Movatterモバイル変換


[0]ホーム

URL:


US20150067844A1 - System and methodology providing automation security analysis, validation, and learning in an industrial controller environment - Google Patents

System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
Download PDF

Info

Publication number
US20150067844A1
US20150067844A1US14/535,291US201414535291AUS2015067844A1US 20150067844 A1US20150067844 A1US 20150067844A1US 201414535291 AUS201414535291 AUS 201414535291AUS 2015067844 A1US2015067844 A1US 2015067844A1
Authority
US
United States
Prior art keywords
security
network
industrial
data
industrial controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US14/535,291
Inventor
David D. Brandt
Kenwood Hall
Mark Burton Anderson
Craig D. Anderson
George Bradford Collins
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Rockwell Automation Technologies Inc
Original Assignee
Rockwell Automation Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rockwell Automation Technologies IncfiledCriticalRockwell Automation Technologies Inc
Priority to US14/535,291priorityCriticalpatent/US20150067844A1/en
Assigned to ROCKWELL AUTOMATION TECHNOLOGIES, INC.reassignmentROCKWELL AUTOMATION TECHNOLOGIES, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HALL, KENWOOD, BRANDT, DAVID D., ANDERSON, CRAIG D., ANDERSON, MARK BURTON, COLLINS, GEORGE BRADFORD
Publication of US20150067844A1publicationCriticalpatent/US20150067844A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

The present invention relates to a system and methodology facilitating automation security in a networked-based industrial controller environment. Various components, systems and methodologies are provided to facilitate varying levels of automation security in accordance with security analysis tools, security validation tools and/or security learning systems. The security analysis tool receives abstract factory models or descriptions for input and generates an output that can include security guidelines, components, topologies, procedures, rules, policies, and the like for deployment in an automation security network. The validation tools are operative in the automation security network, wherein the tools perform security checking and/or auditing functions, for example, to determine if security components are in place and/or in suitable working order. The security learning system monitors/learns network traffic patterns during a learning phase, fires alarms or events based upon detected deviations from the learned patterns, and/or causes other automated actions to occur.

Description

Claims (20)

What is claimed is:
1. A system for providing security on an industrial network, comprising:
a memory that stores computer-executable components; and
a processor, operatively coupled to the memory, that executes the computer-executable components, the computer-executable components comprising:
a learning component configured to determine a first pattern of data communication between an industrial controller and an industrial asset device based on monitoring of data exchanged between the industrial controller and the industrial asset device via an automation network during a training period; and
an analyzer component configured to determine a second pattern of data communication based on monitoring of the data exchanged between the industrial controller and the industrial asset device subsequent to the training period, and to generate a security output in response to a determination that the second pattern of data communication deviates from the first pattern of data communication in excess of a defined deviation threshold,
wherein the security output is configured to alter a network traffic pattern between the industrial controller and the industrial asset device.
2. The system ofclaim 1, further comprising an interface component configured to receive input that modifies the defined deviation threshold.
3. The system ofclaim 1, wherein the security output is configured to disable network requests to access the industrial controller from another network that is different than the automation network.
4. The system ofclaim 1, wherein the data comprises at least one of input data received by the industrial controller from the industrial asset device and stored in an I/O memory space of the industrial controller or output data written to the I/O memory space by the industrial controller and sent to the industrial asset device.
5. The system ofclaim 1, wherein
the learning component is further configured to determine a first average number of network retries performed by the industrial controller during the training period, and
the analyzer component is further configured to generate another security output in response to determining that a second average number of network retries performed by the industrial controller subsequent to the training period exceeds the first average number of network retries in excess of a tolerance.
6. The system ofclaim 1, wherein the first pattern of data communication comprises an average number of data packet transfers between the industrial controller and the industrial asset device during a daily range of time.
7. The system ofclaim 1, wherein the security output is further configured to adjust a security parameter on at least one of the industrial controller, the industrial asset device, or a network device on the automation network.
8. The system ofclaim 1, wherein the analyzer component is further configured to set the security output based on model data that models the industrial controller, the industrial asset device, and one or more network pathways to at least one of the industrial controller or the industrial asset device.
9. The system ofclaim 8, wherein the analyzer is further configured to generate, based on analysis of the model, a recommendation output specifying a recommendation for implementing a security countermeasure for an industrial system comprising the industrial controller and the industrial asset device.
10. The system ofclaim 9, wherein the recommendation output specifies at least one of a recommended network architecture, a recommendation to connect an identified device of the industrial system to a router, or a recommended security component to be installed on an identified device of the industrial system.
11. A method for implementing industrial network security, comprising:
monitoring, by a system comprising a processor, first data exchange activity between an industrial controller and an industrial asset via a plant network during a training period;
determining, by the system based on the monitoring of the first data exchange activity, a first pattern of data communication between an industrial controller and an industrial asset device;
monitoring, by the system, second data exchange activity between the industrial controller and the industrial asset via the plant network subsequent to the training period;
determining, by the system based on the monitoring of the second data exchange activity, a second pattern of data communication between the industrial controller and the industrial asset device; and
in response to determining that the second pattern of data communication deviates from the first pattern of data communication in excess of a defined tolerance, generating a security output configured to alter a network traffic pattern between the industrial controller and the industrial asset device.
12. The method ofclaim 11, wherein the generating the security output comprises configuring the security output to disable network requests for access to the industrial controller originating from another network that is different than the plant network.
13. The method ofclaim 11, wherein the monitoring the first data exchange activity comprises monitoring at least one of input data received by the industrial controller from the industrial asset device and stored in an I/O memory space of the industrial controller or output data written to the I/O memory space by the industrial controller and sent to the industrial asset device.
14. The method ofclaim 11, further comprising:
determining, based on monitoring of a data register stored on the industrial controller, a first average number of network retries performed by the industrial controller during the training period; and
generating another security output in response to determining that a second average number of network retries performed by the industrial controller subsequent to the training period exceeds the first average number of network retries in excess of the defined tolerance.
15. The method ofclaim 11, wherein the determining the first pattern of data communication comprises determining an average number of data packet transfers between the industrial controller and the industrial asset device during a daily range of time.
16. The method ofclaim 11, wherein the generating the security output comprises configuring the security output to adjust a security parameter of at least one of the industrial controller, the industrial asset device, or a network device on the plant network.
17. The method ofclaim 11, wherein the generating the security output comprises configuring the security output based on model information that models the industrial controller, the industrial asset device, and one or more network pathways to at least one of the industrial controller or the industrial asset device.
18. A non-transitory computer-readable medium having stored thereon instructions that, in response to execution, cause a security analysis system comprising a processor to perform operations, the operations comprising:
determining a first pattern of data communication between an industrial controller and an industrial asset based on monitoring of first data exchanged between the industrial controller and the industrial asset device via an industrial network during a training period;
determining a second pattern of data communication based on monitoring of second data exchanged between the industrial controller and the industrial asset device after the training period; and
generating a security output in response to a determination that the second pattern of data communication deviates from the first pattern of data communication in excess of a defined tolerance, wherein the security output is configured to alter a network traffic pattern between the industrial controller and the industrial asset device.
19. The non-transitory computer-readable medium ofclaim 18, wherein the generating comprises configuring the security output to disable network requests for access to the industrial controller originating from another network that is different than the automation network.
20. The -transitory computer-readable medium ofclaim 18, wherein the generating comprises configuring the security output to adjust a security parameter on at least one of the industrial controller, the industrial asset device, or a network device on the industrial network.
US14/535,2912002-10-212014-11-06System and methodology providing automation security analysis, validation, and learning in an industrial controller environmentAbandonedUS20150067844A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/535,291US20150067844A1 (en)2002-10-212014-11-06System and methodology providing automation security analysis, validation, and learning in an industrial controller environment

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US42000602P2002-10-212002-10-21
US10/661,696US8909926B2 (en)2002-10-212003-09-12System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US14/535,291US20150067844A1 (en)2002-10-212014-11-06System and methodology providing automation security analysis, validation, and learning in an industrial controller environment

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US10/661,696ContinuationUS8909926B2 (en)2002-10-212003-09-12System and methodology providing automation security analysis, validation, and learning in an industrial controller environment

Publications (1)

Publication NumberPublication Date
US20150067844A1true US20150067844A1 (en)2015-03-05

Family

ID=32511422

Family Applications (2)

Application NumberTitlePriority DateFiling Date
US10/661,696Active2029-12-06US8909926B2 (en)2002-10-212003-09-12System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US14/535,291AbandonedUS20150067844A1 (en)2002-10-212014-11-06System and methodology providing automation security analysis, validation, and learning in an industrial controller environment

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US10/661,696Active2029-12-06US8909926B2 (en)2002-10-212003-09-12System and methodology providing automation security analysis, validation, and learning in an industrial controller environment

Country Status (2)

CountryLink
US (2)US8909926B2 (en)
EP (1)EP1420317B1 (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20150058961A1 (en)*2012-06-052015-02-26Broadcom CorporationAuthenticating users based upon an identity footprint
US10318903B2 (en)2016-05-062019-06-11General Electric CompanyConstrained cash computing system to optimally schedule aircraft repair capacity with closed loop dynamic physical state and asset utilization attainment control
US20190379703A1 (en)*2018-06-062019-12-12Reliaquest Holdings, LlcThreat mitigation system and method
US10841322B2 (en)2018-01-182020-11-17General Electric CompanyDecision system and method for separating faults from attacks
USD926200S1 (en)2019-06-062021-07-27Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926809S1 (en)2019-06-052021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926782S1 (en)2019-06-062021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926810S1 (en)2019-06-052021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926811S1 (en)2019-06-062021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
US11086988B1 (en)2020-02-282021-08-10Nanotronics Imaging, Inc.Method, systems and apparatus for intelligently emulating factory control systems and simulating response data
US11100221B2 (en)2019-10-082021-08-24Nanotronics Imaging, Inc.Dynamic monitoring and securing of factory processes, equipment and automated systems
US11163890B2 (en)2019-10-092021-11-02United States Of America As Represented By The Secretary Of The NavySelf-targeting method of automated cybersecurity analysis on an operating system
US20220353290A1 (en)*2019-09-092022-11-03Reliaquest Holdings, LlcThreat mitigation system and method
US11706235B2 (en)*2020-08-062023-07-18Robert Bosch GmbhMethod and device for processing data of a technical system
US11709946B2 (en)2018-06-062023-07-25Reliaquest Holdings, LlcThreat mitigation system and method
US12140926B2 (en)2019-02-282024-11-12Nanotronics Imaging, Inc.Assembly error correction for assembly lines
US12153668B2 (en)2019-11-202024-11-26Nanotronics Imaging, Inc.Securing industrial production from sophisticated attacks
US12153412B2 (en)2019-06-242024-11-26Nanotronics Imaging, Inc.Predictive process control for a manufacturing process
US12153401B2 (en)2019-11-062024-11-26Nanotronics Imaging, Inc.Systems, methods, and media for manufacturing processes
US12153408B2 (en)2019-11-062024-11-26Nanotronics Imaging, Inc.Systems, methods, and media for manufacturing processes
US12155673B2 (en)2019-12-192024-11-26Nanotronics Imaging, Inc.Dynamic monitoring and securing of factory processes, equipment and automated systems
US12165353B2 (en)2019-11-062024-12-10Nanotronics Imaging, Inc.Systems, methods, and media for manufacturing processes
EP4589883A1 (en)*2024-01-172025-07-23Abb Schweiz AgComputer-implemented method and system for automatically generating a security configuration for a control system

Families Citing this family (349)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20070112512A1 (en)*1987-09-282007-05-17Verizon Corporate Services Group Inc.Methods and systems for locating source of computer-originated attack based on GPS equipped computing device
US7708189B1 (en)2002-05-172010-05-04Cipriano Joseph JIdentification verification system and method
US9009084B2 (en)*2002-10-212015-04-14Rockwell Automation Technologies, Inc.System and methodology providing automation security analysis and network intrusion protection in an industrial environment
US7467018B1 (en)2002-11-182008-12-16Rockwell Automation Technologies, Inc.Embedded database systems and methods in an industrial controller environment
US20110202565A1 (en)*2002-12-312011-08-18American Express Travel Related Services Company, Inc.Method and system for implementing and managing an enterprise identity management for distributed security in a computer system
US7143095B2 (en)*2002-12-312006-11-28American Express Travel Related Services Company, Inc.Method and system for implementing and managing an enterprise identity management for distributed security
WO2004066604A1 (en)*2003-01-222004-08-05Nimcat Networks Inc.Call transfer system, method and network devices
US7185015B2 (en)*2003-03-142007-02-27Websense, Inc.System and method of monitoring and controlling application files
US7529754B2 (en)*2003-03-142009-05-05Websense, Inc.System and method of monitoring and controlling application files
US20040210773A1 (en)*2003-04-162004-10-21Charles MarkosiSystem and method for network security
US9118710B2 (en)2003-07-012015-08-25Securityprofiling, LlcSystem, method, and computer program product for reporting an occurrence in different manners
US9350752B2 (en)2003-07-012016-05-24Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9100431B2 (en)2003-07-012015-08-04Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US8984644B2 (en)2003-07-012015-03-17Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118711B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118709B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118708B2 (en)2003-07-012015-08-25Securityprofiling, LlcMulti-path remediation
US20070113272A2 (en)2003-07-012007-05-17Securityprofiling, Inc.Real-time vulnerability monitoring
US7068161B2 (en)*2003-07-312006-06-27Ch2M Hill, Inc.Method and system for analyzing the security of a facility
US7194446B1 (en)*2003-09-252007-03-20Rockwell Automation Technologies, Inc.Location-based execution of software/HMI
US7483986B2 (en)*2003-12-032009-01-27International Business Machines CorporationDynamically tuning networks of relationships in self-organizing multi-agent systems
US8190723B2 (en)*2003-12-142012-05-29Cisco Technology, Inc.Method and system for automatically determining commands for a network element
US8983966B2 (en)*2004-02-272015-03-17Ebay Inc.Method and system to monitor a diverse heterogeneous application environment
US8793787B2 (en)2004-04-012014-07-29Fireeye, Inc.Detecting malicious network content using virtual environment components
US9106694B2 (en)2004-04-012015-08-11Fireeye, Inc.Electronic message analysis for malware detection
US8898788B1 (en)2004-04-012014-11-25Fireeye, Inc.Systems and methods for malware attack prevention
US8584239B2 (en)2004-04-012013-11-12Fireeye, Inc.Virtual machine with dynamic data flow analysis
US8171553B2 (en)2004-04-012012-05-01Fireeye, Inc.Heuristic based capture with replay to virtual machine
US8881282B1 (en)2004-04-012014-11-04Fireeye, Inc.Systems and methods for malware attack detection and identification
US8528086B1 (en)2004-04-012013-09-03Fireeye, Inc.System and method of detecting computer worms
US8566946B1 (en)*2006-04-202013-10-22Fireeye, Inc.Malware containment on connection
US7587537B1 (en)2007-11-302009-09-08Altera CorporationSerializer-deserializer circuits formed from input-output circuit registers
US8549638B2 (en)2004-06-142013-10-01Fireeye, Inc.System and method of containing computer worms
US8010952B2 (en)*2004-06-082011-08-30Cisco Technology, Inc.Method and apparatus for configuration syntax and semantic validation
US7735140B2 (en)*2004-06-082010-06-08Cisco Technology, Inc.Method and apparatus providing unified compliant network audit
US7721304B2 (en)2004-06-082010-05-18Cisco Technology, Inc.Method and apparatus providing programmable network intelligence
US7860874B2 (en)*2004-06-082010-12-28Siemens Industry, Inc.Method for searching across a PLC network
US20060015591A1 (en)*2004-06-082006-01-19Datla Krishnam RApparatus and method for intelligent configuration editor
EP1612639A1 (en)*2004-06-302006-01-04ST Incard S.r.l.Method for detecting and reacting against possible attack to security enforcing operation performed by a cryptographic token or card
US7607166B2 (en)*2004-07-122009-10-20Cisco Technology, Inc.Secure manufacturing devices in a switched Ethernet network
US8572734B2 (en)2004-08-122013-10-29Verizon Patent And Licensing Inc.Geographical intrusion response prioritization mapping through authentication and flight data correlation
US8082506B1 (en)*2004-08-122011-12-20Verizon Corporate Services Group Inc.Geographical vulnerability mitigation response mapping system
US8418246B2 (en)*2004-08-122013-04-09Verizon Patent And Licensing Inc.Geographical threat response prioritization mapping system and methods of use
US8631493B2 (en)*2004-08-122014-01-14Verizon Patent And Licensing Inc.Geographical intrusion mapping system using telecommunication billing and inventory systems
US8091130B1 (en)*2004-08-122012-01-03Verizon Corporate Services Group Inc.Geographical intrusion response prioritization mapping system
US20060034305A1 (en)*2004-08-132006-02-16Honeywell International Inc.Anomaly-based intrusion detection
US7950044B2 (en)*2004-09-282011-05-24Rockwell Automation Technologies, Inc.Centrally managed proxy-based security for legacy automation systems
US8031913B1 (en)2004-09-292011-10-04Rockwell Automation Technologies, Inc.Preemptive change verification via electronic signatures in industrial automation systems
US7861085B1 (en)*2004-09-292010-12-28Rockwell Automation Technologies, Inc.Systems and methods providing distributed management of electronic signatures in industrial automation systems
US7979706B1 (en)2004-09-292011-07-12Rockwell Automation Technologies, Inc.Systems and methods for queuing an action in industrial automation systems
US8756521B1 (en)2004-09-302014-06-17Rockwell Automation Technologies, Inc.Systems and methods for automatic visualization configuration
US8132225B2 (en)*2004-09-302012-03-06Rockwell Automation Technologies, Inc.Scalable and flexible information security for industrial automation
EP1655647A1 (en)*2004-11-042006-05-10Prüftechnik Dieter Busch AgSecured connectivity system for Internet-based CM systems
US7860318B2 (en)2004-11-092010-12-28Intelli-Check, IncSystem and method for comparing documents
US8078881B1 (en)*2004-11-122011-12-13Liu Gary GPassword resetting method
US7832005B1 (en)*2004-11-292010-11-09Symantec CorporationBehavioral learning based security
US7310669B2 (en)*2005-01-192007-12-18Lockdown Networks, Inc.Network appliance for vulnerability assessment auditing over multiple networks
US8520512B2 (en)2005-01-262013-08-27Mcafee, Inc.Network appliance for customizable quarantining of a node on a network
US7810138B2 (en)2005-01-262010-10-05Mcafee, Inc.Enabling dynamic authentication with different protocols on the same port for a switch
US20060164199A1 (en)*2005-01-262006-07-27Lockdown Networks, Inc.Network appliance for securely quarantining a node on a network
US8590011B1 (en)*2005-02-242013-11-19Versata Development Group, Inc.Variable domain resource data security for data processing systems
AT502241B1 (en)*2005-02-242007-04-15Arc Seibersdorf Res Gmbh PROCEDURE AND ARRANGEMENT FOR DETERMINING THE DEVIATION OF IDENTIFIED VALUES
US7706895B2 (en)2005-02-252010-04-27Rockwell Automation Technologies, Inc.Reliable messaging instruction
US7565351B1 (en)*2005-03-142009-07-21Rockwell Automation Technologies, Inc.Automation device data interface
CA2544681C (en)*2005-04-222015-11-17Protexis Inc.Location-specific or range-based licensing system
US8799800B2 (en)2005-05-132014-08-05Rockwell Automation Technologies, Inc.Automatic user interface generation
US7650405B2 (en)*2005-05-132010-01-19Rockwell Automation Technologies, Inc.Tracking and tracing across process boundaries in an industrial automation environment
US7676281B2 (en)*2005-05-132010-03-09Rockwell Automation Technologies, Inc.Distributed database in an industrial automation environment
US7809683B2 (en)2005-05-132010-10-05Rockwell Automation Technologies, Inc.Library that includes modifiable industrial automation objects
US7672737B2 (en)*2005-05-132010-03-02Rockwell Automation Technologies, Inc.Hierarchically structured data model for utilization in industrial automation environments
US8800042B2 (en)*2005-05-162014-08-05Hewlett-Packard Development Company, L.P.Secure web application development and execution environment
US7233830B1 (en)*2005-05-312007-06-19Rockwell Automation Technologies, Inc.Application and service management for industrial control devices
GB0512744D0 (en)*2005-06-222005-07-27Blackspider TechnologiesMethod and system for filtering electronic messages
US20070019641A1 (en)*2005-07-222007-01-25Rockwell Automation Technologies, Inc.Execution of industrial automation applications on communication infrastructure devices
US8955032B2 (en)*2005-08-202015-02-10Riverbed Technology, Inc.Assessing network and device compliance with security policies
US7433741B2 (en)*2005-09-302008-10-07Rockwell Automation Technologies, Inc.Hybrid user interface having base presentation information with variably prominent supplemental information
US8413245B2 (en)*2005-12-162013-04-02Cisco Technology, Inc.Methods and apparatus providing computer and network security for polymorphic attacks
US7882560B2 (en)*2005-12-162011-02-01Cisco Technology, Inc.Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US9286469B2 (en)*2005-12-162016-03-15Cisco Technology, Inc.Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US8495743B2 (en)*2005-12-162013-07-23Cisco Technology, Inc.Methods and apparatus providing automatic signature generation and enforcement
US8453243B2 (en)2005-12-282013-05-28Websense, Inc.Real time lockdown
US8244745B2 (en)*2005-12-292012-08-14Nextlabs, Inc.Analyzing usage information of an information management system
US7787390B1 (en)*2006-01-302010-08-31Marvell International Ltd.Custom automatic remote monitoring for network devices
US7861003B2 (en)*2006-01-312010-12-28Genband Us LlcAdaptive feedback for session over internet protocol
US7860990B2 (en)*2006-01-312010-12-28Genband Us LlcSession data records and related alarming within a session over internet protocol (SOIP) network
US7865612B2 (en)2006-01-312011-01-04Genband Us LlcMethod and apparatus for partitioning resources within a session-over-internet-protocol (SoIP) session controller
US20070204323A1 (en)*2006-02-242007-08-30Rockwell Automation Technologies, Inc.Auto-detection capabilities for out of the box experience
US8259706B2 (en)*2006-02-282012-09-04Genband Us LlcMultistage prioritization of packets within a session over internet protocol (SOIP) network
US8509218B2 (en)*2006-02-282013-08-13Genband Us LlcPrioritization within a session over internet protocol (SOIP) network
US7814069B2 (en)*2006-03-302010-10-12Oracle International CorporationWrapper for use with global standards compliance checkers
US8185618B2 (en)*2006-06-062012-05-22Cisco Technology, Inc.Dynamically responding to non-network events at a network device in a computer network
US7950056B1 (en)*2006-06-302011-05-24Symantec CorporationBehavior based processing of a new version or variant of a previously characterized program
EP1881388B1 (en)*2006-07-072013-11-20Ansaldo Energia S.P.A.Industrial plant security apparatus and monitoring method of security of an industrial plant
US8359248B2 (en)*2006-08-242013-01-22Blue Pillar, Inc.Systems, methods, and devices for managing emergency power supply systems
US20080137266A1 (en)*2006-09-292008-06-12Rockwell Automation Technologies, Inc.Motor control center with power and data distribution bus
FR2907930B1 (en)*2006-10-272009-02-13Viaccess Sa METHOD FOR DETECTING ABNORMAL USE OF A SECURITY PROCESSOR
US9654495B2 (en)*2006-12-012017-05-16Websense, LlcSystem and method of analyzing web addresses
US9008617B2 (en)*2006-12-282015-04-14Verizon Patent And Licensing Inc.Layered graphical event mapping
GB2458094A (en)2007-01-092009-09-09Surfcontrol On Demand LtdURL interception and categorization in firewalls
GB2445764A (en)2007-01-222008-07-23Surfcontrol PlcResource access filtering system and database structure for use therewith
AU2008214131B2 (en)2007-02-022012-06-14Websense, Inc.System and method for adding context to prevent data leakage over a computer network
US9148437B1 (en)*2007-03-272015-09-29Amazon Technologies, Inc.Detecting adverse network conditions for a third-party network site
US8533841B2 (en)*2007-04-022013-09-10Microsoft CorporationDeriving remediations from security compliance rules
GB0709527D0 (en)2007-05-182007-06-27Surfcontrol PlcElectronic messaging system, message processing apparatus and message processing method
US7912062B2 (en)*2007-09-282011-03-22Genband Us LlcMethods and apparatus for managing addresses related to virtual partitions of a session exchange device
WO2009061855A2 (en)*2007-11-052009-05-14Intelli-Check--Mobilisa, Inc.Dynamic access control in response to flexible rules
US8122510B2 (en)*2007-11-142012-02-21Bank Of America CorporationMethod for analyzing and managing unstructured data
US20090144545A1 (en)*2007-11-292009-06-04International Business Machines CorporationComputer system security using file system access pattern heuristics
US8086582B1 (en)2007-12-182011-12-27Mcafee, Inc.System, method and computer program product for scanning and indexing data for different purposes
WO2009114649A2 (en)2008-03-122009-09-17Aptima, Inc.Probabilistic decision making system and methods of use
US9015842B2 (en)*2008-03-192015-04-21Websense, Inc.Method and system for protection against information stealing software
US8407784B2 (en)2008-03-192013-03-26Websense, Inc.Method and system for protection against information stealing software
US8370948B2 (en)*2008-03-192013-02-05Websense, Inc.System and method for analysis of electronic information dissemination events
US9130986B2 (en)*2008-03-192015-09-08Websense, Inc.Method and system for protection against information stealing software
US20090319531A1 (en)*2008-06-202009-12-24Bong Jun KoMethod and Apparatus for Detecting Devices Having Implementation Characteristics Different from Documented Characteristics
EP2318955A1 (en)2008-06-302011-05-11Websense, Inc.System and method for dynamic and real-time categorization of webpages
US20100064297A1 (en)*2008-09-052010-03-11Invensys Systems, Inc.Configuring And Providing Enhanced Access To Profibus Device Diagnostic Data
US8997219B2 (en)2008-11-032015-03-31Fireeye, Inc.Systems and methods for detecting malicious PDF network content
EP2200249A1 (en)*2008-12-172010-06-23Abb Research Ltd.Network analysis
US8341748B2 (en)*2008-12-182012-12-25Caterpillar Inc.Method and system to detect breaks in a border of a computer network
CA2763513A1 (en)2009-05-262010-12-02Roy BarkanSystems and methods for efficient detection of fingerprinted data and information
US9489651B2 (en)*2009-07-292016-11-08International Business Machines CorporationAutonomic manufacturing operator authorization adjustment
EP2296340A3 (en)2009-09-142014-10-01Hirschmann Automation and Control GmbHMethod for operating a firewall device in automation networks
US8832829B2 (en)2009-09-302014-09-09Fireeye, Inc.Network-based binary file extraction and analysis for malware detection
US8484401B2 (en)2010-04-152013-07-09Rockwell Automation Technologies, Inc.Systems and methods for conducting communications among components of multidomain industrial automation system
US8984533B2 (en)2010-04-152015-03-17Rockwell Automation Technologies, Inc.Systems and methods for conducting communications among components of multidomain industrial automation system
US9392072B2 (en)2010-04-152016-07-12Rockwell Automation Technologies, Inc.Systems and methods for conducting communications among components of multidomain industrial automation system
US9191367B2 (en)2010-06-012015-11-17Radiflow Ltd.Plant communication network
US20120117656A1 (en)*2010-11-102012-05-10Sap AgSecurity Validation of Business Processes
US8775607B2 (en)*2010-12-102014-07-08International Business Machines CorporationIdentifying stray assets in a computing enviroment and responsively taking resolution actions
US20120159624A1 (en)*2010-12-212012-06-21Fujitsu Technology Solutions Intellectual Property GmbhComputer security method, system and model
JP5739182B2 (en)2011-02-042015-06-24インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Control system, method and program
JP5731223B2 (en)2011-02-142015-06-10インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Abnormality detection device, monitoring control system, abnormality detection method, program, and recording medium
JP5689333B2 (en)2011-02-152015-03-25インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Abnormality detection system, abnormality detection device, abnormality detection method, program, and recording medium
US8893216B2 (en)*2011-06-152014-11-18Cisco Technology, Inc.Security measures for the smart grid
DE102011078309A1 (en)*2011-06-292013-01-03Siemens Aktiengesellschaft Method and device for monitoring a VPN tunnel
US8839349B2 (en)2011-10-182014-09-16Mcafee, Inc.Integrating security policy and event management
US9594367B2 (en)*2011-10-312017-03-14Rockwell Automation Technologies, Inc.Systems and methods for process control including process-initiated workflow
EP2624083A1 (en)*2012-02-012013-08-07ABB Research Ltd.Dynamic configuration of an industrial control system
US9032520B2 (en)*2012-02-222015-05-12iScanOnline, Inc.Remote security self-assessment framework
EP2640110B1 (en)2012-03-122017-05-03Securitas Direct ABMethod and apparatus for controlling a home wireless system
US8726393B2 (en)2012-04-232014-05-13Abb Technology AgCyber security analyzer
US10290221B2 (en)*2012-04-272019-05-14Aptima, Inc.Systems and methods to customize student instruction
US10552764B1 (en)2012-04-272020-02-04Aptima, Inc.Machine learning system for a training model of an adaptive trainer
US8972526B2 (en)*2012-10-172015-03-03Wal-Mart Stores, Inc.HTTP parallel processing router
CN104813622B (en)2012-11-222016-10-19三菱电机株式会社 Data Collection-Forwarding Device
US10572665B2 (en)2012-12-282020-02-25Fireeye, Inc.System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
US9177139B2 (en)*2012-12-302015-11-03Honeywell International Inc.Control system cyber security
US9176843B1 (en)2013-02-232015-11-03Fireeye, Inc.Framework for efficient security coverage of mobile software applications
US9367681B1 (en)2013-02-232016-06-14Fireeye, Inc.Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
US9195829B1 (en)2013-02-232015-11-24Fireeye, Inc.User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
US10438156B2 (en)2013-03-132019-10-08Aptima, Inc.Systems and methods to provide training guidance
US9355247B1 (en)2013-03-132016-05-31Fireeye, Inc.File extraction from memory dump for malicious content analysis
US9626509B1 (en)2013-03-132017-04-18Fireeye, Inc.Malicious content analysis with multi-version application support within single operating environment
US9104867B1 (en)2013-03-132015-08-11Fireeye, Inc.Malicious content analysis using simulated user interaction without user involvement
US9430646B1 (en)2013-03-142016-08-30Fireeye, Inc.Distributed systems and methods for automatically detecting unknown bots and botnets
US9311479B1 (en)2013-03-142016-04-12Fireeye, Inc.Correlation and consolidation of analytic data for holistic view of a malware attack
US20140277612A1 (en)*2013-03-142014-09-18General Electric CompanyAutomatic generation of a dynamic pre-start checklist
US10713358B2 (en)2013-03-152020-07-14Fireeye, Inc.System and method to extract and utilize disassembly features to classify software intent
US9413781B2 (en)2013-03-152016-08-09Fireeye, Inc.System and method employing structured intelligence to verify and contain threats at endpoints
US11102091B2 (en)2013-03-312021-08-24Schneider Electric USA, Inc.Analyzing SCADA systems
EP2981893B1 (en)*2013-03-312023-06-07Schneider Electric USA, Inc.Analyzing scada systems
US9495180B2 (en)2013-05-102016-11-15Fireeye, Inc.Optimized resource allocation for virtual machines within a malware content detection system
US9635039B1 (en)2013-05-132017-04-25Fireeye, Inc.Classifying sets of malicious indicators for detecting command and control communications associated with malware
US10133863B2 (en)2013-06-242018-11-20Fireeye, Inc.Zero-day discovery system
US9300686B2 (en)2013-06-282016-03-29Fireeye, Inc.System and method for detecting malicious links in electronic messages
US9992230B1 (en)*2013-09-272018-06-05Tripwire, Inc.Assessing security control quality and state in an information technology infrastructure
US9690936B1 (en)2013-09-302017-06-27Fireeye, Inc.Multistage system and method for analyzing obfuscated content for malware
US9294501B2 (en)2013-09-302016-03-22Fireeye, Inc.Fuzzy hash of behavioral results
US10515214B1 (en)2013-09-302019-12-24Fireeye, Inc.System and method for classifying malware within content created during analysis of a specimen
US9171160B2 (en)2013-09-302015-10-27Fireeye, Inc.Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
US9736179B2 (en)2013-09-302017-08-15Fireeye, Inc.System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
US9628507B2 (en)2013-09-302017-04-18Fireeye, Inc.Advanced persistent threat (APT) detection center
US9774448B2 (en)2013-10-302017-09-26Duo Security, Inc.System and methods for opportunistic cryptographic key management on an electronic device
US9921978B1 (en)2013-11-082018-03-20Fireeye, Inc.System and method for enhanced security of storage devices
US9747446B1 (en)2013-12-262017-08-29Fireeye, Inc.System and method for run-time object classification
US9756074B2 (en)2013-12-262017-09-05Fireeye, Inc.System and method for IPS and VM-based detection of suspicious objects
US9740857B2 (en)2014-01-162017-08-22Fireeye, Inc.Threat-aware microvisor
WO2015117052A1 (en)2014-01-312015-08-06Putman Matthew CApparatus and method for manipulating objects with gesture controls
US9262635B2 (en)2014-02-052016-02-16Fireeye, Inc.Detection efficacy of virtual machine-based analysis with application specific events
US9369478B2 (en)*2014-02-062016-06-14Nicira, Inc.OWL-based intelligent security audit
US9241010B1 (en)2014-03-202016-01-19Fireeye, Inc.System and method for network behavior detection
US10242185B1 (en)2014-03-212019-03-26Fireeye, Inc.Dynamic guest image creation and rollback
US20150281008A1 (en)*2014-03-252015-10-01Emulex CorporationAutomatic derivation of system performance metric thresholds
US9591015B1 (en)2014-03-282017-03-07Fireeye, Inc.System and method for offloading packet processing and static analysis operations
US9432389B1 (en)2014-03-312016-08-30Fireeye, Inc.System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US9223972B1 (en)2014-03-312015-12-29Fireeye, Inc.Dynamically remote tuning of a malware content detection system
US9594912B1 (en)2014-06-062017-03-14Fireeye, Inc.Return-oriented programming detection
US9438623B1 (en)2014-06-062016-09-06Fireeye, Inc.Computer exploit detection using heap spray pattern matching
US9973531B1 (en)2014-06-062018-05-15Fireeye, Inc.Shellcode detection
US10084813B2 (en)2014-06-242018-09-25Fireeye, Inc.Intrusion prevention and remedy system
US9398028B1 (en)2014-06-262016-07-19Fireeye, Inc.System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
US10805340B1 (en)2014-06-262020-10-13Fireeye, Inc.Infection vector and malware tracking with an interactive user display
KR20160002058A (en)*2014-06-302016-01-07한국전자통신연구원Modbus Communication Pattern Learning Based Abnormal Traffic Detection Apparatus and Method
US10002252B2 (en)2014-07-012018-06-19Fireeye, Inc.Verification of trusted threat-aware microvisor
US9363280B1 (en)2014-08-222016-06-07Fireeye, Inc.System and method of detecting delivery of malware using cross-customer data
US10671726B1 (en)2014-09-222020-06-02Fireeye Inc.System and method for malware analysis using thread-level event monitoring
US10027689B1 (en)2014-09-292018-07-17Fireeye, Inc.Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
US9773112B1 (en)2014-09-292017-09-26Fireeye, Inc.Exploit detection of malware and malware families
US9787572B2 (en)*2014-10-072017-10-10Cisco Technology, Inc.Conflict avoidant traffic routing in a network environment
US10373409B2 (en)2014-10-312019-08-06Intellicheck, Inc.Identification scan in compliance with jurisdictional or other rules
US9690933B1 (en)2014-12-222017-06-27Fireeye, Inc.Framework for classifying an object as malicious with machine learning for deploying updated predictive models
US10075455B2 (en)2014-12-262018-09-11Fireeye, Inc.Zero-day rotating guest image profile
US9934376B1 (en)2014-12-292018-04-03Fireeye, Inc.Malware detection appliance architecture
US9838417B1 (en)2014-12-302017-12-05Fireeye, Inc.Intelligent context aware user interaction for malware detection
US9913201B1 (en)2015-01-292018-03-06Symantec CorporationSystems and methods for detecting potentially illegitimate wireless access points
US10075475B2 (en)*2015-02-062018-09-11Honeywell International Inc.Apparatus and method for dynamic customization of cyber-security risk item rules
US10148688B1 (en)2015-02-092018-12-04Symantec CorporationSystems and methods for detecting illegitimate devices on wireless networks
US9730075B1 (en)2015-02-092017-08-08Symantec CorporationSystems and methods for detecting illegitimate devices on wireless networks
US9781604B1 (en)*2015-02-092017-10-03Symantec CorporationSystems and methods for detecting illegitimate devices on wireless networks
US10944764B2 (en)*2015-02-132021-03-09Fisher-Rosemount Systems, Inc.Security event detection through virtual machine introspection
US9882931B1 (en)2015-02-182018-01-30Symantec CorporationSystems and methods for detecting potentially illegitimate wireless access points
US9690606B1 (en)2015-03-252017-06-27Fireeye, Inc.Selective system call monitoring
US10148693B2 (en)2015-03-252018-12-04Fireeye, Inc.Exploit detection system
US9438613B1 (en)2015-03-302016-09-06Fireeye, Inc.Dynamic content activation for automated analysis of embedded objects
US9641341B2 (en)2015-03-312017-05-02Duo Security, Inc.Method for distributed trust authentication
US10417031B2 (en)2015-03-312019-09-17Fireeye, Inc.Selective virtualization for security threat detection
US10474813B1 (en)2015-03-312019-11-12Fireeye, Inc.Code injection technique for remediation at an endpoint of a network
US9483644B1 (en)2015-03-312016-11-01Fireeye, Inc.Methods for detecting file altering malware in VM based analysis
US9654485B1 (en)2015-04-132017-05-16Fireeye, Inc.Analytics-based security monitoring system and method
US9594904B1 (en)2015-04-232017-03-14Fireeye, Inc.Detecting malware based on reflection
US9781601B1 (en)2015-06-082017-10-03Symantec CorporationSystems and methods for detecting potentially illegitimate wireless access points
US10630649B2 (en)2015-06-302020-04-21K4Connect Inc.Home automation system including encrypted device connection based upon publicly accessible connection file and related methods
US11113086B1 (en)2015-06-302021-09-07Fireeye, Inc.Virtual system and method for securing external network connectivity
US10454950B1 (en)2015-06-302019-10-22Fireeye, Inc.Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US10642753B1 (en)2015-06-302020-05-05Fireeye, Inc.System and method for protecting a software component running in virtual machine using a virtualization layer
WO2017004200A1 (en)*2015-06-302017-01-05K4Connect Inc.Home automation system including security controller for terminating communication with abnormally operating addressable devices and related methods
US10726127B1 (en)2015-06-302020-07-28Fireeye, Inc.System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
US10715542B1 (en)2015-08-142020-07-14Fireeye, Inc.Mobile application risk analysis
US10019572B1 (en)2015-08-272018-07-10Amazon Technologies, Inc.Detecting malicious activities by imported software packages
US10032031B1 (en)2015-08-272018-07-24Amazon Technologies, Inc.Detecting unknown software vulnerabilities and system compromises
US10176321B2 (en)2015-09-222019-01-08Fireeye, Inc.Leveraging behavior-based rules for malware family classification
US10033747B1 (en)2015-09-292018-07-24Fireeye, Inc.System and method for detecting interpreter-based exploit attacks
US10601865B1 (en)2015-09-302020-03-24Fireeye, Inc.Detection of credential spearphishing attacks using email analysis
US9825976B1 (en)2015-09-302017-11-21Fireeye, Inc.Detection and classification of exploit kits
US10706149B1 (en)2015-09-302020-07-07Fireeye, Inc.Detecting delayed activation malware using a primary controller and plural time controllers
US10817606B1 (en)2015-09-302020-10-27Fireeye, Inc.Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
US9825989B1 (en)2015-09-302017-11-21Fireeye, Inc.Cyber attack early warning system
US10210329B1 (en)2015-09-302019-02-19Fireeye, Inc.Method to detect application execution hijacking using memory protection
US10284575B2 (en)2015-11-102019-05-07Fireeye, Inc.Launcher for setting analysis environment variations for malware detection
US10645167B2 (en)*2015-11-232020-05-05Cybirical, LLCDistributed setting of network security devices from power system IED settings files
US9918224B1 (en)2015-11-242018-03-13Symantec CorporationSystems and methods for preventing computing devices from sending wireless probe packets
US10846117B1 (en)2015-12-102020-11-24Fireeye, Inc.Technique for establishing secure communication between host and guest processes of a virtualization architecture
US10447728B1 (en)2015-12-102019-10-15Fireeye, Inc.Technique for protecting guest processes using a layered virtualization architecture
US10108446B1 (en)2015-12-112018-10-23Fireeye, Inc.Late load technique for deploying a virtualization layer underneath a running operating system
US10511481B1 (en)2015-12-152019-12-17Amazon Technologies, Inc.Optimizing application configurations in a provider network
US9652962B1 (en)*2015-12-212017-05-16General Electric CompanySystems and methods for safety and proximity sensing in industrial environments
US10050998B1 (en)2015-12-302018-08-14Fireeye, Inc.Malicious message analysis system
US10621338B1 (en)2015-12-302020-04-14Fireeye, Inc.Method to detect forgery and exploits using last branch recording registers
US10133866B1 (en)2015-12-302018-11-20Fireeye, Inc.System and method for triggering analysis of an object for malware in response to modification of that object
US10565378B1 (en)2015-12-302020-02-18Fireeye, Inc.Exploit of privilege detection framework
US9824216B1 (en)2015-12-312017-11-21Fireeye, Inc.Susceptible environment detection system
US11552986B1 (en)2015-12-312023-01-10Fireeye Security Holdings Us LlcCyber-security framework for application of virtual features
US10581874B1 (en)2015-12-312020-03-03Fireeye, Inc.Malware detection system with contextual analysis
US10601863B1 (en)2016-03-252020-03-24Fireeye, Inc.System and method for managing sensor enrollment
US10785255B1 (en)2016-03-252020-09-22Fireeye, Inc.Cluster configuration within a scalable malware detection system
US10671721B1 (en)2016-03-252020-06-02Fireeye, Inc.Timeout management services
US10616266B1 (en)2016-03-252020-04-07Fireeye, Inc.Distributed malware detection system and submission workflow thereof
US10893059B1 (en)2016-03-312021-01-12Fireeye, Inc.Verification and enhancement using detection systems located at the network periphery and endpoint devices
US10826933B1 (en)2016-03-312020-11-03Fireeye, Inc.Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
US10447540B2 (en)*2016-04-082019-10-15Cisco Technology, Inc.Deriving a network policy for an industrial automation network
US9935852B2 (en)*2016-06-062018-04-03General Electric CompanyMethods and systems for network monitoring
EP3258661B1 (en)*2016-06-162020-11-18ABB Schweiz AGDetection of abnormal configuration changes
US10169585B1 (en)2016-06-222019-01-01Fireeye, Inc.System and methods for advanced malware detection through placement of transition events
US10348755B1 (en)2016-06-302019-07-09Symantec CorporationSystems and methods for detecting network security deficiencies on endpoint devices
US10462173B1 (en)2016-06-302019-10-29Fireeye, Inc.Malware detection verification and enhancement by coordinating endpoint and malware detection systems
US11042506B2 (en)*2016-07-202021-06-22Microsoft Technology Licensing, LlcCompliance violation detection
US10592678B1 (en)2016-09-092020-03-17Fireeye, Inc.Secure communications between peers using a verified virtual trusted platform module
US10491627B1 (en)2016-09-292019-11-26Fireeye, Inc.Advanced malware detection using similarity analysis
GB201617620D0 (en)*2016-10-182016-11-30Cybernetica AsComposite digital signatures
US10795991B1 (en)2016-11-082020-10-06Fireeye, Inc.Enterprise search
DE102016222741A1 (en)*2016-11-182018-05-24Continental Automotive Gmbh Method for a communication network and electronic control unit
US10587647B1 (en)2016-11-222020-03-10Fireeye, Inc.Technique for malware detection capability comparison of network security devices
US10552610B1 (en)2016-12-222020-02-04Fireeye, Inc.Adaptive virtual machine snapshot update framework for malware behavioral analysis
US10581879B1 (en)2016-12-222020-03-03Fireeye, Inc.Enhanced malware detection for generated objects
US10523609B1 (en)2016-12-272019-12-31Fireeye, Inc.Multi-vector malware detection and analysis
US10268170B2 (en)2017-01-032019-04-23General Electric CompanyValidation of control command in substantially real time for industrial asset control system threat detection
DE102017202002A1 (en)2017-02-082018-08-09Siemens Aktiengesellschaft Method and computer for cryptographically protecting control communication in and / or service access to IT systems, in particular in connection with the diagnosis and configuration in an automation, control or monitoring system
EP3373544A1 (en)*2017-03-072018-09-12ABB Schweiz AGAutomatic communication network system hardening
US10904286B1 (en)2017-03-242021-01-26Fireeye, Inc.Detection of phishing attacks using similarity analysis
US10554507B1 (en)2017-03-302020-02-04Fireeye, Inc.Multi-level control for enhanced resource and object evaluation management of malware detection system
US10791138B1 (en)2017-03-302020-09-29Fireeye, Inc.Subscription-based malware detection
US10902119B1 (en)2017-03-302021-01-26Fireeye, Inc.Data extraction system for malware analysis
US10798112B2 (en)2017-03-302020-10-06Fireeye, Inc.Attribute-controlled malware detection
US10432647B2 (en)*2017-06-272019-10-01Honeywell International Inc.Malicious industrial internet of things node activity detection for connected plants
US10855700B1 (en)2017-06-292020-12-01Fireeye, Inc.Post-intrusion detection of cyber-attacks during lateral movement within networks
US10503904B1 (en)2017-06-292019-12-10Fireeye, Inc.Ransomware detection and mitigation
US10601848B1 (en)2017-06-292020-03-24Fireeye, Inc.Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
US10893068B1 (en)2017-06-302021-01-12Fireeye, Inc.Ransomware file modification prevention technique
EP3457286B1 (en)*2017-09-142022-07-13ABB Schweiz AGMethod and computing device for commissioning an industrial automation control system
US10948883B2 (en)*2017-09-202021-03-16Rockwell Automation Technologies, Inc.Machine logic characterization, modeling, and code generation
US10747872B1 (en)2017-09-272020-08-18Fireeye, Inc.System and method for preventing malware evasion
US10805346B2 (en)2017-10-012020-10-13Fireeye, Inc.Phishing attack detection
EP3474509B1 (en)*2017-10-182021-10-06ABB Schweiz AGMethods for controlling a device and control system
US11108809B2 (en)2017-10-272021-08-31Fireeye, Inc.System and method for analyzing binary code for malware classification using artificial neural network techniques
US10416661B2 (en)*2017-11-302019-09-17Abb Schweiz AgApparatuses, systems and methods of secure cloud-based monitoring of industrial plants
US10645121B1 (en)*2017-12-112020-05-05Juniper Networks, Inc.Network traffic management based on network entity attributes
US11005860B1 (en)2017-12-282021-05-11Fireeye, Inc.Method and system for efficient cybersecurity analysis of endpoint events
US11271955B2 (en)2017-12-282022-03-08Fireeye Security Holdings Us LlcPlatform and method for retroactive reclassification employing a cybersecurity-based global data store
US11240275B1 (en)2017-12-282022-02-01Fireeye Security Holdings Us LlcPlatform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
US10908940B1 (en)2018-02-262021-02-02Amazon Technologies, Inc.Dynamically managed virtual server system
EP3544262A1 (en)*2018-03-222019-09-25Mitsubishi Electric R&D Centre Europe B.V.Method of improving security in a factory automation network
US10826931B1 (en)2018-03-292020-11-03Fireeye, Inc.System and method for predicting and mitigating cybersecurity system misconfigurations
US10956477B1 (en)2018-03-302021-03-23Fireeye, Inc.System and method for detecting malicious scripts through natural language processing modeling
US11003773B1 (en)2018-03-302021-05-11Fireeye, Inc.System and method for automatically generating malware detection rule recommendations
US11558401B1 (en)2018-03-302023-01-17Fireeye Security Holdings Us LlcMulti-vector malware detection data sharing system for improved detection
US11084225B2 (en)2018-04-022021-08-10Nanotronics Imaging, Inc.Systems, methods, and media for artificial intelligence process control in additive manufacturing
CN108521423A (en)*2018-04-102018-09-11江苏亨通工控安全研究院有限公司HWIL simulation industry control network target range system
US10867044B2 (en)*2018-05-302020-12-15AppOmni, Inc.Automatic computer system change monitoring and security gap detection system
US11314859B1 (en)2018-06-272022-04-26FireEye Security Holdings, Inc.Cyber-security system and method for detecting escalation of privileges within an access token
US11075930B1 (en)2018-06-272021-07-27Fireeye, Inc.System and method for detecting repetitive cybersecurity attacks constituting an email campaign
US11228491B1 (en)2018-06-282022-01-18Fireeye Security Holdings Us LlcSystem and method for distributed cluster configuration monitoring and management
US11316900B1 (en)2018-06-292022-04-26FireEye Security Holdings Inc.System and method for automatically prioritizing rules for cyber-threat detection and mitigation
US11182473B1 (en)2018-09-132021-11-23Fireeye Security Holdings Us LlcSystem and method for mitigating cyberattacks against processor operability by a guest process
US11763004B1 (en)2018-09-272023-09-19Fireeye Security Holdings Us LlcSystem and method for bootkit detection
US11153152B2 (en)2018-11-212021-10-19Cisco Technology, Inc.System and methods to validate issue detection and classification in a network assurance system
US11252046B2 (en)*2018-12-142022-02-15Juniper Networks, Inc.System for identifying and assisting in the creation and implementation of a network service configuration using Hidden Markov Models (HMMs)
US11176251B1 (en)2018-12-212021-11-16Fireeye, Inc.Determining malware via symbolic function hash analysis
US11743290B2 (en)2018-12-212023-08-29Fireeye Security Holdings Us LlcSystem and method for detecting cyberattacks impersonating legitimate sources
US12074887B1 (en)2018-12-212024-08-27Musarubra Us LlcSystem and method for selectively processing content after identification and removal of malicious content
US11368475B1 (en)2018-12-212022-06-21Fireeye Security Holdings Us LlcSystem and method for scanning remote services to locate stored objects with malware
US11601444B1 (en)2018-12-312023-03-07Fireeye Security Holdings Us LlcAutomated system for triage of customer issues
US11968240B2 (en)*2019-03-042024-04-23Cisco Technology, Inc.Network posture based suggestion of applications and services
US11310238B1 (en)2019-03-262022-04-19FireEye Security Holdings, Inc.System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources
US11677786B1 (en)2019-03-292023-06-13Fireeye Security Holdings Us LlcSystem and method for detecting and protecting against cybersecurity attacks on servers
US11636198B1 (en)2019-03-302023-04-25Fireeye Security Holdings Us LlcSystem and method for cybersecurity analyzer update and concurrent management system
EP3731203B1 (en)2019-04-242023-05-31Carrier CorporationAlarm system
US11005822B2 (en)*2019-05-032021-05-11Cisco Technology, Inc.Securing substation communications using security groups based on substation configurations
US11083919B2 (en)2019-05-292021-08-10Honeywell International Inc.Operating a fire control system
US11258806B1 (en)2019-06-242022-02-22Mandiant, Inc.System and method for automatically associating cybersecurity intelligence to cyberthreat actors
US11556640B1 (en)2019-06-272023-01-17Mandiant, Inc.Systems and methods for automated cybersecurity analysis of extracted binary string sets
US11392700B1 (en)2019-06-282022-07-19Fireeye Security Holdings Us LlcSystem and method for supporting cross-platform data verification
US12425453B2 (en)2019-07-242025-09-23International Business Machines CorporationSecurity layer for configuring blockchain
US12200013B2 (en)2019-08-072025-01-14Musarubra Us LlcSystem and method for detecting cyberattacks impersonating legitimate sources
EP4028228A4 (en)2019-09-102023-09-27Nanotronics Imaging, Inc.Systems, methods, and media for manufacturing processes
US11886585B1 (en)2019-09-272024-01-30Musarubra Us LlcSystem and method for identifying and mitigating cyberattacks through malicious position-independent code execution
US11637862B1 (en)2019-09-302023-04-25Mandiant, Inc.System and method for surfacing cyber-security threats with a self-learning recommendation engine
US11218360B2 (en)2019-12-092022-01-04Quest Automated Services, LLCAutomation system with edge computing
US11522884B1 (en)2019-12-242022-12-06Fireeye Security Holdings Us LlcSubscription and key management system
US11838300B1 (en)2019-12-242023-12-05Musarubra Us LlcRun-time configurable cybersecurity system
US11436327B1 (en)2019-12-242022-09-06Fireeye Security Holdings Us LlcSystem and method for circumventing evasive code for cyberthreat detection
DE102020111450A1 (en)*2020-04-272021-10-28Bayerische Motoren Werke Aktiengesellschaft Detecting errors in a computer network
KR102807321B1 (en)2020-10-202025-05-15삼성전자주식회사Electronic apparatus and method for controlling thereof
EP4047898A1 (en)*2021-02-172022-08-24ABB Schweiz AGDefending industrial automation systems against attack
CN113098892B (en)*2021-04-192023-04-18恒安嘉新(北京)科技股份公司Data leakage prevention system and method based on industrial Internet
CN113673966B (en)*2021-09-032024-03-08卡奥斯数字科技(青岛)有限公司Information security construction scheme generation method and device, electronic equipment and storage medium
CN115081396A (en)*2022-05-122022-09-20中国南方电网有限责任公司Method and device for intelligently editing operation files
CN116760716B (en)*2023-08-182023-11-03南京天谷电气科技有限公司Intelligent network topology management system and method for new energy station
CN119668346B (en)*2025-02-202025-05-13北京瑞利恒安科技有限责任公司Control method and device for three-proofing system of airtight space based on multiple sensors

Citations (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4831582A (en)*1986-11-071989-05-16Allen-Bradley Company, Inc.Database access machine for factory automation network
US5583928A (en)*1992-06-191996-12-10British Telecommunications Public Limited CompanyDetecting local exchange failure and resultant control of a communications network
US5774357A (en)*1991-12-231998-06-30Hoffberg; Steven M.Human factored interface incorporating adaptive pattern recognition based controller apparatus
US5796721A (en)*1996-06-211998-08-18National Instruments CorporationMethod and system for monitoring fieldbus network with dynamically alterable packet filter
US6023456A (en)*1996-12-232000-02-08Nortel Networks CorporationDynamic traffic conditioning
US6035240A (en)*1998-11-122000-03-07Moorehead; JackFlexible distributed processing system for sensor data acquisition and control
US6169981B1 (en)*1996-06-042001-01-02Paul J. Werbos3-brain architecture for an intelligent decision and control system
US6259705B1 (en)*1997-09-222001-07-10Fujitsu LimitedNetwork service server load balancing device, network service server load balancing method and computer-readable storage medium recorded with network service server load balancing program
US6321272B1 (en)*1997-09-102001-11-20Schneider Automation, Inc.Apparatus for controlling internetwork communications
US6321338B1 (en)*1998-11-092001-11-20Sri InternationalNetwork surveillance
US20020032871A1 (en)*2000-09-082002-03-14The Regents Of The University Of MichiganMethod and system for detecting, tracking and blocking denial of service attacks over a computer network
US20020046290A1 (en)*2000-10-122002-04-18Johann AnderssonComputer system
US20020108077A1 (en)*2001-02-052002-08-08Havekost Robert B.Hierarchical failure management for process control systems
US20020131366A1 (en)*2000-05-172002-09-19Sharp Clifford F.System and method for traffic management control in a data transmission network
US20030014500A1 (en)*2001-07-102003-01-16Schleiss Trevor D.Transactional data communications for process control systems
US6636721B2 (en)*1995-11-302003-10-21Mobile Satellite Ventures, LpNetwork engineering/systems system for mobile satellite communication system
US6732191B1 (en)*1997-09-102004-05-04Schneider Automation Inc.Web interface to an input/output device
US6788980B1 (en)*1999-06-112004-09-07Invensys Systems, Inc.Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP network
US7047423B1 (en)*1998-07-212006-05-16Computer Associates Think, Inc.Information security analysis system
US7272815B1 (en)*1999-05-172007-09-18Invensys Systems, Inc.Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects

Family Cites Families (93)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4200770A (en)*1977-09-061980-04-29Stanford UniversityCryptographic apparatus and method
GB8524455D0 (en)*1985-10-031985-11-06Isolation Systems LtdMonitoring activity of peripheral devices
US4882752A (en)*1986-06-251989-11-21Lindman Richard SComputer security system
US5051837A (en)*1990-06-061991-09-24Mcjunkin Thomas NHome entertainment equipment control apparatus
JP2658633B2 (en)*1991-07-101997-09-30三菱電機株式会社 Communication device
US5917840A (en)*1992-03-131999-06-29Foxboro CompanyProtection against communications crosstalk in a factory process control system
US5446903A (en)*1993-05-041995-08-29International Business Machines CorporationMethod and apparatus for controlling access to data elements in a data processing system based on status of an industrial process by mapping user's security categories and industrial process steps
US5371794A (en)*1993-11-021994-12-06Sun Microsystems, Inc.Method and apparatus for privacy and authentication in wireless networks
US5535276A (en)*1994-11-091996-07-09Bell Atlantic Network Services, Inc.Yaksha, an improved system and method for securing communications using split private key asymmetric cryptography
US6571141B1 (en)*1995-05-302003-05-27Roy-G-Biv CorporationApplication programs for motion control devices including access limitations
US7139843B1 (en)1995-05-302006-11-21Roy-G-Biv CorporationSystem and methods for generating and communicating motion data through a distributed network
JP3754456B2 (en)*1996-02-222006-03-15クヴァセル コンスルタント アクティエ ボラーグ Apparatus in a control and / or management system operating with CAN protocol
US5923756A (en)*1997-02-121999-07-13Gte Laboratories IncorporatedMethod for providing secure remote command execution over an insecure computer network
US6108785A (en)*1997-03-312000-08-22Intel CorporationMethod and apparatus for preventing unauthorized usage of a computer system
US6418533B2 (en)*1997-08-292002-07-09Compaq Information Technologies Group, L.P.“J” system for securing a portable computer which optionally requires an entry of an invalid power on password (POP), by forcing an entry of a valid POP
US20020152289A1 (en)*1997-09-102002-10-17Schneider Automation Inc.System and method for accessing devices in a factory automation network
US7035898B1 (en)1997-09-102006-04-25Schneider Automation Inc.System for programming a factory automation device using a web browser
US6385644B1 (en)1997-09-262002-05-07Mci Worldcom, Inc.Multi-threaded web based user inbox for report management
US6088679A (en)*1997-12-012000-07-11The United States Of America As Represented By The Secretary Of CommerceWorkflow management employing role-based access control
US6088804A (en)*1998-01-122000-07-11Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US6754820B1 (en)*2001-01-302004-06-22Tecsec, Inc.Multiple level access system
US6298445B1 (en)*1998-04-302001-10-02Netect, Ltd.Computer security
US6374358B1 (en)*1998-08-052002-04-16Sun Microsystems, Inc.Adaptive countermeasure selection method and apparatus
DE19848618A1 (en)*1998-10-212000-06-29Siemens Ag System and method for remote maintenance and / or remote diagnosis of an automation system via email
EP1024239B1 (en)*1999-01-282005-03-23International Business Machines CorporationElectronic access control system and method
US6542993B1 (en)*1999-03-122003-04-01Lucent Technologies Inc.Security management system and method
US6842860B1 (en)*1999-07-232005-01-11Networks Associates Technology, Inc.System and method for selectively authenticating data
US6609198B1 (en)*1999-08-052003-08-19Sun Microsystems, Inc.Log-on service providing credential level change without loss of session continuity
US7010590B1 (en)*1999-09-152006-03-07Datawire Communications Networks, Inc.System and method for secure transactions over a network
AU7871900A (en)1999-10-062001-05-10Sensoria CorporationWireless networked sensors
US7020701B1 (en)1999-10-062006-03-28Sensoria CorporationMethod for collecting and processing data using internetworked wireless integrated network sensors (WINS)
US6957348B1 (en)*2000-01-102005-10-18Ncircle Network Security, Inc.Interoperability of vulnerability and intrusion detection systems
US6883101B1 (en)*2000-02-082005-04-19Harris CorporationSystem and method for assessing the security posture of a network using goal oriented fuzzy logic decision rules
US6421571B1 (en)*2000-02-292002-07-16Bently Nevada CorporationIndustrial plant asset management system: apparatus and method
US7127526B1 (en)2000-03-202006-10-24Nortel Networks LimitedMethod and apparatus for dynamically loading and managing software services on a network device
AU2001249287A1 (en)*2000-03-212001-10-03Charles M. Leedom Jr.A tiered wireless, multi-modal access system and method
US7089303B2 (en)*2000-05-312006-08-08Invicta Networks, Inc.Systems and methods for distributed network protection
US7069580B1 (en)2000-06-162006-06-27Fisher-Rosemount Systems, Inc.Function-based process control verification and security in a process control system
WO2002010887A2 (en)2000-07-282002-02-07Jan PathuelMethod and system of securing data and systems
US6760782B1 (en)2000-08-042004-07-06Schneider Automation Inc.Apparatus for controlling internetwork communications
US7058154B1 (en)2000-08-082006-06-06General Electric CompanySystems and methods for managing assets using an interactive database
US9027121B2 (en)*2000-10-102015-05-05International Business Machines CorporationMethod and system for creating a record for one or more computer security incidents
US20020078153A1 (en)2000-11-022002-06-20Chit ChungProviding secure, instantaneous, directory-integrated, multiparty, communications services
US7349987B2 (en)*2000-11-132008-03-25Digital Doors, Inc.Data security system and method with parsing and dispersion techniques
US7146644B2 (en)2000-11-132006-12-05Digital Doors, Inc.Data security system and method responsive to electronic attacks
US20020120728A1 (en)*2000-12-222002-08-29Jason BraatzMethod and apparatus for network-enablement of devices using device intelligence and network architecture
US6735601B1 (en)2000-12-292004-05-11Vmware, Inc.System and method for remote file access by computer
US7360075B2 (en)*2001-02-122008-04-15Aventail Corporation, A Wholly Owned Subsidiary Of Sonicwall, Inc.Method and apparatus for providing secure streaming data transmission facilities using unreliable protocols
US7013395B1 (en)*2001-03-132006-03-14Sandra CorporationMethod and tool for network vulnerability analysis
US6920558B2 (en)2001-03-202005-07-19Networks Associates Technology, Inc.Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system
US20020147820A1 (en)2001-04-062002-10-10Docomo Communications Laboratories Usa, Inc.Method for implementing IP security in mobile IP networks
FI110464B (en)2001-04-262003-01-31Nokia Corp IP security and mobile network connections
US7061899B2 (en)*2001-05-012006-06-13Hewlett-Packard Development Company, L.P.Method and apparatus for providing network security
FR2824936B1 (en)*2001-05-162005-09-02Schneider Automation PREDICTIVE DIAGNOSTIC SYSTEM IN A PROGRAMMABLE AUTOMATE
US7076801B2 (en)2001-06-112006-07-11Research Triangle InstituteIntrusion tolerant server system
US20020199122A1 (en)*2001-06-222002-12-26Davis Lauren B.Computer security vulnerability analysis methodology
US7243374B2 (en)*2001-08-082007-07-10Microsoft CorporationRapid application security threat analysis
EP1298506A1 (en)*2001-09-272003-04-02Siemens AktiengesellschaftDynamic access to automation resources
US20030105535A1 (en)*2001-11-052003-06-05Roman RammlerUnit controller with integral full-featured human-machine interface
US7200613B2 (en)*2001-11-092007-04-03Xerox CorporationAsset management system for network-based and non-network-based assets and information
US7254601B2 (en)2001-12-202007-08-07Questra CorporationMethod and apparatus for managing intelligent assets in a distributed environment
CA2472268A1 (en)*2001-12-312003-07-17Citadel Security Software Inc.Automated computer vulnerability resolution system
US7093121B2 (en)*2002-01-102006-08-15Mcafee, Inc.Transferring data via a secure network connection
US7734716B2 (en)*2002-01-242010-06-08Ge Fanuc Automation North America, Inc.Methods and systems for management and control of an automation control module
DE60308251T2 (en)*2002-04-172007-08-30Canon K.K. Device for the provision of public key certificates
EP1512075A1 (en)*2002-05-222005-03-09Lucid Security CorporationAdaptive intrusion detection system
US7448077B2 (en)2002-05-232008-11-04International Business Machines CorporationFile level security for a metadata controller in a storage area network
US7193993B2 (en)*2002-05-232007-03-20Intel CorporationIntegrated medium access control device and physical layer device
US7536548B1 (en)*2002-06-042009-05-19Rockwell Automation Technologies, Inc.System and methodology providing multi-tier-security for network data exchange with industrial control components
US20030229812A1 (en)*2002-06-052003-12-11Cristina BuchholzAuthorization mechanism
WO2003107154A1 (en)*2002-06-182003-12-24Honeywell International Inc.Master dongle for a secured data communications network
US7370350B1 (en)*2002-06-272008-05-06Cisco Technology, Inc.Method and apparatus for re-authenticating computing devices
US20040015619A1 (en)*2002-07-182004-01-22International Business Machines CorporationMethod and system for monitoring the status and operation of devices from a central location
US7770212B2 (en)*2002-08-152010-08-03ActivcardSystem and method for privilege delegation and control
US7441114B2 (en)*2002-09-102008-10-21Ge Fanuc Automation North America, Inc.Methods and systems for management and control of an automation control module
DE10242917A1 (en)*2002-09-162004-03-25Siemens Ag System for recording and displaying a secure status of devices
US20040059920A1 (en)*2002-09-192004-03-25International Business Machines CorporationSecurity health checking tool
US20040075590A1 (en)*2002-09-252004-04-22Pearson Esther MaeE-learning biometric identification information system
US20040107345A1 (en)*2002-10-212004-06-03Brandt David D.System and methodology providing automation security protocols and intrusion detection in an industrial controller environment
US20040139353A1 (en)*2002-11-192004-07-15Forcade Jonathan BrettMethodology and system for real time information system application intrusion detection
US20040260954A1 (en)*2003-06-192004-12-23Schneider Automation Inc.Biometrics PLC access and control system and method
US20050021839A1 (en)*2003-06-232005-01-27Russell Thomas C.Method and apparatus for providing a selectively isolated equipment area network for machine elements with data communication therebetween and with remote sites
US8190893B2 (en)*2003-10-272012-05-29Jp Morgan Chase BankPortable security transaction protocol
US7761460B1 (en)*2004-02-042010-07-20Rockwell Automation Technologies, Inc.Systems and methods that utilize a standard database interface to access data within an industrial device
US7437551B2 (en)*2004-04-022008-10-14Microsoft CorporationPublic key infrastructure scalability certificate revocation status validation
US7950044B2 (en)*2004-09-282011-05-24Rockwell Automation Technologies, Inc.Centrally managed proxy-based security for legacy automation systems
US7716489B1 (en)*2004-09-292010-05-11Rockwell Automation Technologies, Inc.Access control method for disconnected automation systems
US8429393B1 (en)*2004-09-302013-04-23Rockwell Automation Technologies, Inc.Method for obscuring a control device's network presence by dynamically changing the device's network addresses using a cryptography-based pattern
US7370202B2 (en)*2004-11-022008-05-06Voltage Security, Inc.Security device for cryptographic communications
US7990967B2 (en)*2005-01-062011-08-02Rockwell Automation Technologies, Inc.Firewall method and apparatus for industrial systems
US7900247B2 (en)*2005-03-142011-03-01Microsoft CorporationTrusted third party authentication for web services
US8776092B2 (en)*2006-09-292014-07-08Rockwell Automation Technologies, Inc.Multiple interface support
US8732658B2 (en)*2006-09-292014-05-20Rockwell Automation Technologies, Inc.Layered interface in an industrial environment

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4831582A (en)*1986-11-071989-05-16Allen-Bradley Company, Inc.Database access machine for factory automation network
US5774357A (en)*1991-12-231998-06-30Hoffberg; Steven M.Human factored interface incorporating adaptive pattern recognition based controller apparatus
US5583928A (en)*1992-06-191996-12-10British Telecommunications Public Limited CompanyDetecting local exchange failure and resultant control of a communications network
US6636721B2 (en)*1995-11-302003-10-21Mobile Satellite Ventures, LpNetwork engineering/systems system for mobile satellite communication system
US6169981B1 (en)*1996-06-042001-01-02Paul J. Werbos3-brain architecture for an intelligent decision and control system
US5796721A (en)*1996-06-211998-08-18National Instruments CorporationMethod and system for monitoring fieldbus network with dynamically alterable packet filter
US6023456A (en)*1996-12-232000-02-08Nortel Networks CorporationDynamic traffic conditioning
US6321272B1 (en)*1997-09-102001-11-20Schneider Automation, Inc.Apparatus for controlling internetwork communications
US6732191B1 (en)*1997-09-102004-05-04Schneider Automation Inc.Web interface to an input/output device
US6259705B1 (en)*1997-09-222001-07-10Fujitsu LimitedNetwork service server load balancing device, network service server load balancing method and computer-readable storage medium recorded with network service server load balancing program
US7047423B1 (en)*1998-07-212006-05-16Computer Associates Think, Inc.Information security analysis system
US6321338B1 (en)*1998-11-092001-11-20Sri InternationalNetwork surveillance
US6035240A (en)*1998-11-122000-03-07Moorehead; JackFlexible distributed processing system for sensor data acquisition and control
US7272815B1 (en)*1999-05-172007-09-18Invensys Systems, Inc.Methods and apparatus for control configuration with versioning, security, composite blocks, edit selection, object swapping, formulaic values and other aspects
US6788980B1 (en)*1999-06-112004-09-07Invensys Systems, Inc.Methods and apparatus for control using control devices that provide a virtual machine environment and that communicate via an IP network
US20020131366A1 (en)*2000-05-172002-09-19Sharp Clifford F.System and method for traffic management control in a data transmission network
US20020032871A1 (en)*2000-09-082002-03-14The Regents Of The University Of MichiganMethod and system for detecting, tracking and blocking denial of service attacks over a computer network
US20020046290A1 (en)*2000-10-122002-04-18Johann AnderssonComputer system
US20020108077A1 (en)*2001-02-052002-08-08Havekost Robert B.Hierarchical failure management for process control systems
US20030014500A1 (en)*2001-07-102003-01-16Schleiss Trevor D.Transactional data communications for process control systems

Cited By (65)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9160546B2 (en)*2012-06-052015-10-13Broadcom CorporationAuthenticating users based upon an identity footprint
US20150058961A1 (en)*2012-06-052015-02-26Broadcom CorporationAuthenticating users based upon an identity footprint
US10318903B2 (en)2016-05-062019-06-11General Electric CompanyConstrained cash computing system to optimally schedule aircraft repair capacity with closed loop dynamic physical state and asset utilization attainment control
US10318904B2 (en)2016-05-062019-06-11General Electric CompanyComputing system to control the use of physical state attainment of assets to meet temporal performance criteria
US10841322B2 (en)2018-01-182020-11-17General Electric CompanyDecision system and method for separating faults from attacks
US11323462B2 (en)2018-06-062022-05-03Reliaquest Holdings, LlcThreat mitigation system and method
US11095673B2 (en)2018-06-062021-08-17Reliaquest Holdings, LlcThreat mitigation system and method
US10721252B2 (en)*2018-06-062020-07-21Reliaquest Holdings, LlcThreat mitigation system and method
US10735443B2 (en)*2018-06-062020-08-04Reliaquest Holdings, LlcThreat mitigation system and method
US20220337614A1 (en)*2018-06-062022-10-20Reliaquest Holdings, LlcThreat mitigation system and method
WO2019236805A1 (en)2018-06-062019-12-12Reliaquest Holdings, LlcThreat mitigation system and method
US10848512B2 (en)2018-06-062020-11-24Reliaquest Holdings, LlcThreat mitigation system and method
US10848513B2 (en)2018-06-062020-11-24Reliaquest Holdings, LlcThreat mitigation system and method
US10848506B2 (en)2018-06-062020-11-24Reliaquest Holdings, LlcThreat mitigation system and method
US10855702B2 (en)2018-06-062020-12-01Reliaquest Holdings, LlcThreat mitigation system and method
US10855711B2 (en)2018-06-062020-12-01Reliaquest Holdings, LlcThreat mitigation system and method
US10951641B2 (en)2018-06-062021-03-16Reliaquest Holdings, LlcThreat mitigation system and method
US10965703B2 (en)2018-06-062021-03-30Reliaquest Holdings, LlcThreat mitigation system and method
US12406068B2 (en)2018-06-062025-09-02Reliaquest Holdings, LlcThreat mitigation system and method
US12373566B2 (en)2018-06-062025-07-29Reliaquest Holdings, LlcThreat mitigation system and method
US12346451B2 (en)2018-06-062025-07-01Reliaquest Holdings, LlcThreat mitigation system and method
US11363043B2 (en)2018-06-062022-06-14Reliaquest Holdings, LlcThreat mitigation system and method
US12229276B2 (en)*2018-06-062025-02-18Reliaquest Holdings, LlcThreat mitigation system and method
US12204652B2 (en)2018-06-062025-01-21Reliaquest Holdings, LlcThreat mitigation system and method
US11687659B2 (en)*2018-06-062023-06-27Reliaquest Holdings, LlcThreat mitigation system and method
US11374951B2 (en)2018-06-062022-06-28Reliaquest Holdings, LlcThreat mitigation system and method
US11108798B2 (en)2018-06-062021-08-31Reliaquest Holdings, LlcThreat mitigation system and method
US11921864B2 (en)2018-06-062024-03-05Reliaquest Holdings, LlcThreat mitigation system and method
US11265338B2 (en)2018-06-062022-03-01Reliaquest Holdings, LlcThreat mitigation system and method
EP3803658A4 (en)*2018-06-062022-03-23Reliaquest Holdings, LLC THREAT MITIGATION SYSTEM AND METHOD
EP3803656A4 (en)*2018-06-062022-03-23Reliaquest Holdings, LLC THREAT MITIGATION SYSTEM AND PROCEDURES
US11297080B2 (en)2018-06-062022-04-05Reliaquest Holdings, LlcThreat mitigation system and method
US20190379703A1 (en)*2018-06-062019-12-12Reliaquest Holdings, LlcThreat mitigation system and method
US20190379702A1 (en)*2018-06-062019-12-12Reliaquest Holdings, LlcThreat mitigation system and method
US20230306120A1 (en)*2018-06-062023-09-28Reliaquest Holdings, LlcThreat mitigation system and method
US10735444B2 (en)2018-06-062020-08-04Reliaquest Holdings, LlcThreat mitigation system and method
US11709946B2 (en)2018-06-062023-07-25Reliaquest Holdings, LlcThreat mitigation system and method
US11528287B2 (en)2018-06-062022-12-13Reliaquest Holdings, LlcThreat mitigation system and method
US11588838B2 (en)*2018-06-062023-02-21Reliaquest Holdings, LlcThreat mitigation system and method
US11611577B2 (en)2018-06-062023-03-21Reliaquest Holdings, LlcThreat mitigation system and method
US11637847B2 (en)2018-06-062023-04-25Reliaquest Holdings, LlcThreat mitigation system and method
US12140926B2 (en)2019-02-282024-11-12Nanotronics Imaging, Inc.Assembly error correction for assembly lines
USD926810S1 (en)2019-06-052021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926809S1 (en)2019-06-052021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926200S1 (en)2019-06-062021-07-27Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926782S1 (en)2019-06-062021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926811S1 (en)2019-06-062021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
US12153411B2 (en)2019-06-242024-11-26Nanotronics Imaging, Inc.Predictive process control for a manufacturing process
US12153412B2 (en)2019-06-242024-11-26Nanotronics Imaging, Inc.Predictive process control for a manufacturing process
US20220353290A1 (en)*2019-09-092022-11-03Reliaquest Holdings, LlcThreat mitigation system and method
US12355799B2 (en)*2019-09-092025-07-08Reliaquest Holdings, LlcThreat mitigation system and method
US11693956B2 (en)2019-10-082023-07-04Nanotronics Imaging, Inc.Dynamic monitoring and securing of factory processes, equipment and automated systems
US12111923B2 (en)2019-10-082024-10-08Nanotronics Imaging, Inc.Dynamic monitoring and securing of factory processes, equipment and automated systems
US11100221B2 (en)2019-10-082021-08-24Nanotronics Imaging, Inc.Dynamic monitoring and securing of factory processes, equipment and automated systems
US11163890B2 (en)2019-10-092021-11-02United States Of America As Represented By The Secretary Of The NavySelf-targeting method of automated cybersecurity analysis on an operating system
US12153408B2 (en)2019-11-062024-11-26Nanotronics Imaging, Inc.Systems, methods, and media for manufacturing processes
US12165353B2 (en)2019-11-062024-12-10Nanotronics Imaging, Inc.Systems, methods, and media for manufacturing processes
US12153401B2 (en)2019-11-062024-11-26Nanotronics Imaging, Inc.Systems, methods, and media for manufacturing processes
US12153668B2 (en)2019-11-202024-11-26Nanotronics Imaging, Inc.Securing industrial production from sophisticated attacks
US12155673B2 (en)2019-12-192024-11-26Nanotronics Imaging, Inc.Dynamic monitoring and securing of factory processes, equipment and automated systems
US12111922B2 (en)2020-02-282024-10-08Nanotronics Imaging, Inc.Method, systems and apparatus for intelligently emulating factory control systems and simulating response data
US11086988B1 (en)2020-02-282021-08-10Nanotronics Imaging, Inc.Method, systems and apparatus for intelligently emulating factory control systems and simulating response data
US11663327B2 (en)2020-02-282023-05-30Nanotronics Imaging, Inc.Method, systems and apparatus for intelligently emulating factory control systems and simulating response data
US11706235B2 (en)*2020-08-062023-07-18Robert Bosch GmbhMethod and device for processing data of a technical system
EP4589883A1 (en)*2024-01-172025-07-23Abb Schweiz AgComputer-implemented method and system for automatically generating a security configuration for a control system

Also Published As

Publication numberPublication date
EP1420317A3 (en)2005-12-21
EP1420317B1 (en)2016-12-14
US8909926B2 (en)2014-12-09
EP1420317A2 (en)2004-05-19
US20040117624A1 (en)2004-06-17

Similar Documents

PublicationPublication DateTitle
US8909926B2 (en)System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US10862902B2 (en)System and methodology providing automation security analysis and network intrusion protection in an industrial environment
US12363157B2 (en)Cyber security appliance for an operational technology network
Rubio et al.Current cyber-defense trends in industrial control systems
US20240214351A1 (en)Security system, device, and method for protecting control systems
US11595396B2 (en)Enhanced smart process control switch port lockdown
US9961099B2 (en)Systems and methods for detecting and tracking adversary trajectory
FlausCybersecurity of industrial systems
US10530749B1 (en)Security system, device, and method for operational technology networks
Settanni et al.Protecting cyber physical production systems using anomaly detection to enable self-adaptation
US20060236374A1 (en)Industrial dynamic anomaly detection method and apparatus
JP2016163352A (en) Anomaly detection, anomaly detection system and method for anomaly detection in industrial communication networks
CN110326268B (en) Transparent firewall to protect field devices
Ulltveit-Moe et al.Secure information sharing in an industrial Internet of Things
US20240430232A1 (en)Security system, device, and method for protecting control systems
Settanni et al.Countering targeted cyber-physical attacks using anomaly detection in self-adaptive Industry 4.0 Systems
US20180309724A1 (en)Control plane network security
Ovaz Akpinar et al.Development of the ECAT preprocessor with the trust communication approach
McNeilSecure IoT deployment in the cement industry
Wei et al.On protecting industrial automation and control systems against electronic attacks
RehanCybersecurity with AWS IoT
KodelaThe Role of AI in Zero Trust Architecture: Strengthening Network Security on the Manufacturing Shop Floor
TedeschiA systematic design approach to IOT security for legacy production machinery
Karthika et al.Safeguarding Scada Network by Captious State Based Filter

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:ROCKWELL AUTOMATION TECHNOLOGIES, INC., OHIO

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRANDT, DAVID D.;HALL, KENWOOD;ANDERSON, MARK BURTON;AND OTHERS;SIGNING DATES FROM 20030904 TO 20031217;REEL/FRAME:034122/0426

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp