateFiling DateTitle
US11/149,083US20060021021A1 (en)2004-06-082005-06-08Security event data normalization
US12/418,815US9060024B2 (en)2004-06-082009-04-06Security event data normalization

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US57828104P2004-06-082004-06-08
US11/149,083US20060021021A1 (en)2004-06-082005-06-08Security event data normalization

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US12/418,815ContinuationUS9060024B2 (en)2004-06-082009-04-06Security event data normalization

Publications (1)

Publication NumberPublication Date
US20060021021A1true US20060021021A1 (en)2006-01-26

Family

ID=35658788

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US11/149,083AbandonedUS20060021021A1 (en)2004-06-082005-06-08Security event data normalization
US12/418,815Expired - Fee RelatedUS9060024B2 (en)2004-06-082009-04-06Security event data normalization

Family Applications After (1)

Application NumberTitlePriority DateFiling Date
US12/418,815Expired - Fee RelatedUS9060024B2 (en)2004-06-082009-04-06Security event data normalization

Country Status (1)

CountryLink
US (2)US20060021021A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20080127299A1 (en)*2006-11-292008-05-29Novell, Inc.Techniques for secure event recording and processing
EP2020775A1 (en)*2007-08-032009-02-04Nokia Siemens Networks OyMethod of processing network related data, devices, system and computer program products
US20090284413A1 (en)*2006-07-042009-11-19Nxp B.V.Mobile device comprising a gps receiver
US20120158725A1 (en)*2010-10-122012-06-21Qualys, Inc.Dynamic hierarchical tagging system and method
US20130246565A1 (en)*2011-09-192013-09-19Qualcomn IncorporatedSending human input device commands over internet protocol
US20150358283A1 (en)*2014-06-042015-12-10Bank Of America CorporationFirewall Policy Converter
CN106407815A (en)*2016-09-302017-02-15北京奇虎科技有限公司Vulnerability detection method and device
US9667596B2 (en)2014-06-042017-05-30Bank Of America CorporationFirewall policy comparison
CN106911520A (en)*2017-04-122017-06-30曙光信息产业(北京)有限公司A kind of fault statistics method and apparatus towards HPC cluster
US20180278650A1 (en)*2014-09-142018-09-27Sophos LimitedNormalized indications of compromise
US20180314002A1 (en)*2017-04-282018-11-01Shinko Electric Industries Co., Ltd.Optical waveguide apparatus

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10057285B2 (en)*2009-01-302018-08-21Oracle International CorporationSystem and method for auditing governance, risk, and compliance using a pluggable correlation architecture
US10057726B2 (en)*2012-10-022018-08-21Razer (Asia-Pacific) Pte. Ltd.Managing user data on an electronic device
US20170178025A1 (en)*2015-12-222017-06-22Sap SeKnowledge base in enterprise threat detection
US20170178026A1 (en)*2015-12-222017-06-22Sap SeLog normalization in enterprise threat detection
US10075462B2 (en)2015-12-222018-09-11Sap SeSystem and user context in enterprise threat detection
US9900335B2 (en)2015-12-242018-02-20Visa International Service AssociationSystems and methods for prioritizing indicators of compromise
US11012457B1 (en)2019-11-152021-05-18Johnson Controls Technology CompanyBuilding security analysis system with site-independent signature generation for predictive security analysis
US20210294713A1 (en)*2020-03-202021-09-235thColumn LLCGeneration of an identification evaluation regarding a system aspect of a system
US11025590B1 (en)2020-08-192021-06-01Goldman Sachs & Co. LLCNetwork connectivity policy management system
US20220353279A1 (en)*2021-04-292022-11-03KnowBe4, Inc.Systems and methods for determination of indicators of malicious elements within messages

Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20020087882A1 (en)*2000-03-162002-07-04Bruce SchneierMehtod and system for dynamic network intrusion monitoring detection and response
US20030061506A1 (en)*2001-04-052003-03-27Geoffrey CooperSystem and method for security policy
US6597957B1 (en)*1999-12-202003-07-22Cisco Technology, Inc.System and method for consolidating and sorting event data
US6609205B1 (en)*1999-03-182003-08-19Cisco Technology, Inc.Network intrusion detection signature analysis using decision graphs
US20030188189A1 (en)*2002-03-272003-10-02Desai Anish P.Multi-level and multi-platform intrusion detection and response system
US20040193943A1 (en)*2003-02-132004-09-30Robert AngelinoMultiparameter network fault detection system using probabilistic and aggregation analysis
US20050015624A1 (en)*2003-06-092005-01-20Andrew GinterEvent monitoring and management
US7124375B1 (en)*1999-05-112006-10-17California Institute Of TechnologyColor monitoring and analysis for color vision deficient individuals
US20070050777A1 (en)*2003-06-092007-03-01Hutchinson Thomas WDuration of alerts and scanning of large data stores
US7272646B2 (en)*2000-06-162007-09-18Securify, Inc.Network monitor internals description

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5953263A (en)*1997-02-101999-09-14Rambus Inc.Synchronous memory device having a programmable register and method of controlling same
US6377987B1 (en)*1999-04-302002-04-23Cisco Technology, Inc.Mechanism for determining actual physical topology of network based on gathered configuration information representing true neighboring devices
US6650641B1 (en)*1999-07-022003-11-18Cisco Technology, Inc.Network address translation using a forwarding agent
US6856614B1 (en)*1999-12-242005-02-15Lara Networks, Inc.Method for a mixed voice and data device in a home communications network
US6724750B1 (en)*1999-12-242004-04-20Lara Networks, Inc.Method for a link to a wide area network device in a home communication network
US7130297B1 (en)*2000-03-062006-10-31Sun Peter C PArchitecture for a mixed voice and data network
US6895589B2 (en)*2000-06-122005-05-17Microsoft CorporationManager component for managing input from existing serial devices and added serial and non-serial devices in a similar manner
US6745011B1 (en)*2000-09-012004-06-01Telephia, Inc.System and method for measuring wireless device and network usage and performance metrics
US20020083146A1 (en)*2000-10-312002-06-27Glenn FergusonData model for automated server configuration
US7861303B2 (en)*2001-08-012010-12-28Mcafee, Inc.Malware scanning wireless service agent system and method
US20030084349A1 (en)*2001-10-122003-05-01Oliver FriedrichsEarly warning system for network attacks
US6883057B2 (en)*2002-02-152005-04-19International Business Machines CorporationMethod and apparatus embedding PCI-to-PCI bridge functions in PCI devices using PCI configuration header type 0
US20040044422A1 (en)*2002-07-032004-03-04Vadim FuxSystem and method for intelligent text input
US8479057B2 (en)*2002-11-042013-07-02Riverbed Technology, Inc.Aggregator for connection based anomaly detection
US8176527B1 (en)*2002-12-022012-05-08Hewlett-Packard Development Company, L. P.Correlation engine with support for time-based rules
US7219239B1 (en)*2002-12-022007-05-15Arcsight, Inc.Method for batching events for transmission by software agent
US7376969B1 (en)*2002-12-022008-05-20Arcsight, Inc.Real time monitoring and analysis of events from multiple network security devices
US7607169B1 (en)*2002-12-022009-10-20Arcsight, Inc.User interface for network security console
US7788722B1 (en)*2002-12-022010-08-31Arcsight, Inc.Modular agent for network security intrusion detection system
US7650638B1 (en)*2002-12-022010-01-19Arcsight, Inc.Network security monitoring system employing bi-directional communication
US7668953B1 (en)*2003-11-132010-02-23Cisco Technology, Inc.Rule-based network management approaches
US9401838B2 (en)*2003-12-032016-07-26Emc CorporationNetwork event capture and retention system
TWM253155U (en)*2004-02-172004-12-11Fine Appliance CorpIntegrated storage and network function interface card
US7100132B2 (en)*2004-03-012006-08-29Agilent Technologies, Inc.Source synchronous timing extraction, cyclization and sampling
US20070180490A1 (en)*2004-05-202007-08-02Renzi Silvio JSystem and method for policy management
US20060282878A1 (en)*2005-06-142006-12-14Stanley James CExpression of packet processing policies using file processing rules

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6609205B1 (en)*1999-03-182003-08-19Cisco Technology, Inc.Network intrusion detection signature analysis using decision graphs
US7124375B1 (en)*1999-05-112006-10-17California Institute Of TechnologyColor monitoring and analysis for color vision deficient individuals
US6597957B1 (en)*1999-12-202003-07-22Cisco Technology, Inc.System and method for consolidating and sorting event data
US20020087882A1 (en)*2000-03-162002-07-04Bruce SchneierMehtod and system for dynamic network intrusion monitoring detection and response
US7272646B2 (en)*2000-06-162007-09-18Securify, Inc.Network monitor internals description
US20030061506A1 (en)*2001-04-052003-03-27Geoffrey CooperSystem and method for security policy
US20030188189A1 (en)*2002-03-272003-10-02Desai Anish P.Multi-level and multi-platform intrusion detection and response system
US20040193943A1 (en)*2003-02-132004-09-30Robert AngelinoMultiparameter network fault detection system using probabilistic and aggregation analysis
US20050015624A1 (en)*2003-06-092005-01-20Andrew GinterEvent monitoring and management
US20070050777A1 (en)*2003-06-092007-03-01Hutchinson Thomas WDuration of alerts and scanning of large data stores
US20070294369A1 (en)*2003-06-092007-12-20Andrew GinterEvent monitoring and management
US20080209033A1 (en)*2003-06-092008-08-28Andrew GinterEvent monitoring and management

Cited By (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090284413A1 (en)*2006-07-042009-11-19Nxp B.V.Mobile device comprising a gps receiver
US7956801B2 (en)2006-07-042011-06-07Nxp B.V.Mobile device comprising a GPS receiver
US7934087B2 (en)2006-11-292011-04-26Novell, Inc.Techniques for secure event recording and processing
US20080127299A1 (en)*2006-11-292008-05-29Novell, Inc.Techniques for secure event recording and processing
EP2020775A1 (en)*2007-08-032009-02-04Nokia Siemens Networks OyMethod of processing network related data, devices, system and computer program products
US12250242B2 (en)2010-10-122025-03-11Qualys, Inc.Dynamic hierarchical tagging system and method
US20120158725A1 (en)*2010-10-122012-06-21Qualys, Inc.Dynamic hierarchical tagging system and method
US11012460B2 (en)2010-10-122021-05-18Qualys, Inc.Dynamic hierarchical tagging system and method
US11902313B2 (en)2010-10-122024-02-13Qualys, Inc.Dynamic hierarchical tagging system and method
US9613099B2 (en)*2010-10-122017-04-04Qualys, Inc.Dynamic hierarchical tagging system and method
US20130246565A1 (en)*2011-09-192013-09-19Qualcomn IncorporatedSending human input device commands over internet protocol
US9106651B2 (en)*2011-09-192015-08-11Qualcomm IncorporatedSending human input device commands over internet protocol
US20150358283A1 (en)*2014-06-042015-12-10Bank Of America CorporationFirewall Policy Converter
US9667596B2 (en)2014-06-042017-05-30Bank Of America CorporationFirewall policy comparison
US9391955B2 (en)*2014-06-042016-07-12Bank Of America CorporationFirewall policy converter
US20180278650A1 (en)*2014-09-142018-09-27Sophos LimitedNormalized indications of compromise
US10841339B2 (en)*2014-09-142020-11-17Sophos LimitedNormalized indications of compromise
CN106407815A (en)*2016-09-302017-02-15北京奇虎科技有限公司Vulnerability detection method and device
CN106911520A (en)*2017-04-122017-06-30曙光信息产业(北京)有限公司A kind of fault statistics method and apparatus towards HPC cluster
US20180314002A1 (en)*2017-04-282018-11-01Shinko Electric Industries Co., Ltd.Optical waveguide apparatus

Also Published As

Publication numberPublication date
US9060024B2 (en)2015-06-16
US20090276843A1 (en)2009-11-05

Similar Documents

PublicationPublication DateTitle
US9060024B2 (en)Security event data normalization
JP6526895B2 (en) Automatic mitigation of electronic message based security threats
US12047403B2 (en)Externally-driven network attack surface management
US20200358792A1 (en)Artificial intelligence (ai) based cyber threat analyst to support a cyber security appliance
US7926113B1 (en)System and method for managing network vulnerability analysis systems
US8301771B2 (en)Methods, systems, and computer program products for transmission control of sensitive application-layer data
US7644438B1 (en)Security event aggregation at software agent
US7895649B1 (en)Dynamic rule generation for an enterprise intrusion detection system
US8997236B2 (en)System, method and computer readable medium for evaluating a security characteristic
US8108930B2 (en)Secure self-organizing and self-provisioning anomalous event detection systems
US20030110392A1 (en)Detecting intrusions
OnwubikoCocoa: An ontology for cybersecurity operations centre analysis process
US8856315B2 (en)Device classification system
JP2016053979A (en)System and method for local protection against malicious software
CN110210213A (en)The method and device of filtering fallacious sample, storage medium, electronic device
US7634809B1 (en)Detecting unsanctioned network servers
HermanowskiOpen source security information management system supporting it security audit
Koulouris et al.SDN4S: Software defined networking for security
CN113726761A (en)Network security protection method based on white list
Nikolaienko et al.Application of the Threat Intelligence platformto increase the security of governmentinformation resources
Sharma et al.AI for Network Security
Mokhov et al.Automating MAC spoofer evidence gathering and encoding for investigations
US12425435B1 (en)Artificial intelligence for cyber threat intelligence
US12368730B2 (en)Automatic threat actor attribution based on multiple evidence
Aljahdali et al.STREAMLINING THREAT RESPONSE AND AUTOMATING CRITICAL USE CASES WITH SECURITY ORCHESTRATION, AUTOMATION AND RESPONSE (SOAR)

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:HIGH TOWER SOFTWARE, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RATEL, RAJESH;REEL/FRAME:017069/0816

Effective date:20050920

ASAssignment

Owner name:NETFORENSICS, INC., NEW JERSEY

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HIGH TOWER SOFTWARE, INC.;REEL/FRAME:022607/0271

Effective date:20090206

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp