




| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US12/577,574US20100100961A1 (en) | 2002-10-31 | 2009-10-12 | Intrusion detection system |
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US42272002P | 2002-10-31 | 2002-10-31 | |
| US10/699,005US7603711B2 (en) | 2002-10-31 | 2003-10-30 | Intrusion detection system |
| US12/577,574US20100100961A1 (en) | 2002-10-31 | 2009-10-12 | Intrusion detection system |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/699,005ContinuationUS7603711B2 (en) | 2002-10-31 | 2003-10-30 | Intrusion detection system |
| Publication Number | Publication Date |
|---|---|
| US20100100961A1true US20100100961A1 (en) | 2010-04-22 |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/699,005Active2026-06-17US7603711B2 (en) | 2002-10-31 | 2003-10-30 | Intrusion detection system |
| US12/577,574AbandonedUS20100100961A1 (en) | 2002-10-31 | 2009-10-12 | Intrusion detection system |
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US10/699,005Active2026-06-17US7603711B2 (en) | 2002-10-31 | 2003-10-30 | Intrusion detection system |
| Country | Link |
|---|---|
| US (2) | US7603711B2 (en) |
| AU (1) | AU2003287419A1 (en) |
| WO (1) | WO2004042524A2 (en) |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102487339A (en)* | 2010-12-01 | 2012-06-06 | 中兴通讯股份有限公司 | Attack preventing method for network equipment and device |
| US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US9088618B1 (en)* | 2014-04-18 | 2015-07-21 | Kaspersky Lab Zao | System and methods for ensuring fault tolerance of antivirus protection realized in a virtual environment |
| US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
| US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
| US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
| US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US9117069B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Real-time vulnerability monitoring |
| US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| WO2015013376A3 (en)* | 2013-07-23 | 2015-11-26 | Crypteia Networks S.A. | Systems and methods for self-tuning network intrusion detection and prevention |
| JP2015231138A (en)* | 2014-06-05 | 2015-12-21 | 日本電信電話株式会社 | Cyber attack practice system, practice environment providing method, and, practice environment providing program |
| CN105471854A (en)* | 2015-11-18 | 2016-04-06 | 国网智能电网研究院 | Adaptive boundary abnormity detection method based on multistage strategies |
| US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US9392007B2 (en) | 2013-11-04 | 2016-07-12 | Crypteia Networks S.A. | System and method for identifying infected networks and systems from unknown attacks |
| CN111989678A (en)* | 2018-10-17 | 2020-11-24 | 松下电器(美国)知识产权公司 | Information processing apparatus, information processing method, and program |
| CN112100626A (en)* | 2020-09-24 | 2020-12-18 | 成都信息工程大学 | Development method for improving source code audit vulnerability hit rate |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US8392552B2 (en)* | 2000-09-28 | 2013-03-05 | Vig Acquisitions Ltd., L.L.C. | System and method for providing configurable security monitoring utilizing an integrated information system |
| US7627665B2 (en) | 2000-09-28 | 2009-12-01 | Barker Geoffrey T | System and method for providing configurable security monitoring utilizing an integrated information system |
| US6748343B2 (en) | 2000-09-28 | 2004-06-08 | Vigilos, Inc. | Method and process for configuring a premises for monitoring |
| US7664845B2 (en)* | 2002-01-15 | 2010-02-16 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
| US7543056B2 (en) | 2002-01-15 | 2009-06-02 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
| US7480715B1 (en)* | 2002-01-25 | 2009-01-20 | Vig Acquisitions Ltd., L.L.C. | System and method for performing a predictive threat assessment based on risk factors |
| US8209756B1 (en) | 2002-02-08 | 2012-06-26 | Juniper Networks, Inc. | Compound attack detection in a computer network |
| US7359962B2 (en)* | 2002-04-30 | 2008-04-15 | 3Com Corporation | Network security system integration |
| US8359650B2 (en)* | 2002-10-01 | 2013-01-22 | Skybox Secutiry Inc. | System, method and computer readable medium for evaluating potential attacks of worms |
| US8407798B1 (en) | 2002-10-01 | 2013-03-26 | Skybox Secutiry Inc. | Method for simulation aided security event management |
| US7603711B2 (en)* | 2002-10-31 | 2009-10-13 | Secnap Networks Security, LLC | Intrusion detection system |
| JP4161693B2 (en)* | 2002-11-25 | 2008-10-08 | 松下電器産業株式会社 | Multicarrier transmission apparatus, multicarrier reception apparatus, and multicarrier communication apparatus |
| US7219239B1 (en)* | 2002-12-02 | 2007-05-15 | Arcsight, Inc. | Method for batching events for transmission by software agent |
| US8176527B1 (en)* | 2002-12-02 | 2012-05-08 | Hewlett-Packard Development Company, L. P. | Correlation engine with support for time-based rules |
| US7243147B2 (en)* | 2002-12-30 | 2007-07-10 | Bellsouth Ip Corporation | Systems and methods for the detection and management of network assets |
| US7483972B2 (en)* | 2003-01-08 | 2009-01-27 | Cisco Technology, Inc. | Network security monitoring system |
| JP2006518080A (en) | 2003-02-14 | 2006-08-03 | プリベンシス,インコーポレイティド | Network audit and policy assurance system |
| US7895649B1 (en) | 2003-04-04 | 2011-02-22 | Raytheon Company | Dynamic rule generation for an enterprise intrusion detection system |
| US8127359B2 (en)* | 2003-04-11 | 2012-02-28 | Samir Gurunath Kelekar | Systems and methods for real-time network-based vulnerability assessment |
| US7308716B2 (en)* | 2003-05-20 | 2007-12-11 | International Business Machines Corporation | Applying blocking measures progressively to malicious network traffic |
| US7712133B2 (en)* | 2003-06-20 | 2010-05-04 | Hewlett-Packard Development Company, L.P. | Integrated intrusion detection system and method |
| US6985920B2 (en)* | 2003-06-23 | 2006-01-10 | Protego Networks Inc. | Method and system for determining intra-session event correlation across network address translation devices |
| US7406714B1 (en) | 2003-07-01 | 2008-07-29 | Symantec Corporation | Computer code intrusion detection system based on acceptable retrievals |
| US7568229B1 (en)* | 2003-07-01 | 2009-07-28 | Symantec Corporation | Real-time training for a computer code intrusion detection system |
| US7644365B2 (en)* | 2003-09-12 | 2010-01-05 | Cisco Technology, Inc. | Method and system for displaying network security incidents |
| US9027120B1 (en) | 2003-10-10 | 2015-05-05 | Hewlett-Packard Development Company, L.P. | Hierarchical architecture in a network security system |
| US8015604B1 (en)* | 2003-10-10 | 2011-09-06 | Arcsight Inc | Hierarchical architecture in a network security system |
| US7237267B2 (en)* | 2003-10-16 | 2007-06-26 | Cisco Technology, Inc. | Policy-based network security management |
| US8266177B1 (en) | 2004-03-16 | 2012-09-11 | Symantec Corporation | Empirical database access adjustment |
| US7225468B2 (en)* | 2004-05-07 | 2007-05-29 | Digital Security Networks, Llc | Methods and apparatus for computer network security using intrusion detection and prevention |
| US7523504B2 (en)* | 2004-08-02 | 2009-04-21 | Netiq Corporation | Methods, systems and computer program products for evaluating security of a network environment |
| US8176126B2 (en) | 2004-08-26 | 2012-05-08 | International Business Machines Corporation | System, method and program to limit rate of transferring messages from suspected spammers |
| KR100622670B1 (en)* | 2004-12-07 | 2006-09-19 | 한국전자통신연구원 | Real-time attack pattern detection system and method for unknown network attack |
| US7937755B1 (en) | 2005-01-27 | 2011-05-03 | Juniper Networks, Inc. | Identification of network policy violations |
| US7809826B1 (en)* | 2005-01-27 | 2010-10-05 | Juniper Networks, Inc. | Remote aggregation of network traffic profiling data |
| US7797411B1 (en) | 2005-02-02 | 2010-09-14 | Juniper Networks, Inc. | Detection and prevention of encapsulated network attacks using an intermediate device |
| US7444331B1 (en) | 2005-03-02 | 2008-10-28 | Symantec Corporation | Detecting code injection attacks against databases |
| US8046374B1 (en) | 2005-05-06 | 2011-10-25 | Symantec Corporation | Automatic training of a database intrusion detection system |
| US7558796B1 (en) | 2005-05-19 | 2009-07-07 | Symantec Corporation | Determining origins of queries for a database intrusion detection system |
| FR2887385B1 (en)* | 2005-06-15 | 2007-10-05 | Advestigo Sa | METHOD AND SYSTEM FOR REPORTING AND FILTERING MULTIMEDIA INFORMATION ON A NETWORK |
| GB0513375D0 (en) | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
| US8572733B1 (en)* | 2005-07-06 | 2013-10-29 | Raytheon Company | System and method for active data collection in a network security system |
| FR2888440A1 (en)* | 2005-07-08 | 2007-01-12 | France Telecom | METHOD AND SYSTEM FOR DETECTING INTRUSIONS |
| US7774361B1 (en) | 2005-07-08 | 2010-08-10 | Symantec Corporation | Effective aggregation and presentation of database intrusion incidents |
| US7690037B1 (en) | 2005-07-13 | 2010-03-30 | Symantec Corporation | Filtering training data for machine learning |
| US7882262B2 (en) | 2005-08-18 | 2011-02-01 | Cisco Technology, Inc. | Method and system for inline top N query computation |
| US7950058B1 (en) | 2005-09-01 | 2011-05-24 | Raytheon Company | System and method for collaborative information security correlation in low bandwidth environments |
| US8224761B1 (en) | 2005-09-01 | 2012-07-17 | Raytheon Company | System and method for interactive correlation rule design in a network security system |
| CN101258470B (en)* | 2005-09-07 | 2011-08-03 | 国际商业机器公司 | Automatic deployment of protection agents to devices connected to a distributed computer network |
| US9794272B2 (en)* | 2006-01-03 | 2017-10-17 | Alcatel Lucent | Method and apparatus for monitoring malicious traffic in communication networks |
| US7849185B1 (en) | 2006-01-10 | 2010-12-07 | Raytheon Company | System and method for attacker attribution in a network security system |
| US20070195776A1 (en)* | 2006-02-23 | 2007-08-23 | Zheng Danyang R | System and method for channeling network traffic |
| US8554536B2 (en)* | 2006-05-24 | 2013-10-08 | Verizon Patent And Licensing Inc. | Information operations support system, method, and computer program product |
| US8233388B2 (en) | 2006-05-30 | 2012-07-31 | Cisco Technology, Inc. | System and method for controlling and tracking network content flow |
| US8180873B2 (en)* | 2006-11-14 | 2012-05-15 | Fmr Llc | Detecting fraudulent activity |
| US8811156B1 (en) | 2006-11-14 | 2014-08-19 | Raytheon Company | Compressing n-dimensional data |
| WO2008098260A1 (en)* | 2007-02-09 | 2008-08-14 | Smobile Systems, Inc. | Off-line mms malware scanning system and method |
| US8413247B2 (en)* | 2007-03-14 | 2013-04-02 | Microsoft Corporation | Adaptive data collection for root-cause analysis and intrusion detection |
| US8955105B2 (en)* | 2007-03-14 | 2015-02-10 | Microsoft Corporation | Endpoint enabled for enterprise security assessment sharing |
| US8959568B2 (en)* | 2007-03-14 | 2015-02-17 | Microsoft Corporation | Enterprise security assessment sharing |
| US20080229419A1 (en)* | 2007-03-16 | 2008-09-18 | Microsoft Corporation | Automated identification of firewall malware scanner deficiencies |
| US8424094B2 (en)* | 2007-04-02 | 2013-04-16 | Microsoft Corporation | Automated collection of forensic evidence associated with a network security incident |
| EP1986391A1 (en)* | 2007-04-23 | 2008-10-29 | Mitsubishi Electric Corporation | Detecting anomalies in signalling flows |
| US20080295172A1 (en)* | 2007-05-22 | 2008-11-27 | Khushboo Bohacek | Method, system and computer-readable media for reducing undesired intrusion alarms in electronic communications systems and networks |
| WO2008148106A1 (en)* | 2007-05-25 | 2008-12-04 | New Jersey Institute Of Technology | Proactive test-based differentiation method and system to mitigate low rate dos attacks |
| EP2194677B1 (en)* | 2007-09-28 | 2012-11-14 | Nippon Telegraph and Telephone Corporation | Network monitoring device, network monitoring method, and network monitoring program |
| KR20090121579A (en)* | 2008-05-22 | 2009-11-26 | 주식회사 이베이지마켓 | System and method for checking vulnerability of server |
| US20100070776A1 (en)* | 2008-09-17 | 2010-03-18 | Shankar Raman | Logging system events |
| US10210162B1 (en) | 2010-03-29 | 2019-02-19 | Carbonite, Inc. | Log file management |
| US8364813B2 (en) | 2010-11-02 | 2013-01-29 | International Business Machines Corporation | Administering incident pools for event and alert analysis |
| US8386602B2 (en) | 2010-11-02 | 2013-02-26 | International Business Machines Corporation | Relevant alert delivery in a distributed processing system |
| US8621277B2 (en) | 2010-12-06 | 2013-12-31 | International Business Machines Corporation | Dynamic administration of component event reporting in a distributed processing system |
| US8868984B2 (en) | 2010-12-07 | 2014-10-21 | International Business Machines Corporation | Relevant alert delivery in a distributed processing system with event listeners and alert listeners |
| US8737231B2 (en) | 2010-12-07 | 2014-05-27 | International Business Machines Corporation | Dynamic administration of event pools for relevant event and alert analysis during event storms |
| US8805999B2 (en) | 2010-12-07 | 2014-08-12 | International Business Machines Corporation | Administering event reporting rules in a distributed processing system |
| CN102025785B (en)* | 2010-12-24 | 2012-11-07 | 汉柏科技有限公司 | Method for monitoring safety of network through WEB |
| US8756462B2 (en) | 2011-05-24 | 2014-06-17 | International Business Machines Corporation | Configurable alert delivery for reducing the amount of alerts transmitted in a distributed processing system |
| US8645757B2 (en) | 2011-05-26 | 2014-02-04 | International Business Machines Corporation | Administering incident pools for event and alert analysis |
| US9213621B2 (en) | 2011-05-27 | 2015-12-15 | International Business Machines Corporation | Administering event pools for relevant event analysis in a distributed processing system |
| US8676883B2 (en) | 2011-05-27 | 2014-03-18 | International Business Machines Corporation | Event management in a distributed processing system |
| US8392385B2 (en) | 2011-06-22 | 2013-03-05 | International Business Machines Corporation | Flexible event data content management for relevant event and alert analysis within a distributed processing system |
| US9419650B2 (en) | 2011-06-22 | 2016-08-16 | International Business Machines Corporation | Flexible event data content management for relevant event and alert analysis within a distributed processing system |
| US8880943B2 (en) | 2011-06-22 | 2014-11-04 | International Business Machines Corporation | Restarting event and alert analysis after a shutdown in a distributed processing system |
| US8713366B2 (en) | 2011-06-22 | 2014-04-29 | International Business Machines Corporation | Restarting event and alert analysis after a shutdown in a distributed processing system |
| US9178936B2 (en) | 2011-10-18 | 2015-11-03 | International Business Machines Corporation | Selected alert delivery in a distributed processing system |
| US20130097272A1 (en)* | 2011-10-18 | 2013-04-18 | International Business Machines Corporation | Prioritized Alert Delivery In A Distributed Processing System |
| US8887175B2 (en) | 2011-10-18 | 2014-11-11 | International Business Machines Corporation | Administering incident pools for event and alert analysis |
| US20130097215A1 (en) | 2011-10-18 | 2013-04-18 | International Business Machines Corporation | Selected Alert Delivery In A Distributed Processing System |
| US9094288B1 (en)* | 2011-10-26 | 2015-07-28 | Narus, Inc. | Automated discovery, attribution, analysis, and risk assessment of security threats |
| US8713581B2 (en) | 2011-10-27 | 2014-04-29 | International Business Machines Corporation | Selected alert delivery in a distributed processing system |
| US9137258B2 (en)* | 2012-02-01 | 2015-09-15 | Brightpoint Security, Inc. | Techniques for sharing network security event information |
| US9710644B2 (en)* | 2012-02-01 | 2017-07-18 | Servicenow, Inc. | Techniques for sharing network security event information |
| US8914406B1 (en) | 2012-02-01 | 2014-12-16 | Vorstack, Inc. | Scalable network security with fast response protocol |
| AU2013272215B2 (en) | 2012-03-22 | 2017-10-12 | Imperial Innovations Limited | Anomaly detection to identify coordinated group attacks in computer networks |
| WO2013184099A1 (en) | 2012-06-05 | 2013-12-12 | Empire Technology Development, Llc | Cross-user correlation for detecting server-side multi-target intrusion |
| US9715325B1 (en) | 2012-06-21 | 2017-07-25 | Open Text Corporation | Activity stream based interaction |
| US9043920B2 (en) | 2012-06-27 | 2015-05-26 | Tenable Network Security, Inc. | System and method for identifying exploitable weak points in a network |
| US9088606B2 (en) | 2012-07-05 | 2015-07-21 | Tenable Network Security, Inc. | System and method for strategic anti-malware monitoring |
| US8954811B2 (en) | 2012-08-06 | 2015-02-10 | International Business Machines Corporation | Administering incident pools for incident analysis |
| US8943366B2 (en) | 2012-08-09 | 2015-01-27 | International Business Machines Corporation | Administering checkpoints for incident analysis |
| US9021599B2 (en)* | 2013-03-13 | 2015-04-28 | Google Inc. | Protecting privacy via a gateway |
| US9467464B2 (en) | 2013-03-15 | 2016-10-11 | Tenable Network Security, Inc. | System and method for correlating log data to discover network vulnerabilities and assets |
| EP2785009A1 (en) | 2013-03-29 | 2014-10-01 | British Telecommunications public limited company | Method and apparatus for detecting a multi-stage event |
| EP2785008A1 (en)* | 2013-03-29 | 2014-10-01 | British Telecommunications public limited company | Method and apparatus for detecting a multi-stage event |
| US9361184B2 (en) | 2013-05-09 | 2016-06-07 | International Business Machines Corporation | Selecting during a system shutdown procedure, a restart incident checkpoint of an incident analyzer in a distributed processing system |
| US9170860B2 (en) | 2013-07-26 | 2015-10-27 | International Business Machines Corporation | Parallel incident processing |
| US9658902B2 (en) | 2013-08-22 | 2017-05-23 | Globalfoundries Inc. | Adaptive clock throttling for event processing |
| US9256482B2 (en) | 2013-08-23 | 2016-02-09 | International Business Machines Corporation | Determining whether to send an alert in a distributed processing system |
| US9602337B2 (en) | 2013-09-11 | 2017-03-21 | International Business Machines Corporation | Event and alert analysis in a distributed processing system |
| US9086968B2 (en) | 2013-09-11 | 2015-07-21 | International Business Machines Corporation | Checkpointing for delayed alert creation |
| US9389943B2 (en) | 2014-01-07 | 2016-07-12 | International Business Machines Corporation | Determining a number of unique incidents in a plurality of incidents for incident processing in a distributed processing system |
| US9485262B1 (en)* | 2014-03-28 | 2016-11-01 | Juniper Networks, Inc. | Detecting past intrusions and attacks based on historical network traffic information |
| WO2015200211A1 (en) | 2014-06-22 | 2015-12-30 | Webroot Inc. | Network threat prediction and blocking |
| EP3095034B1 (en) | 2014-10-21 | 2019-05-29 | Ironnet Cybersecurity, Inc. | Cybersecurity system |
| US9690928B2 (en)* | 2014-10-25 | 2017-06-27 | Mcafee, Inc. | Computing platform security methods and apparatus |
| US9571517B2 (en) | 2014-11-11 | 2017-02-14 | Goldman, Sachs & Co. | Synthetic cyber-risk model for vulnerability determination |
| US9591022B2 (en) | 2014-12-17 | 2017-03-07 | The Boeing Company | Computer defenses and counterattacks |
| US9648036B2 (en) | 2014-12-29 | 2017-05-09 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
| CN105871775B (en)* | 2015-01-19 | 2019-03-12 | 中国移动通信集团公司 | A security protection method and DPMA protection model |
| US10282455B2 (en)* | 2015-04-20 | 2019-05-07 | Splunk Inc. | Display of data ingestion information based on counting generated events |
| US10817544B2 (en) | 2015-04-20 | 2020-10-27 | Splunk Inc. | Scaling available storage based on counting generated events |
| US10395133B1 (en) | 2015-05-08 | 2019-08-27 | Open Text Corporation | Image box filtering for optical character recognition |
| US10599844B2 (en) | 2015-05-12 | 2020-03-24 | Webroot, Inc. | Automatic threat detection of executable files based on static data analysis |
| US10289686B1 (en) | 2015-06-30 | 2019-05-14 | Open Text Corporation | Method and system for using dynamic content types |
| US10454950B1 (en)* | 2015-06-30 | 2019-10-22 | Fireeye, Inc. | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
| US10701104B2 (en)* | 2015-08-18 | 2020-06-30 | Acronis International Gmbh | Agentless security of virtual machines using a network interface controller |
| US20170054686A1 (en)* | 2015-08-18 | 2017-02-23 | Konstantin Malkov | Agentless Security of Virtual Machines using a Filtering Platform |
| US10425447B2 (en)* | 2015-08-28 | 2019-09-24 | International Business Machines Corporation | Incident response bus for data security incidents |
| US10742480B2 (en) | 2015-10-12 | 2020-08-11 | Vmware, Inc. | Network management as a service (MaaS) using reverse session-origination (RSO) tunnel |
| US10609110B2 (en) | 2015-10-12 | 2020-03-31 | Vmware, Inc. | Remote access over internet using reverse session-origination (RSO) tunnel |
| US10284631B2 (en)* | 2015-10-12 | 2019-05-07 | Vmware, Inc. | Management-as-a-service for on-premises information-technology systems |
| JP2017079042A (en)* | 2015-10-22 | 2017-04-27 | 富士通株式会社 | Attention alert action support program, attention alert action support device, and attention alert action support method |
| AU2016367922B2 (en) | 2015-12-11 | 2019-08-08 | Servicenow, Inc. | Computer network threat assessment |
| US9965633B2 (en) | 2015-12-29 | 2018-05-08 | Sap Se | Using code similarities for improving auditing and fixing of SAST-discovered code vulnerabilities |
| HK1257367B (en) | 2016-07-14 | 2020-06-12 | IronNet Cybersecurity, Inc. | Simulation and virtual reality based cyber behavioral system |
| US10237300B2 (en) | 2017-04-06 | 2019-03-19 | Microsoft Technology Licensing, Llc | System and method for detecting directed cyber-attacks targeting a particular set of cloud based machines |
| US11271967B2 (en)* | 2017-05-02 | 2022-03-08 | International Business Machines Corporation | Methods and systems for cyber-hacking detection |
| US10333960B2 (en) | 2017-05-03 | 2019-06-25 | Servicenow, Inc. | Aggregating network security data for export |
| US20180324207A1 (en) | 2017-05-05 | 2018-11-08 | Servicenow, Inc. | Network security threat intelligence sharing |
| US10432647B2 (en) | 2017-06-27 | 2019-10-01 | Honeywell International Inc. | Malicious industrial internet of things node activity detection for connected plants |
| US11128648B2 (en) | 2018-01-02 | 2021-09-21 | Maryam AMIRMAZLAGHANI | Generalized likelihood ratio test (GLRT) based network intrusion detection system in wavelet domain |
| US10728034B2 (en) | 2018-02-23 | 2020-07-28 | Webroot Inc. | Security privilege escalation exploit detection and mitigation |
| US11314863B2 (en) | 2019-03-27 | 2022-04-26 | Webroot, Inc. | Behavioral threat detection definition and compilation |
| US20250175472A1 (en)* | 2023-11-27 | 2025-05-29 | Micro Focus Llc | Global signal analytics |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US5991881A (en)* | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system |
| US6088804A (en)* | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
| US6119236A (en)* | 1996-10-07 | 2000-09-12 | Shipley; Peter M. | Intelligent network security device and method |
| US6282546B1 (en)* | 1998-06-30 | 2001-08-28 | Cisco Technology, Inc. | System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment |
| US6477651B1 (en)* | 1999-01-08 | 2002-11-05 | Cisco Technology, Inc. | Intrusion detection system and method having dynamically loaded signatures |
| US20020178383A1 (en)* | 2001-01-25 | 2002-11-28 | Michael Hrabik | Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures |
| US20030009696A1 (en)* | 2001-05-18 | 2003-01-09 | Bunker V. Nelson Waldo | Network security testing |
| US6519703B1 (en)* | 2000-04-14 | 2003-02-11 | James B. Joyce | Methods and apparatus for heuristic firewall |
| US20030188194A1 (en)* | 2002-03-29 | 2003-10-02 | David Currie | Method and apparatus for real-time security verification of on-line services |
| US20040117658A1 (en)* | 2002-09-27 | 2004-06-17 | Andrea Klaes | Security monitoring and intrusion detection system |
| US7076803B2 (en)* | 2002-01-28 | 2006-07-11 | International Business Machines Corporation | Integrated intrusion detection services |
| US7152242B2 (en)* | 2002-09-11 | 2006-12-19 | Enterasys Networks, Inc. | Modular system for detecting, filtering and providing notice about attack events associated with network security |
| US20070136813A1 (en)* | 2005-12-08 | 2007-06-14 | Hsing-Kuo Wong | Method for eliminating invalid intrusion alerts |
| US7237008B1 (en)* | 2002-05-10 | 2007-06-26 | Mcafee, Inc. | Detecting malware carried by an e-mail message |
| US20070226803A1 (en)* | 2006-03-22 | 2007-09-27 | Woonyon Kim | System and method for detecting internet worm traffics through classification of traffic characteristics by types |
| US20070240218A1 (en)* | 2006-04-06 | 2007-10-11 | George Tuvell | Malware Detection System and Method for Mobile Platforms |
| US20080086773A1 (en)* | 2006-10-06 | 2008-04-10 | George Tuvell | System and method of reporting and visualizing malware on mobile networks |
| US20080086776A1 (en)* | 2006-10-06 | 2008-04-10 | George Tuvell | System and method of malware sample collection on mobile networks |
| US20080263661A1 (en)* | 2007-04-23 | 2008-10-23 | Mitsubishi Electric Corporation | Detecting anomalies in signaling flows |
| US20080301810A1 (en)* | 2007-06-04 | 2008-12-04 | Agilent Technologies, Inc. | Monitoring apparatus and method therefor |
| US20090077663A1 (en)* | 2007-09-17 | 2009-03-19 | Alcatel Lucent | Score-based intrusion prevention system |
| US7603711B2 (en)* | 2002-10-31 | 2009-10-13 | Secnap Networks Security, LLC | Intrusion detection system |
| US7631354B2 (en)* | 2004-12-30 | 2009-12-08 | Intel Corporation | System security agent authentication and alert distribution |
| US7673342B2 (en)* | 2001-07-26 | 2010-03-02 | Mcafee, Inc. | Detecting e-mail propagated malware |
| US20100154059A1 (en)* | 2008-12-11 | 2010-06-17 | Kindsight | Network based malware detection and reporting |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| FR2706652B1 (en) | 1993-06-09 | 1995-08-18 | Alsthom Cge Alcatel | Device for detecting intrusions and suspicious users for a computer system and security system comprising such a device. |
| US5878420A (en) | 1995-08-31 | 1999-03-02 | Compuware Corporation | Network monitoring and management system |
| US5898830A (en) | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency |
| JP3165366B2 (en) | 1996-02-08 | 2001-05-14 | 株式会社日立製作所 | Network security system |
| US6453345B2 (en) | 1996-11-06 | 2002-09-17 | Datadirect Networks, Inc. | Network security and surveillance system |
| US6279113B1 (en) | 1998-03-16 | 2001-08-21 | Internet Tools, Inc. | Dynamic signature inspection-based network intrusion detection |
| US6578147B1 (en) | 1999-01-15 | 2003-06-10 | Cisco Technology, Inc. | Parallel intrusion detection sensors with load balancing for high speed networks |
| US6971028B1 (en)* | 1999-08-30 | 2005-11-29 | Symantec Corporation | System and method for tracking the source of a computer attack |
| US6769066B1 (en) | 1999-10-25 | 2004-07-27 | Visa International Service Association | Method and apparatus for training a neural network model for use in computer network intrusion detection |
| US6611869B1 (en) | 1999-10-28 | 2003-08-26 | Networks Associates, Inc. | System and method for providing trustworthy network security concern communication in an active security management environment |
| GB2362076B (en) | 2000-05-03 | 2002-08-14 | 3Com Corp | Detection of an attack such as a pre-attack on a computer network |
| US7134141B2 (en)* | 2000-06-12 | 2006-11-07 | Hewlett-Packard Development Company, L.P. | System and method for host and network based intrusion detection and response |
| US7406713B2 (en) | 2000-08-18 | 2008-07-29 | Invicta Networks, Inc. | Systems and methods for distributed network protection |
| US20030051026A1 (en)* | 2001-01-19 | 2003-03-13 | Carter Ernst B. | Network surveillance and security system |
| WO2002071227A1 (en)* | 2001-03-01 | 2002-09-12 | Cyber Operations, Llc | System and method for anti-network terrorism |
| US7379993B2 (en)* | 2001-09-13 | 2008-05-27 | Sri International | Prioritizing Bayes network alerts |
| US20030084349A1 (en)* | 2001-10-12 | 2003-05-01 | Oliver Friedrichs | Early warning system for network attacks |
| US20030084319A1 (en)* | 2001-10-31 | 2003-05-01 | Tarquini Richard Paul | Node, method and computer readable medium for inserting an intrusion prevention system into a network stack |
| US7222366B2 (en)* | 2002-01-28 | 2007-05-22 | International Business Machines Corporation | Intrusion event filtering |
| US20040006704A1 (en)* | 2002-07-02 | 2004-01-08 | Dahlstrom Dale A. | System and method for determining security vulnerabilities |
| US7017186B2 (en)* | 2002-07-30 | 2006-03-21 | Steelcloud, Inc. | Intrusion detection system using self-organizing clusters |
| US6952779B1 (en)* | 2002-10-01 | 2005-10-04 | Gideon Cohen | System and method for risk detection and analysis in a computer network |
| US7596807B2 (en)* | 2003-07-03 | 2009-09-29 | Arbor Networks, Inc. | Method and system for reducing scope of self-propagating attack code in network |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6119236A (en)* | 1996-10-07 | 2000-09-12 | Shipley; Peter M. | Intelligent network security device and method |
| US6304975B1 (en)* | 1996-10-07 | 2001-10-16 | Peter M. Shipley | Intelligent network security device and method |
| US5991881A (en)* | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system |
| US6088804A (en)* | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
| US6282546B1 (en)* | 1998-06-30 | 2001-08-28 | Cisco Technology, Inc. | System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment |
| US6477651B1 (en)* | 1999-01-08 | 2002-11-05 | Cisco Technology, Inc. | Intrusion detection system and method having dynamically loaded signatures |
| US6519703B1 (en)* | 2000-04-14 | 2003-02-11 | James B. Joyce | Methods and apparatus for heuristic firewall |
| US20020178383A1 (en)* | 2001-01-25 | 2002-11-28 | Michael Hrabik | Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures |
| US20030009696A1 (en)* | 2001-05-18 | 2003-01-09 | Bunker V. Nelson Waldo | Network security testing |
| US7673342B2 (en)* | 2001-07-26 | 2010-03-02 | Mcafee, Inc. | Detecting e-mail propagated malware |
| US7076803B2 (en)* | 2002-01-28 | 2006-07-11 | International Business Machines Corporation | Integrated intrusion detection services |
| US20030188194A1 (en)* | 2002-03-29 | 2003-10-02 | David Currie | Method and apparatus for real-time security verification of on-line services |
| US7237008B1 (en)* | 2002-05-10 | 2007-06-26 | Mcafee, Inc. | Detecting malware carried by an e-mail message |
| US20110173677A1 (en)* | 2002-05-10 | 2011-07-14 | Mcafee, Inc., A Delaware Corporation | Detecting malware carried by an e-mail message |
| US7152242B2 (en)* | 2002-09-11 | 2006-12-19 | Enterasys Networks, Inc. | Modular system for detecting, filtering and providing notice about attack events associated with network security |
| US20040117658A1 (en)* | 2002-09-27 | 2004-06-17 | Andrea Klaes | Security monitoring and intrusion detection system |
| US7603711B2 (en)* | 2002-10-31 | 2009-10-13 | Secnap Networks Security, LLC | Intrusion detection system |
| US7631354B2 (en)* | 2004-12-30 | 2009-12-08 | Intel Corporation | System security agent authentication and alert distribution |
| US20070136813A1 (en)* | 2005-12-08 | 2007-06-14 | Hsing-Kuo Wong | Method for eliminating invalid intrusion alerts |
| US20070226803A1 (en)* | 2006-03-22 | 2007-09-27 | Woonyon Kim | System and method for detecting internet worm traffics through classification of traffic characteristics by types |
| US20070240218A1 (en)* | 2006-04-06 | 2007-10-11 | George Tuvell | Malware Detection System and Method for Mobile Platforms |
| US20070240217A1 (en)* | 2006-04-06 | 2007-10-11 | George Tuvell | Malware Modeling Detection System And Method for Mobile Platforms |
| US20080086776A1 (en)* | 2006-10-06 | 2008-04-10 | George Tuvell | System and method of malware sample collection on mobile networks |
| US20080086773A1 (en)* | 2006-10-06 | 2008-04-10 | George Tuvell | System and method of reporting and visualizing malware on mobile networks |
| US20080263661A1 (en)* | 2007-04-23 | 2008-10-23 | Mitsubishi Electric Corporation | Detecting anomalies in signaling flows |
| US20080301810A1 (en)* | 2007-06-04 | 2008-12-04 | Agilent Technologies, Inc. | Monitoring apparatus and method therefor |
| US20090077663A1 (en)* | 2007-09-17 | 2009-03-19 | Alcatel Lucent | Score-based intrusion prevention system |
| US20100154059A1 (en)* | 2008-12-11 | 2010-06-17 | Kindsight | Network based malware detection and reporting |
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US10104110B2 (en) | 2003-07-01 | 2018-10-16 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US10154055B2 (en) | 2003-07-01 | 2018-12-11 | Securityprofiling, Llc | Real-time vulnerability monitoring |
| US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
| US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
| US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
| US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US10021124B2 (en) | 2003-07-01 | 2018-07-10 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
| US9117069B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Real-time vulnerability monitoring |
| US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US9225686B2 (en) | 2003-07-01 | 2015-12-29 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
| US10050988B2 (en) | 2003-07-01 | 2018-08-14 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
| CN102487339A (en)* | 2010-12-01 | 2012-06-06 | 中兴通讯股份有限公司 | Attack preventing method for network equipment and device |
| US9319425B2 (en) | 2013-07-23 | 2016-04-19 | Crypteia Networks S.A. | Systems and methods for self-tuning network intrusion detection and prevention |
| WO2015013376A3 (en)* | 2013-07-23 | 2015-11-26 | Crypteia Networks S.A. | Systems and methods for self-tuning network intrusion detection and prevention |
| US9392007B2 (en) | 2013-11-04 | 2016-07-12 | Crypteia Networks S.A. | System and method for identifying infected networks and systems from unknown attacks |
| US9088618B1 (en)* | 2014-04-18 | 2015-07-21 | Kaspersky Lab Zao | System and methods for ensuring fault tolerance of antivirus protection realized in a virtual environment |
| JP2015231138A (en)* | 2014-06-05 | 2015-12-21 | 日本電信電話株式会社 | Cyber attack practice system, practice environment providing method, and, practice environment providing program |
| CN105471854A (en)* | 2015-11-18 | 2016-04-06 | 国网智能电网研究院 | Adaptive boundary abnormity detection method based on multistage strategies |
| CN111989678A (en)* | 2018-10-17 | 2020-11-24 | 松下电器(美国)知识产权公司 | Information processing apparatus, information processing method, and program |
| CN112100626A (en)* | 2020-09-24 | 2020-12-18 | 成都信息工程大学 | Development method for improving source code audit vulnerability hit rate |
| Publication number | Publication date |
|---|---|
| AU2003287419A8 (en) | 2004-06-07 |
| WO2004042524A3 (en) | 2004-11-18 |
| US20040098623A1 (en) | 2004-05-20 |
| WO2004042524A2 (en) | 2004-05-21 |
| AU2003287419A1 (en) | 2004-06-07 |
| US7603711B2 (en) | 2009-10-13 |
| Publication | Publication Date | Title |
|---|---|---|
| US7603711B2 (en) | Intrusion detection system | |
| Bace et al. | Intrusion detection systems | |
| Bace et al. | NIST special publication on intrusion detection systems | |
| CN100448203C (en) | Systems and methods for identifying and preventing malicious intrusions | |
| US20150047032A1 (en) | System and method for computer security | |
| US20030188189A1 (en) | Multi-level and multi-platform intrusion detection and response system | |
| US20120084866A1 (en) | Methods, systems, and media for measuring computer security | |
| US20060150249A1 (en) | Method and apparatus for predictive and actual intrusion detection on a network | |
| Tan et al. | Hiding intrusions: From the abnormal to the normal and beyond | |
| Mualfah et al. | Network forensics for detecting flooding attack on web server | |
| Aboelfotoh et al. | A review of cyber-security measuring and assessment methods for modern enterprises | |
| Kim et al. | DSS for computer security incident response applying CBR and collaborative response | |
| Kurundkar et al. | Network intrusion detection using Snort | |
| Beigh et al. | Intrusion Detection and Prevention System: Classification and Quick | |
| Karie et al. | Cybersecurity incident response in the enterprise | |
| Jayasekara | Security operations & incident management: Case study analysis | |
| LaPadula | State of the art in anomaly detection and reaction | |
| Badea et al. | Computer networks security based on the detection of user's behavior | |
| Allan | Intrusion Detection Systems (IDSs): Perspective | |
| Vuppala et al. | Intrusion Detection & Prevention Systems-Sourcefire Snort | |
| Kanika | Security of network using Ids and firewall | |
| Satti et al. | Information security on Internet enterprise managed intrusion detection system (EMIDS) | |
| Nayak | Research on application of intrusion detection system in data mining | |
| Smaha et al. | Software Tools for Detecting Misuse on Unix Systems | |
| Asarcıklı | Firewall monitoring using intrusion detection systems |
| Date | Code | Title | Description |
|---|---|---|---|
| STCB | Information on status: application discontinuation | Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |