Movatterモバイル変換


[0]ホーム

URL:


US20160112443A1 - Cybersecurity system - Google Patents

Cybersecurity system
Download PDF

Info

Publication number
US20160112443A1
US20160112443A1US14/885,857US201514885857AUS2016112443A1US 20160112443 A1US20160112443 A1US 20160112443A1US 201514885857 AUS201514885857 AUS 201514885857AUS 2016112443 A1US2016112443 A1US 2016112443A1
Authority
US
United States
Prior art keywords
analytic
engine
data
real time
scoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/885,857
Other versions
US9306965B1 (en
Inventor
Robert L. Grossman
James E. Heath
Russell D. Richardson
Keith B. Alexander
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
IronNet Cybersecurity Inc
Original Assignee
IronNet Cybersecurity Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IronNet Cybersecurity IncfiledCriticalIronNet Cybersecurity Inc
Priority to US14/885,857priorityCriticalpatent/US9306965B1/en
Assigned to IronNet Cybersecurity, Inc.reassignmentIronNet Cybersecurity, Inc.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ALEXANDER, KEITH B., GROSSMAN, ROBERT L., HEATH, JAMES E., RICHARDSON, RUSSELL D.
Application grantedgrantedCritical
Publication of US9306965B1publicationCriticalpatent/US9306965B1/en
Publication of US20160112443A1publicationCriticalpatent/US20160112443A1/en
Assigned to FERROUS INVESTORS LPreassignmentFERROUS INVESTORS LPSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: IRONCAD LLC, IronNet Cybersecurity, Inc.
Assigned to ITC GLOBAL ADVISORS, LLC, FERROUS INVESTORS LPreassignmentITC GLOBAL ADVISORS, LLCSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: IRONCAD LLC, IronNet Cybersecurity, Inc.
Assigned to IRONCAD LLC, IronNet Cybersecurity, Inc.reassignmentIRONCAD LLCRELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: FERROUS INVESTORS LP, AS SECURED PARTY
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Definitions

Landscapes

Abstract

A cybersecurity system for processing events to produce scores, alerts, and mitigation actions. The system includes sensors for receiving and processing data to form events, distributed analytic platform for processing events to form analytic workflows, and scoring engines for processing events using analytic workflows to produce scoring engine messages. The system also includes real time analytic engine for processing scoring engine messages and distributed analytic platform messages using the analytic workflows and analytic workflow and event processing rules to form and transmit a threat intelligence message. Threat intelligence messages include broadcast messages, mitigation messages, and model update messages. The system also includes logical segments which associate an analytic model, a set of analytic models, or an analytic workflow; one or more sources of inputs about activity within the logical segment, and a set of actions for mitigating an impact of the anomalous activity occurring within the logical segment.

Description

Claims (29)

We claim:
1. A cybersecurity system for processing events to produce scores, alerts, and mitigation actions, the system comprising:
a plurality of sensors, each of the plurality of sensors being configured to:
receive sensor data from the network,
process the sensor data to form events, and
transmit the events;
a distributed analytic platform, the distributed analytic platform configured to:
receive the events from the plurality of sensors,
process the events to form analytic workflows, each of the analytic workflows associated with one or more logical segments, and
transmit the analytic workflows and distributed analytic platform messages;
a plurality of scoring engines, each of the plurality of scoring engines being configured to:
receive the analytic workflows from the distributed analytic platform,
receive the events from at least one of the plurality of sensors,
process the received events using the analytic workflows to produce scoring engine messages, and
transmit the scoring engine messages; and
a real time analytic engine, the real time analytic engine configured to:
receive the analytic workflows from the distributed analytic platform,
receive analytic workflow and event processing rules,
receive the scoring engine messages from the plurality of scoring engines,
receive the distributed analytic platform messages from the distributed analytic platform, and
process the scoring engine messages and the distributed analytic platform messages using the analytic workflows from the distributed analytic platform and the analytic workflow and event processing rules to form a threat intelligence message, wherein the threat intelligence message comprises at least one of:
a broadcast message, the real time analytic engine configured to transmit the broadcast message,
a mitigation message, the real time analytic engine configured to transmit the mitigation message to a control plane engine for taking a mitigation action associated with a first logical segment of the one or more logical segments when the processing by the real time analytic engine indicates the mitigation action limits the impact of anomalous activity, and
a model update message, the real time analytic engine configured to transmit the model update message for updating one or more analytic workflows when the processing by the real time analytic engine indicates the model update message improves at least one of a detection rate of the anomalous activity and a reduction in a false positive rate,
each of the one or more logical segments associating:
an analytic model, a set of analytic models, or an analytic workflow,
one or more sources of inputs about activity within the logical segment, and
a set of actions for mitigating an impact of the anomalous activity occurring within the logical segment.
2. The system ofclaim 1, wherein the plurality of sensors, the plurality of scoring engines, the distributed analytic platform, the real time analytic engine, and the control plane engine are connected using an out of band network.
3. The system ofclaim 1, wherein the plurality of sensors, the plurality of scoring engines, the distributed analytic platform, the real time analytic engine, and the control plane engine communicate by sending associated messages over an enterprise system bus.
4. The system ofclaim 2, wherein the plurality of sensors, the plurality of scoring engines, the distributed analytic platform, the real time analytic engine, and the control plane engine communicate by sending associated messages over an enterprise system bus.
5. The system ofclaim 1, further comprising an ingest actors module, the ingest actors module configured to:
receive third party application data from at least one of a third party application and a third party device, and
transmit the third party application data for further processing by at least one of the plurality of scoring engines, the distributed analytic platform and the real time analytic engine.
6. The system ofclaim 5, wherein the plurality of sensors, the plurality of scoring engines, the distributed analytic platform, the real time analytic engine, the control plane engine, and the ingest actors module are connected using an out of band network.
7. The system ofclaim 5, wherein the plurality of sensors, the plurality of scoring engines, the distributed analytic platform, the real time analytic engine, the control plane engine, and the ingest actors module communicate by sending associated messages over an enterprise system bus.
8. The system ofclaim 1, wherein the scoring engine is further configured to:
receive the model update messages, and
process the update messages concurrently with the processing of the events.
9. The system ofclaim 1, wherein to form at least one of the broadcast message, the mitigation message and the model update message, the real time analytic engine is further configured to:
receive a first output at a first time from at least one of the plurality of scoring engines, the distributed analytic platform, and the plurality of sensors;
retrieve first state information corresponding to the first output;
update the first state information with first output data;
process the updated first state information by an analytic workflow associated with the real time analytic engine to form processed updated first state information;
store the processed updated first state information in the real time analytic engine;
receive a second output at a second time from at least one of the plurality of scoring engines, the distributed analytic platform, and the plurality of sensors;
retrieve second state information corresponding to the second output;
update the second state information with second output data;
process the updated second state information by the analytic workflow associated with the real time analytic engine to form processed updated second state information;
form the at least one of the broadcast message, the mitigation message and the model update message based on the processed updated second state information; and
store the processed updated second state information in the real time analytic engine.
10. The system ofclaim 9, wherein the real time analytic engine is further configured to:
receive an interim output at a third time from at least one of the plurality of scoring engines, the distributed analytic platform, and the plurality of sensors, wherein the third time is subsequent to the first time and prior to the second time;
retrieve interim state information corresponding to the interim output;
update the interim state information with interim output data;
process the updated interim state information by the analytic workflow associated with the real time analytic engine to form processed updated interim state information; and
store the processed updated interim state information in the real time analytic engine.
11. The system ofclaim 1, wherein the analytic workflows comprise a Model Interchange Format document, wherein the Model Interchange Format document supports:
a composition of analytic models;
a segmentation of analytic models;
an ensemble of analytic models;
a composition of analytic models with rules;
a composition of analytic models with pre-processing and post-processing stages, wherein the preprocessing and post-processing stages includes data transformations and data aggregations; and
the analytic workflows, each of the analytic workflows comprising at least one of analytic models, rules, data transformations, data aggregations, and compositions of the analytic models, the rules, the data transformations, the data aggregations, the segmentations, and the ensembles.
12. The system ofclaim 1, wherein the real time analytic engine is further configured to:
transmit an updated behavioral model to one or more of the plurality of scoring engines when changes to one or more of the analytic workflows exceeds a threshold.
13. The system ofclaim 1, wherein the events comprise at least one of:
data about network flows, data about packets, data about entities, data about users, data about workstations and servers, data about routers and switches, data about external network entities, and data about internal and external devices interacting with the network.
14. The system ofclaim 1, wherein one or more of the plurality of sensors and the plurality of scoring engines are integrated into a single application.
15. The system ofclaim 1, wherein the real time analytic engine is integrated with one or more of the plurality of scoring engines.
16. The system ofclaim 1, wherein the mitigation action comprises at least one of:
closing at least one port,
modifying of at least one packet data,
controlling the transmission of packets or flows,
blocking a subnet,
blocking one or more Internet Protocols (IPs) or ranges of IPs, and
blocking one or more internal or external IPs.
17. The system ofclaim 1, wherein the mitigation action comprises at least one of:
taking at least one of a server and workstation offline;
creating at least one of a new virtualized server and new virtualized workstation from a protected image; and
blocking an action associated with at least one of the server and the workstation.
18. The system ofclaim 1, wherein the anomalous activity comprises at least one of a reconnaissance, exploit, intrusion, compromise, insider threat, and attack.
19. The system ofclaim 18, wherein the mitigation action comprises at least one of:
modifying of at least one packet data, controlling the transmission of packets or flows, and removing authorization and access privileges for an entity associated with the anomalous activity, wherein removing authorization and access privileges comprises at least one of blocking network access, blocking access to network devices, blocking access to servers, blocking access to workstations, and blocking access to other computing devices.
20. The system ofclaim 18, wherein the anomalous activity is associated with at least one of an internal bad actor and an external bad actor.
21. The system ofclaim 1, further comprising a visualization engine, the visualization engine including a monitor, the visualization engine configured to:
receive statistics and graphical images associated with the processing of scoring engine messages by the real time analytic engine; and
display the statistics and graphical images on the monitor.
22. A cybersecurity network comprising a plurality of the systems ofclaim 1, wherein each of the plurality of cybersecurity systems is configured to exchange a selected threat intelligence message with one or more of the other cybersecurity systems, wherein:
the selected threat intelligence message is encrypted to provide a secure mechanism for transferring information, wherein the information in the selected threat intelligence message does not expose sensitive internal information about the transmitting cybersecurity system.
23. The system ofclaim 1, configured to exchange an external threat intelligence message with a compatible third party system, wherein:
the external threat intelligence message is encrypted to provide a secure mechanism for transferring information;
the information in the external threat intelligence message does not expose sensitive internal information about the system transmitting the external threat intelligence message; and
the external threat intelligence message is formatted with a common Model Interchange Format.
24. The system ofclaim 1, wherein the distributed analytic platform is further configured to:
receive the scoring engine messages; and
process the scoring engine messages to form threat intelligence messages.
25. The system ofclaim 1, wherein the broadcast message comprises at least one of an information message, a cyber event message and an alert message.
26. The system ofclaim 1, wherein each of the plurality of logical segments is associated with at least one of a division of the network, a division of the traffic on the network, a division of users on the network, a division of devices on the network, a division based upon third party data, and data associated with at least one of the divisions of the network, the traffic on the network, the users on the network, the devices on the network and third party data.
27. The system ofclaim 26, wherein at least a first division overlaps with at least a second division.
28. The system ofclaim 27, wherein the plurality of sensors, the plurality of scoring engines, the distributed analytic platform, the real time analytic engine, the control plane engine, and the ingest actors module communicate by sending associated messages over an enterprise system bus.
29. A cybersecurity system for processing events to produce scores, alerts, and mitigation actions, the system comprising:
a plurality of sensors, each of the plurality of sensors being configured to:
receive sensor data from the network,
process the sensor data to form events, and
transmit the events;
a distributed analytic platform, the distributed analytic platform configured to:
receive the events from the plurality of sensors,
process the events to form analytic workflows, each of the analytic workflows associated with one or more logical segments, and
transmit the analytic workflows and distributed analytic platform messages;
a scoring engine, the scoring engine configured to:
receive the analytic workflows from the distributed analytic platform,
receive the events from at least one of the plurality of sensors,
process the events using the analytic workflows to produce scoring engine messages, and
transmit the scoring engine messages; and
a real time analytic engine, the real time analytic engine configured to:
receive the analytic workflows from the distributed analytic platform,
receive analytic workflow and event processing rules,
receive the scoring engine messages,
receive the distributed analytic platform messages from the distributed analytic platform, and
process the scoring engine messages and the distributed analytic platform messages using the analytic workflows from the distributed analytic platform and the analytic workflow and event processing rules to form a threat intelligence message, wherein the threat intelligence message comprises at least one of:
a broadcast message, the real time analytic engine configured to transmit the broadcast message,
a mitigation message, the real time analytic engine configured to transmit the mitigation message to a control plane engine for taking a mitigation action associated with a first logical segment of the one or more logical segments when the processing by the real time analytic engine indicates the mitigation action limits the impact of anomalous activity, and
a model update message, the real time analytic engine configured to transmit the model update message for updating one or more analytic workflows when the processing by the real time analytic engine indicates the model update message improves at least one of a detection rate of the anomalous activity and a reduction in a false positive rate,
each of the one or more logical segments associating:
an analytic model, a set of analytic models, or an analytic workflow,
one or more sources of inputs about activity within the logical segment, and
a set of actions for mitigating an impact of the anomalous activity occurring within the logical segment.
US14/885,8572014-10-212015-10-16Cybersecurity systemActiveUS9306965B1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US14/885,857US9306965B1 (en)2014-10-212015-10-16Cybersecurity system

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
US201462066769P2014-10-212014-10-21
US14/885,857US9306965B1 (en)2014-10-212015-10-16Cybersecurity system

Publications (2)

Publication NumberPublication Date
US9306965B1 US9306965B1 (en)2016-04-05
US20160112443A1true US20160112443A1 (en)2016-04-21

Family

ID=55589164

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US14/885,857ActiveUS9306965B1 (en)2014-10-212015-10-16Cybersecurity system

Country Status (11)

CountryLink
US (1)US9306965B1 (en)
EP (1)EP3095034B1 (en)
JP (1)JP6196397B2 (en)
CN (1)CN106170772B (en)
CA (1)CA2934311C (en)
ES (1)ES2736099T3 (en)
IL (1)IL251719B (en)
LT (1)LT3095034T (en)
PL (1)PL3095034T3 (en)
SG (1)SG11201703164RA (en)
WO (1)WO2016109005A2 (en)

Cited By (47)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20170324709A1 (en)*2016-01-042017-11-09Centripetal Networks, Inc.Efficient Packet Capture for Cyber Threat Analysis
WO2017193845A1 (en)*2016-05-102017-11-16华为技术有限公司Method and device for auditing virtual network function
WO2017195201A1 (en)*2016-05-102017-11-16FirstPoint Mobile Guard Ltd.System and method for securing communication and information of mobile devices through a controlled cellular communication network
CN107666410A (en)*2016-07-292018-02-06埃森哲环球解决方案有限公司Network Safety Analysis system
US20190132336A1 (en)*2017-10-302019-05-02Bank Of America CorporationSystem for across rail silo system integration and logic repository
US10284526B2 (en)2017-07-242019-05-07Centripetal Networks, Inc.Efficient SSL/TLS proxy
US10284522B2 (en)2013-01-112019-05-07Centripetal Networks, Inc.Rule swapping for network protection
US10313384B1 (en)*2016-08-112019-06-04Balbix, Inc.Mitigation of security risk vulnerabilities in an enterprise network
US10333898B1 (en)2018-07-092019-06-25Centripetal Networks, Inc.Methods and systems for efficient network protection
US10346610B1 (en)*2017-01-312019-07-09EMC IP Holding Company LLCData protection object store
WO2019169486A1 (en)*2018-03-052019-09-12EzoTech Inc.Automated security testing system and method
US20190312838A1 (en)*2018-04-042019-10-10Sophos LimitedNetwork device with transparent heartbeat processing
US10503899B2 (en)2017-07-102019-12-10Centripetal Networks, Inc.Cyberanalysis workflow acceleration
US10505898B2 (en)2013-03-122019-12-10Centripetal Networks, Inc.Filtering network data transfers
US10530903B2 (en)2015-02-102020-01-07Centripetal Networks, Inc.Correlating packets in communications networks
US10542028B2 (en)*2015-04-172020-01-21Centripetal Networks, Inc.Rule-based network-threat detection
US10567437B2 (en)2012-10-222020-02-18Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10621341B2 (en)2017-10-302020-04-14Bank Of America CorporationCross platform user event record aggregation system
WO2020136519A1 (en)2018-12-242020-07-02Amzel MosheSystems and methods for early detection, warning and prevention of cyber threats
US10728256B2 (en)2017-10-302020-07-28Bank Of America CorporationCross channel authentication elevation via logic repository
US10742673B2 (en)*2017-12-082020-08-11Nicira, Inc.Tracking the dynamics of application-centric clusters in a virtualized datacenter
US10749906B2 (en)2014-04-162020-08-18Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10862909B2 (en)2013-03-152020-12-08Centripetal Networks, Inc.Protecting networks from cyber attacks and overloading
US10887369B2 (en)*2017-09-252021-01-05Splunk Inc.Customizable load balancing in a user behavior analytics deployment
US10956567B2 (en)*2015-12-152021-03-23Yokogawa Electric CorporationControl device, integrated industrial system, and control method thereof
US10972431B2 (en)2018-04-042021-04-06Sophos LimitedDevice management based on groups of network adapters
US20210120027A1 (en)*2016-02-092021-04-22Darktrace LimitedAnomaly alert system for cyber threat detection
US11018970B2 (en)2016-10-312021-05-25Nicira, Inc.Monitoring resource consumption for distributed services
US11075953B2 (en)2017-08-282021-07-27Fujitsu LimitedCyber attack information processing apparatus and method
US11140195B2 (en)2018-04-042021-10-05Sophos LimitedSecure endpoint in a heterogenous enterprise network
US11159546B1 (en)2021-04-202021-10-26Centripetal Networks, Inc.Methods and systems for efficient threat context-aware packet filtering for network protection
US11184391B2 (en)2016-06-302021-11-23Sophos LimitedServer-client authentication with integrated status update
US11233777B2 (en)2017-07-242022-01-25Centripetal Networks, Inc.Efficient SSL/TLS proxy
US11258681B2 (en)2016-12-162022-02-22Nicira, Inc.Application assessment and visibility for micro-segmentation of a network deployment
US11271950B2 (en)2018-04-042022-03-08Sophos LimitedSecuring endpoints in a heterogenous enterprise network
WO2022187673A1 (en)*2021-03-052022-09-09Aceiss, Inc.Systems and methods for onboarding and managing applications over networks
US11477224B2 (en)2015-12-232022-10-18Centripetal Networks, Inc.Rule-based network-threat detection for encrypted communications
WO2022251132A1 (en)*2021-05-252022-12-01IronNet Cybersecurity, Inc.Identification of invalid advertising traffic
US11539664B2 (en)2020-10-272022-12-27Centripetal Networks, Inc.Methods and systems for efficient adaptive logging of cyber threat incidents
US20230030504A1 (en)*2019-12-192023-02-02Siemens Mobility GmbHTransmission device for transmitting data
US11588854B2 (en)2019-12-192023-02-21Vmware, Inc.User interface for defining security groups
US11616758B2 (en)2018-04-042023-03-28Sophos LimitedNetwork device for securing endpoints in a heterogeneous enterprise network
EP4380106A1 (en)*2022-11-302024-06-05Juniper Networks, Inc.Intelligent firewall flow processor
US12008379B2 (en)2021-05-142024-06-11Samsung Electronics Co., Ltd.Automotive image sensor, image processing system including the same and operating method thereof
US12199813B2 (en)2022-06-302025-01-14Juniper Networks, Inc.Framework for automated application-to-network root cause analysis
US12238069B2 (en)2022-11-302025-02-25Juniper Networks, Inc.Self-correcting service level agreement enforcer
US12427999B2 (en)2022-06-142025-09-30Samsung Electronics Co., Ltd.Controller for processing image data, image processing system including controller, and method of operating controller

Families Citing this family (102)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10749905B2 (en)*2017-07-312020-08-18Amdocs Development LimitedSystem, method, and computer program providing security in network function virtualization (NFV) based communication networks and software defined networks (SDNS)
US11165812B2 (en)2014-12-032021-11-02Splunk Inc.Containment of security threats within a computing environment
US10230742B2 (en)*2015-01-302019-03-12Anomali IncorporatedSpace and time efficient threat detection
US9619491B2 (en)*2015-04-022017-04-11Sas Institute Inc.Streamlined system to restore an analytic model state for training and scoring
US12224992B2 (en)2015-10-282025-02-11Qomplx LlcAI-driven defensive cybersecurity strategy analysis and recommendation system
US10681074B2 (en)2015-10-282020-06-09Qomplx, Inc.System and method for comprehensive data loss prevention and compliance management
US11757920B2 (en)*2015-10-282023-09-12Qomplx, Inc.User and entity behavioral analysis with network topology enhancements
US11089045B2 (en)2015-10-282021-08-10Qomplx, Inc.User and entity behavioral analysis with network topology enhancements
US10152596B2 (en)*2016-01-192018-12-11International Business Machines CorporationDetecting anomalous events through runtime verification of software execution using a behavioral model
US10742667B1 (en)*2016-01-202020-08-11Cyarx Technologies Ltd.System and method for dynamical modeling multi-dimensional security event data into a graph representation
US10262133B1 (en)2016-01-202019-04-16Cyarx Technologies Ltd.System and method for contextually analyzing potential cyber security threats
US10354066B2 (en)*2016-02-262019-07-16Cylance Inc.Retention and accessibility of data characterizing events on an endpoint computer
HK1257367B (en)2016-07-142020-06-12IronNet Cybersecurity, Inc.Simulation and virtual reality based cyber behavioral system
KR101865690B1 (en)*2016-08-042018-06-12주식회사 시큐다임security monitoring system and method of network for visibility of HTTPS-based connection
US10402564B2 (en)*2016-08-162019-09-03Nec CorporationFine-grained analysis and prevention of invalid privilege transitions
US10157285B2 (en)2016-10-142018-12-18Bank Of America CorporationDynamic requirements mapping
US10212184B2 (en)2016-10-272019-02-19Opaq Networks, Inc.Method for the continuous calculation of a cyber security risk index
US10581915B2 (en)*2016-10-312020-03-03Microsoft Technology Licensing, LlcNetwork attack detection
US10171510B2 (en)2016-12-142019-01-01CyberSaint, Inc.System and method for monitoring and grading a cybersecurity framework
US10699012B2 (en)2017-01-112020-06-30Cylance Inc.Endpoint detection and response utilizing machine learning
US20180219884A1 (en)*2017-01-272018-08-02Hewlett Packard Enterprise Development LpChanging the deployment status of a pre-processor or analytic
US10728264B2 (en)*2017-02-152020-07-28Micro Focus LlcCharacterizing behavior anomaly analysis performance based on threat intelligence
US11552985B2 (en)2017-02-172023-01-10Nec CorporationMethod for predicting events using a joint representation of different feature types
CN108632214B (en)*2017-03-202022-02-22中兴通讯股份有限公司Method and device for realizing moving target defense
US11049026B2 (en)2017-03-202021-06-29Micro Focus LlcUpdating ground truth data in a security management platform
US11551028B2 (en)2017-04-042023-01-10Hailo Technologies Ltd.Structured weight based sparsity in an artificial neural network
US11615297B2 (en)2017-04-042023-03-28Hailo Technologies Ltd.Structured weight based sparsity in an artificial neural network compiler
US10387298B2 (en)2017-04-042019-08-20Hailo Technologies LtdArtificial neural network incorporating emphasis and focus techniques
US12430543B2 (en)2017-04-042025-09-30Hailo Technologies Ltd.Structured sparsity guided training in an artificial neural network
US11238334B2 (en)2017-04-042022-02-01Hailo Technologies Ltd.System and method of input alignment for efficient vector operations in an artificial neural network
US11544545B2 (en)2017-04-042023-01-03Hailo Technologies Ltd.Structured activation based sparsity in an artificial neural network
CN111066015B (en)2017-04-262024-02-23西兰克公司Endpoint detection and response system event feature data transmission
US10698625B2 (en)*2017-05-152020-06-30Accenture Global Solutions LimitedData pipeline architecture for analytics processing stack
US9998895B1 (en)2017-06-282018-06-12Motorola Solutions, Inc.Apparatus and method for real-time public safety evidentiary data collection
US10306341B2 (en)2017-06-282019-05-28Motorola Solutions, Inc.Method and apparatus for determining sensor data reliability at an incident scene for real-time and post-incident processing
US9936360B1 (en)2017-06-282018-04-03Motorola Solutions, Inc.Apparatus and method for real-time public safety evidentiary data collection
US10599460B2 (en)*2017-08-072020-03-24Modelop, Inc.Analytic model execution engine with instrumentation for granular performance analysis for metrics and diagnostics for troubleshooting
CN109511129A (en)*2017-09-152019-03-22中国移动通信集团广东有限公司A kind of wireless network secure detection method and device
JP6933320B2 (en)*2017-09-252021-09-08Pipeline株式会社 Cybersecurity framework box
US11436471B2 (en)*2017-10-132022-09-06Panasonic Intellectual Property Corporation Of AmericaPrediction model sharing method and prediction model sharing system
US10902121B2 (en)2017-10-192021-01-26International Business Machines CorporationPolicy-based detection of anomalous control and data flow paths in an application program
US11489851B2 (en)*2017-11-062022-11-01Cyber Defence Qcd CorporationMethods and systems for monitoring cyber-events
CN108243189B (en)*2018-01-082020-08-18平安科技(深圳)有限公司Network threat management method and device, computer equipment and storage medium
US10607021B2 (en)2018-01-262020-03-31Bank Of America CorporationMonitoring usage of an application to identify characteristics and trigger security control
JP7065498B2 (en)*2018-02-032022-05-12アレグロスマート株式会社 Data orchestration platform management
US10659484B2 (en)2018-02-192020-05-19Cisco Technology, Inc.Hierarchical activation of behavioral modules on a data plane for behavioral analytics
US10824950B2 (en)2018-03-012020-11-03Hcl Technologies LimitedSystem and method for deploying a data analytics model in a target environment
US12099909B2 (en)*2018-03-062024-09-24Tazi AI Systems, Inc.Human understandable online machine learning system
WO2019183371A1 (en)*2018-03-222019-09-26Apomatix Inc.Networked computer-system management and control
US11699116B2 (en)*2018-04-162023-07-11Interset Software Inc.System and method for custom security predictive methods
WO2019220182A1 (en)*2018-05-172019-11-21Pratik SharmaApplication specific security functions in network
WO2019220833A1 (en)*2018-05-182019-11-21株式会社島津製作所Diagnosis assistance system and diagnosis assistance device
US11132440B2 (en)*2018-11-012021-09-28Foundation Of Soongsil University-Industry CooperationHybrid trust execution environment based android security framework, android device equipped with the same and method of executing trust service in android device
US12170680B2 (en)2019-02-132024-12-17Obsidian Security, Inc.Systems and methods for detecting security incidents across cloud-based application services
US11196759B2 (en)*2019-06-262021-12-07Microsoft Technology Licensing, LlcSIEM system and methods for exfiltrating event data
US11632386B2 (en)2019-07-192023-04-18Rochester Institute Of TechnologyCyberattack forecasting using predictive information
US11210262B2 (en)*2019-09-252021-12-28Sap SeData ingestion application for internet of devices
US11477223B2 (en)*2020-01-152022-10-18IronNet Cybersecurity, Inc.Systems and methods for analyzing cybersecurity events
US12341816B1 (en)*2020-04-082025-06-24Wells Fargo Bank, N.A.Security model utilizing multi-channel data with service level agreement integration
US11720686B1 (en)2020-04-082023-08-08Wells Fargo Bank, N.A.Security model utilizing multi-channel data with risk-entity facing cybersecurity alert engine and portal
US11706241B1 (en)2020-04-082023-07-18Wells Fargo Bank, N.A.Security model utilizing multi-channel data
US12015630B1 (en)2020-04-082024-06-18Wells Fargo Bank, N.A.Security model utilizing multi-channel data with vulnerability remediation circuitry
US11522880B2 (en)2020-07-092022-12-06International Business Machines CorporationAnalytics engine for data exploration and analytics
US11144862B1 (en)2020-09-022021-10-12Bank Of America CorporationApplication mapping and alerting based on data dependencies
US12248367B2 (en)2020-09-292025-03-11Hailo Technologies Ltd.Software defined redundant allocation safety mechanism in an artificial neural network processor
US11811421B2 (en)2020-09-292023-11-07Hailo Technologies Ltd.Weights safety mechanism in an artificial neural network processor
US11237894B1 (en)2020-09-292022-02-01Hailo Technologies Ltd.Layer control unit instruction addressing safety mechanism in an artificial neural network processor
US11221929B1 (en)2020-09-292022-01-11Hailo Technologies Ltd.Data stream fault detection mechanism in an artificial neural network processor
US11263077B1 (en)2020-09-292022-03-01Hailo Technologies Ltd.Neural network intermediate results safety mechanism in an artificial neural network processor
US11874900B2 (en)2020-09-292024-01-16Hailo Technologies Ltd.Cluster interlayer safety mechanism in an artificial neural network processor
US11366901B2 (en)2020-10-072022-06-21Bank Of America CorporationSystem and method for identifying insider threats in source code
US11303666B1 (en)2020-10-142022-04-12Expel, Inc.Systems and methods for intelligent cyber security threat detection and mitigation through an extensible automated investigations and threat mitigation platform
CN112800413B (en)*2021-02-262024-03-15上海派拉软件股份有限公司Authority information pushing method, device, equipment and storage medium
US11757933B1 (en)2021-06-242023-09-12Airgap Networks Inc.System and method for agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11711396B1 (en)2021-06-242023-07-25Airgap Networks Inc.Extended enterprise browser blocking spread of ransomware from alternate browsers in a system providing agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11916957B1 (en)2021-06-242024-02-27Airgap Networks Inc.System and method for utilizing DHCP relay to police DHCP address assignment in ransomware protected network
US11695799B1 (en)2021-06-242023-07-04Airgap Networks Inc.System and method for secure user access and agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11303673B1 (en)2021-06-242022-04-12Airgap Networks Inc.System and method for preventing lateral propagation of ransomware using a security appliance that functions as a DHCP relay on a shared network
US11252183B1 (en)2021-06-242022-02-15Airgap Networks Inc.System and method for ransomware lateral movement protection in on-prem and cloud data center environments
US12058171B1 (en)2021-06-242024-08-06Airgap Networks, Inc.System and method to create disposable jump boxes to securely access private applications
US11374964B1 (en)2021-06-242022-06-28Airgap Networks Inc.Preventing lateral propagation of ransomware using a security appliance that dynamically inserts a DHCP server/relay and a default gateway with point-to-point links between endpoints
US11722519B1 (en)2021-06-242023-08-08Airgap Networks Inc.System and method for dynamically avoiding double encryption of already encrypted traffic over point-to-point virtual private networks for lateral movement protection from ransomware
US12074906B1 (en)2021-06-242024-08-27Airgap Networks Inc.System and method for ransomware early detection using a security appliance as default gateway with point-to-point links between endpoints
US11757934B1 (en)2021-06-242023-09-12Airgap Networks Inc.Extended browser monitoring inbound connection requests for agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US11736520B1 (en)2021-06-242023-08-22Airgap Networks Inc.Rapid incidence agentless lateral movement protection from ransomware for endpoints deployed under a default gateway with point to point links
US12057969B1 (en)2021-06-242024-08-06Airgap Networks, Inc.System and method for load balancing endpoint traffic to multiple security appliances acting as default gateways with point-to-point links between endpoints
US11323474B1 (en)*2021-07-282022-05-03Airgap Networks, Inc.System and method for determining endpoint compatibility with subnet prefix of all-ones for lateral propagation prevention of ransomware
US11303669B1 (en)2021-06-242022-04-12Airgap Networks Inc.System and method for tunneling endpoint traffic to the cloud for ransomware lateral movement protection
US12124584B2 (en)2021-08-052024-10-22Bank Of America CorporationSystem and method for detecting insider threats in source code
US12058163B2 (en)2021-08-102024-08-06CyberSaint, Inc.Systems, media, and methods for utilizing a crosswalk algorithm to identify controls across frameworks, and for utilizing identified controls to generate cybersecurity risk assessments
US12169559B2 (en)2021-09-102024-12-17Bank Of America CorporationThreat-evaluated cyber defense
US11930027B2 (en)*2021-12-282024-03-12Nozomi Networks SaglMethod for evaluating quality of rule-based detections
US12143389B1 (en)2022-02-042024-11-12Wells Fargo Bank, N.A.3rd party data explorer
US11475375B1 (en)*2022-04-252022-10-18Morgan Stanley Services Group Inc.Risk assessment with automated escalation or approval
US20240098104A1 (en)*2022-09-192024-03-21Mellanox Technologies, Ltd.Machine learning (ml) based systems for air gapping network ports
CN115426198B (en)*2022-11-012023-03-24杭州安恒信息技术股份有限公司 Information processing method, device, equipment and storage medium
EP4415312A1 (en)2023-02-072024-08-14Fibabanka Anonim SirketiA secure blockchain-based architecture for enabling collective intelligence in distributed iot networks
US11956117B1 (en)2023-05-222024-04-09Google LlcNetwork monitoring and healing based on a behavior model
CN116702154B (en)*2023-06-082024-02-23唐山旭华智能科技有限公司Analysis system and method based on big data security assessment
US20250039067A1 (en)*2023-07-272025-01-30Qomplx LlcSystem and method for enterprise - wide data utilization tracking and risk reporting
US20250238424A1 (en)*2024-01-212025-07-24Itur Intelligence LTDFull feature object identity query engine
US12095787B1 (en)2024-03-212024-09-17Zafran Security LTDTechniques for aggregating mitigation actions

Family Cites Families (66)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6597660B1 (en)1997-01-032003-07-22Telecommunications Research LaboratoryMethod for real-time traffic analysis on packet networks
US6088804A (en)1998-01-122000-07-11Motorola, Inc.Adaptive system and method for responding to computer network security attacks
US6279113B1 (en)1998-03-162001-08-21Internet Tools, Inc.Dynamic signature inspection-based network intrusion detection
US6134664A (en)1998-07-062000-10-17Prc Inc.Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources
US6321338B1 (en)1998-11-092001-11-20Sri InternationalNetwork surveillance
JP4501280B2 (en)1998-12-092010-07-14インターナショナル・ビジネス・マシーンズ・コーポレーション Method and apparatus for providing network and computer system security
US6681331B1 (en)1999-05-112004-01-20Cylant, Inc.Dynamic software system intrusion detection
US6671811B1 (en)1999-10-252003-12-30Visa Internation Service AssociationFeatures generation for use in computer network intrusion detection
US6769066B1 (en)1999-10-252004-07-27Visa International Service AssociationMethod and apparatus for training a neural network model for use in computer network intrusion detection
US6519703B1 (en)2000-04-142003-02-11James B. JoyceMethods and apparatus for heuristic firewall
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US7290283B2 (en)2001-01-312007-10-30Lancope, Inc.Network port profiling
US7458094B2 (en)2001-06-062008-11-25Science Applications International CorporationIntrusion prevention system
US7331061B1 (en)2001-09-072008-02-12Secureworks, Inc.Integrated computer security management system and method
US7543056B2 (en)2002-01-152009-06-02Mcafee, Inc.System and method for network vulnerability detection and reporting
US7225343B1 (en)*2002-01-252007-05-29The Trustees Of Columbia University In The City Of New YorkSystem and methods for adaptive model generation for detecting intrusions in computer systems
US7448084B1 (en)*2002-01-252008-11-04The Trustees Of Columbia University In The City Of New YorkSystem and methods for detecting intrusions in a computer system by monitoring operating system registry accesses
ATE374493T1 (en)2002-03-292007-10-15Global Dataguard Inc ADAPTIVE BEHAVIORAL INTRUSION DETECTION
US7603711B2 (en)2002-10-312009-10-13Secnap Networks Security, LLCIntrusion detection system
US7454499B2 (en)2002-11-072008-11-18Tippingpoint Technologies, Inc.Active network defense system and method
US7376969B1 (en)2002-12-022008-05-20Arcsight, Inc.Real time monitoring and analysis of events from multiple network security devices
US7483972B2 (en)*2003-01-082009-01-27Cisco Technology, Inc.Network security monitoring system
US7603710B2 (en)*2003-04-032009-10-13Network Security Technologies, Inc.Method and system for detecting characteristics of a wireless network
US8640234B2 (en)2003-05-072014-01-28Trustwave Holdings, Inc.Method and apparatus for predictive and actual intrusion detection on a network
US7386883B2 (en)2003-07-222008-06-10International Business Machines CorporationSystems, methods and computer program products for administration of computer security threat countermeasures to a computer system
JP3922375B2 (en)2004-01-302007-05-30インターナショナル・ビジネス・マシーンズ・コーポレーション Anomaly detection system and method
US20050198363A1 (en)*2004-02-052005-09-08Yibei LingPreserving HTTP sessions in heterogeneous wireless environments
US7406606B2 (en)2004-04-082008-07-29International Business Machines CorporationMethod and system for distinguishing relevant network security threats using comparison of refined intrusion detection audits and intelligent security analysis
EP1589716A1 (en)2004-04-202005-10-26Ecole Polytechnique Fédérale de Lausanne (EPFL)Method of detecting anomalous behaviour in a computer network
US8458793B2 (en)2004-07-132013-06-04International Business Machines CorporationMethods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems
EP1817648B1 (en)2004-11-262020-09-16Telecom Italia S.p.A.Instrusion detection method and system, related network and computer program product therefor
US7784099B2 (en)2005-02-182010-08-24Pace UniversitySystem for intrusion detection and vulnerability assessment in a computer network using simulation and machine learning
US7814548B2 (en)2005-09-132010-10-12Honeywell International Inc.Instance based learning framework for effective behavior profiling and anomaly intrusion detection
US8079080B2 (en)2005-10-212011-12-13Mathew R. SyrowikMethod, system and computer program product for detecting security threats in a computer network
EP2442525A1 (en)*2005-12-132012-04-18Crossbeam Systems, Inc.Systems and methods for processing data flows
WO2008051258A2 (en)2005-12-212008-05-02University Of South CarolinaMethods and systems for determining entropy metrics for networks
CA2531410A1 (en)2005-12-232007-06-23Snipe Network Security CorporationBehavioural-based network anomaly detection based on user and group profiling
US20070204345A1 (en)2006-02-282007-08-30Elton PereiraMethod of detecting computer security threats
US7809740B2 (en)2006-03-292010-10-05Yahoo! Inc.Model for generating user profiles in a behavioral targeting system
US7739082B2 (en)2006-06-082010-06-15Battelle Memorial InstituteSystem and method for anomaly detection
EP2069993B1 (en)2006-10-042016-03-09Behaviometrics ABSecurity system and method for detecting intrusion in a computerized system
US7840377B2 (en)2006-12-122010-11-23International Business Machines CorporationDetecting trends in real time analytics
JP5278770B2 (en)2007-02-082013-09-04ビヘイヴィアラル レコグニション システムズ, インコーポレイテッド Behavior recognition system
US8015133B1 (en)*2007-02-202011-09-06Sas Institute Inc.Computer-implemented modeling systems and methods for analyzing and predicting computer network intrusions
US8392997B2 (en)2007-03-122013-03-05University Of Southern CaliforniaValue-adaptive security threat modeling and vulnerability ranking
US7770203B2 (en)2007-04-172010-08-03International Business Machines CorporationMethod of integrating a security operations policy into a threat management vector
US8707431B2 (en)2007-04-242014-04-22The Mitre CorporationInsider threat detection
US8296850B2 (en)2008-05-282012-10-23Empire Technology Development LlcDetecting global anomalies
US8572736B2 (en)2008-11-122013-10-29YeeJang James LinSystem and method for detecting behavior anomaly in information access
US8326987B2 (en)2008-11-122012-12-04Lin Yeejang JamesMethod for adaptively building a baseline behavior model
US8769684B2 (en)2008-12-022014-07-01The Trustees Of Columbia University In The City Of New YorkMethods, systems, and media for masquerade attack detection by monitoring computer user behavior
US8239668B1 (en)2009-04-152012-08-07Trend Micro IncorporatedComputer security threat data collection and aggregation with user privacy protection
US8260779B2 (en)*2009-09-172012-09-04General Electric CompanySystems, methods, and apparatus for automated mapping and integrated workflow of a controlled medical vocabulary
US20120137367A1 (en)2009-11-062012-05-31Cataphora, Inc.Continuous anomaly detection based on behavior modeling and heterogeneous information analysis
US8528091B2 (en)2009-12-312013-09-03The Trustees Of Columbia University In The City Of New YorkMethods, systems, and media for detecting covert malware
US8424091B1 (en)2010-01-122013-04-16Trend Micro IncorporatedAutomatic local detection of computer security threats
US8863279B2 (en)2010-03-082014-10-14Raytheon CompanySystem and method for malware detection
US8473415B2 (en)2010-05-042013-06-25Kevin Paul SiegelSystem and method for identifying a point of compromise in a payment transaction processing system
US8468599B2 (en)*2010-09-202013-06-18Sonalysts, Inc.System and method for privacy-enhanced cyber data fusion using temporal-behavioral aggregation and analysis
US9032521B2 (en)2010-10-132015-05-12International Business Machines CorporationAdaptive cyber-security analytics
AU2013272215B2 (en)2012-03-222017-10-12Imperial Innovations LimitedAnomaly detection to identify coordinated group attacks in computer networks
US8813228B2 (en)*2012-06-292014-08-19Deloitte Development LlcCollective threat intelligence gathering system
US8973140B2 (en)2013-03-142015-03-03Bank Of America CorporationHandling information security incidents
US8898784B1 (en)2013-05-292014-11-25The United States of America, as represented by the Director, National Security AgencyDevice for and method of computer intrusion anticipation, detection, and remediation
US20140365194A1 (en)2013-06-062014-12-11Zih Corp.Method, apparatus, and computer program product for dynamics/kinetics model selection
US9898741B2 (en)2013-07-172018-02-20Visa International Service AssociationReal time analytics system

Cited By (120)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12107893B2 (en)2012-10-222024-10-01Centripetal Networks, LlcMethods and systems for protecting a secured network
US10785266B2 (en)2012-10-222020-09-22Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10567437B2 (en)2012-10-222020-02-18Centripetal Networks, Inc.Methods and systems for protecting a secured network
US11012474B2 (en)2012-10-222021-05-18Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10681009B2 (en)2013-01-112020-06-09Centripetal Networks, Inc.Rule swapping in a packet network
US11539665B2 (en)2013-01-112022-12-27Centripetal Networks, Inc.Rule swapping in a packet network
US10541972B2 (en)2013-01-112020-01-21Centripetal Networks, Inc.Rule swapping in a packet network
US10511572B2 (en)2013-01-112019-12-17Centripetal Networks, Inc.Rule swapping in a packet network
US10284522B2 (en)2013-01-112019-05-07Centripetal Networks, Inc.Rule swapping for network protection
US11502996B2 (en)2013-01-112022-11-15Centripetal Networks, Inc.Rule swapping in a packet network
US11012415B2 (en)2013-03-122021-05-18Centripetal Networks, Inc.Filtering network data transfers
US10735380B2 (en)2013-03-122020-08-04Centripetal Networks, Inc.Filtering network data transfers
US11418487B2 (en)2013-03-122022-08-16Centripetal Networks, Inc.Filtering network data transfers
US10567343B2 (en)2013-03-122020-02-18Centripetal Networks, Inc.Filtering network data transfers
US10505898B2 (en)2013-03-122019-12-10Centripetal Networks, Inc.Filtering network data transfers
US11496497B2 (en)2013-03-152022-11-08Centripetal Networks, Inc.Protecting networks from cyber attacks and overloading
US10862909B2 (en)2013-03-152020-12-08Centripetal Networks, Inc.Protecting networks from cyber attacks and overloading
US10951660B2 (en)2014-04-162021-03-16Centripetal Networks, Inc.Methods and systems for protecting a secured network
US11477237B2 (en)2014-04-162022-10-18Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10749906B2 (en)2014-04-162020-08-18Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10944792B2 (en)2014-04-162021-03-09Centripetal Networks, Inc.Methods and systems for protecting a secured network
US10530903B2 (en)2015-02-102020-01-07Centripetal Networks, Inc.Correlating packets in communications networks
US11956338B2 (en)2015-02-102024-04-09Centripetal Networks, LlcCorrelating packets in communications networks
US10659573B2 (en)2015-02-102020-05-19Centripetal Networks, Inc.Correlating packets in communications networks
US11683401B2 (en)2015-02-102023-06-20Centripetal Networks, LlcCorrelating packets in communications networks
US10931797B2 (en)2015-02-102021-02-23Centripetal Networks, Inc.Correlating packets in communications networks
US11012459B2 (en)2015-04-172021-05-18Centripetal Networks, Inc.Rule-based network-threat detection
US11792220B2 (en)2015-04-172023-10-17Centripetal Networks, LlcRule-based network-threat detection
US11496500B2 (en)2015-04-172022-11-08Centripetal Networks, Inc.Rule-based network-threat detection
US12015626B2 (en)2015-04-172024-06-18Centripetal Networks, LlcRule-based network-threat detection
US10609062B1 (en)2015-04-172020-03-31Centripetal Networks, Inc.Rule-based network-threat detection
US10567413B2 (en)2015-04-172020-02-18Centripetal Networks, Inc.Rule-based network-threat detection
US11700273B2 (en)2015-04-172023-07-11Centripetal Networks, LlcRule-based network-threat detection
US10542028B2 (en)*2015-04-172020-01-21Centripetal Networks, Inc.Rule-based network-threat detection
US10757126B2 (en)2015-04-172020-08-25Centripetal Networks, Inc.Rule-based network-threat detection
US11516241B2 (en)2015-04-172022-11-29Centripetal Networks, Inc.Rule-based network-threat detection
US10956567B2 (en)*2015-12-152021-03-23Yokogawa Electric CorporationControl device, integrated industrial system, and control method thereof
US12010135B2 (en)2015-12-232024-06-11Centripetal Networks, LlcRule-based network-threat detection for encrypted communications
US11811810B2 (en)2015-12-232023-11-07Centripetal Networks, LlcRule-based network threat detection for encrypted communications
US11477224B2 (en)2015-12-232022-10-18Centripetal Networks, Inc.Rule-based network-threat detection for encrypted communications
US11811809B2 (en)2015-12-232023-11-07Centripetal Networks, LlcRule-based network-threat detection for encrypted communications
US11811808B2 (en)2015-12-232023-11-07Centripetal Networks, LlcRule-based network-threat detection for encrypted communications
US11563758B2 (en)2015-12-232023-01-24Centripetal Networks, Inc.Rule-based network-threat detection for encrypted communications
US11824879B2 (en)2015-12-232023-11-21Centripetal Networks, LlcRule-based network-threat detection for encrypted communications
US20170324709A1 (en)*2016-01-042017-11-09Centripetal Networks, Inc.Efficient Packet Capture for Cyber Threat Analysis
US11729144B2 (en)*2016-01-042023-08-15Centripetal Networks, LlcEfficient packet capture for cyber threat analysis
US12375447B2 (en)2016-01-042025-07-29Centripetal Networks, LlcEfficient packet capture for cyber threat analysis
US12126636B2 (en)*2016-02-092024-10-22Darktrace Holdings LimitedAnomaly alert system for cyber threat detection
US20210120027A1 (en)*2016-02-092021-04-22Darktrace LimitedAnomaly alert system for cyber threat detection
WO2017193845A1 (en)*2016-05-102017-11-16华为技术有限公司Method and device for auditing virtual network function
US10990670B2 (en)2016-05-102021-04-27Huawei Technologies Co., Ltd.Virtual network function audit method and apparatus
CN107360120A (en)*2016-05-102017-11-17华为技术有限公司The auditing method and device of virtual network function
WO2017195201A1 (en)*2016-05-102017-11-16FirstPoint Mobile Guard Ltd.System and method for securing communication and information of mobile devices through a controlled cellular communication network
US11736522B2 (en)2016-06-302023-08-22Sophos LimitedServer-client authentication with integrated status update
US11184391B2 (en)2016-06-302021-11-23Sophos LimitedServer-client authentication with integrated status update
US11184392B2 (en)2016-06-302021-11-23Sophos LimitedDetecting lateral movement by malicious applications
US11722521B2 (en)2016-06-302023-08-08Sophos LimitedApplication firewall
US12244641B2 (en)2016-06-302025-03-04Sophos LimitedApplication firewall
CN107666410A (en)*2016-07-292018-02-06埃森哲环球解决方案有限公司Network Safety Analysis system
US9961100B2 (en)2016-07-292018-05-01Accenture Global Solutions LimitedNetwork security analysis system
US10305924B2 (en)2016-07-292019-05-28Accenture Global Solutions LimitedNetwork security analysis system
US10313384B1 (en)*2016-08-112019-06-04Balbix, Inc.Mitigation of security risk vulnerabilities in an enterprise network
US11018970B2 (en)2016-10-312021-05-25Nicira, Inc.Monitoring resource consumption for distributed services
US11258681B2 (en)2016-12-162022-02-22Nicira, Inc.Application assessment and visibility for micro-segmentation of a network deployment
US11750481B2 (en)2016-12-162023-09-05Nicira, Inc.Application assessment and visibility for micro-segmentation of a network deployment
US10346610B1 (en)*2017-01-312019-07-09EMC IP Holding Company LLCData protection object store
US11797671B2 (en)2017-07-102023-10-24Centripetal Networks, LlcCyberanalysis workflow acceleration
US11574047B2 (en)2017-07-102023-02-07Centripetal Networks, Inc.Cyberanalysis workflow acceleration
US12019745B2 (en)2017-07-102024-06-25Centripetal Networks, LlcCyberanalysis workflow acceleration
US10503899B2 (en)2017-07-102019-12-10Centripetal Networks, Inc.Cyberanalysis workflow acceleration
US11233777B2 (en)2017-07-242022-01-25Centripetal Networks, Inc.Efficient SSL/TLS proxy
US10284526B2 (en)2017-07-242019-05-07Centripetal Networks, Inc.Efficient SSL/TLS proxy
US12034710B2 (en)2017-07-242024-07-09Centripetal Networks, LlcEfficient SSL/TLS proxy
US11075953B2 (en)2017-08-282021-07-27Fujitsu LimitedCyber attack information processing apparatus and method
US11509706B1 (en)2017-09-252022-11-22Splunk Inc.Customizable load balancing in a user behavior analytics deployment
US11838351B1 (en)2017-09-252023-12-05Splunk Inc.Customizable load balancing in a user behavior analytics deployment
US10887369B2 (en)*2017-09-252021-01-05Splunk Inc.Customizable load balancing in a user behavior analytics deployment
US10728256B2 (en)2017-10-302020-07-28Bank Of America CorporationCross channel authentication elevation via logic repository
US10733293B2 (en)2017-10-302020-08-04Bank Of America CorporationCross platform user event record aggregation system
US20190132336A1 (en)*2017-10-302019-05-02Bank Of America CorporationSystem for across rail silo system integration and logic repository
US10721246B2 (en)*2017-10-302020-07-21Bank Of America CorporationSystem for across rail silo system integration and logic repository
US10621341B2 (en)2017-10-302020-04-14Bank Of America CorporationCross platform user event record aggregation system
US10742673B2 (en)*2017-12-082020-08-11Nicira, Inc.Tracking the dynamics of application-centric clusters in a virtualized datacenter
WO2019169486A1 (en)*2018-03-052019-09-12EzoTech Inc.Automated security testing system and method
US20190312838A1 (en)*2018-04-042019-10-10Sophos LimitedNetwork device with transparent heartbeat processing
US11140195B2 (en)2018-04-042021-10-05Sophos LimitedSecure endpoint in a heterogenous enterprise network
US10862864B2 (en)*2018-04-042020-12-08Sophos LimitedNetwork device with transparent heartbeat processing
US11616758B2 (en)2018-04-042023-03-28Sophos LimitedNetwork device for securing endpoints in a heterogeneous enterprise network
US11271950B2 (en)2018-04-042022-03-08Sophos LimitedSecuring endpoints in a heterogenous enterprise network
US10972431B2 (en)2018-04-042021-04-06Sophos LimitedDevice management based on groups of network adapters
US10333898B1 (en)2018-07-092019-06-25Centripetal Networks, Inc.Methods and systems for efficient network protection
US12413553B2 (en)2018-07-092025-09-09Centripetal Networks, LlcMethods and systems for efficient network protection
US11290424B2 (en)2018-07-092022-03-29Centripetal Networks, Inc.Methods and systems for efficient network protection
WO2020136519A1 (en)2018-12-242020-07-02Amzel MosheSystems and methods for early detection, warning and prevention of cyber threats
EP3903459A4 (en)*2018-12-242022-10-05Amzel, Moshe SYSTEMS AND PROCEDURES FOR EARLY DETECTION, WARNING AND PREVENTION OF CYBER THREATS
US11588854B2 (en)2019-12-192023-02-21Vmware, Inc.User interface for defining security groups
US20230030504A1 (en)*2019-12-192023-02-02Siemens Mobility GmbHTransmission device for transmitting data
US12375320B2 (en)*2019-12-192025-07-29Siemens Mobility GmbHTransmission device for transmitting data and detecting anomalies
US11736440B2 (en)2020-10-272023-08-22Centripetal Networks, LlcMethods and systems for efficient adaptive logging of cyber threat incidents
US12113771B2 (en)2020-10-272024-10-08Centripetal Networks, LlcMethods and systems for efficient adaptive logging of cyber threat incidents
US11539664B2 (en)2020-10-272022-12-27Centripetal Networks, Inc.Methods and systems for efficient adaptive logging of cyber threat incidents
US11496477B2 (en)2021-03-052022-11-08Aceiss, Inc.Systems and methods for onboarding and managing applications over networks
WO2022187673A1 (en)*2021-03-052022-09-09Aceiss, Inc.Systems and methods for onboarding and managing applications over networks
US11316876B1 (en)2021-04-202022-04-26Centripetal Networks, Inc.Efficient threat context-aware packet filtering for network protection
US11349854B1 (en)2021-04-202022-05-31Centripetal Networks, Inc.Efficient threat context-aware packet filtering for network protection
US11438351B1 (en)2021-04-202022-09-06Centripetal Networks, Inc.Efficient threat context-aware packet filtering for network protection
US11552970B2 (en)2021-04-202023-01-10Centripetal Networks, Inc.Efficient threat context-aware packet filtering for network protection
US11159546B1 (en)2021-04-202021-10-26Centripetal Networks, Inc.Methods and systems for efficient threat context-aware packet filtering for network protection
US12218959B2 (en)2021-04-202025-02-04Centripetal Networks, LlcEfficient threat context-aware packet filtering for network protection
US11444963B1 (en)2021-04-202022-09-13Centripetal Networks, Inc.Efficient threat context-aware packet filtering for network protection
US11824875B2 (en)2021-04-202023-11-21Centripetal Networks, LlcEfficient threat context-aware packet filtering for network protection
US12008379B2 (en)2021-05-142024-06-11Samsung Electronics Co., Ltd.Automotive image sensor, image processing system including the same and operating method thereof
WO2022251132A1 (en)*2021-05-252022-12-01IronNet Cybersecurity, Inc.Identification of invalid advertising traffic
US11856023B2 (en)2021-05-252023-12-26IronNet Cybersecurity, Inc.Identification of invalid advertising traffic
US12427999B2 (en)2022-06-142025-09-30Samsung Electronics Co., Ltd.Controller for processing image data, image processing system including controller, and method of operating controller
US12199813B2 (en)2022-06-302025-01-14Juniper Networks, Inc.Framework for automated application-to-network root cause analysis
US12238069B2 (en)2022-11-302025-02-25Juniper Networks, Inc.Self-correcting service level agreement enforcer
EP4380106A1 (en)*2022-11-302024-06-05Juniper Networks, Inc.Intelligent firewall flow processor
US12267300B2 (en)2022-11-302025-04-01Juniper Networks, Inc.Intelligent firewall policy processor
US12244566B2 (en)2022-11-302025-03-04Juniper Networks, Inc.Self-learning egress traffic controller

Also Published As

Publication numberPublication date
LT3095034T (en)2019-09-25
CN106170772B (en)2018-04-17
HK1225475A1 (en)2017-09-08
WO2016109005A3 (en)2016-09-09
JP2017516411A (en)2017-06-15
IL251719B (en)2019-07-31
PL3095034T3 (en)2019-11-29
JP6196397B2 (en)2017-09-13
WO2016109005A2 (en)2016-07-07
IL251719A0 (en)2017-06-29
US9306965B1 (en)2016-04-05
ES2736099T3 (en)2019-12-26
CN106170772A (en)2016-11-30
CA2934311C (en)2017-06-13
EP3095034B1 (en)2019-05-29
EP3095034A2 (en)2016-11-23
CA2934311A1 (en)2016-09-02
EP3095034A4 (en)2017-09-06
SG11201703164RA (en)2017-05-30

Similar Documents

PublicationPublication DateTitle
US9306965B1 (en)Cybersecurity system
US11902321B2 (en)Secure communication platform for a cybersecurity system
US20240259405A1 (en)Treating data flows differently based on level of interest
US20210273953A1 (en)ENDPOINT AGENT CLIENT SENSORS (cSENSORS) AND ASSOCIATED INFRASTRUCTURES FOR EXTENDING NETWORK VISIBILITY IN AN ARTIFICIAL INTELLIGENCE (AI) THREAT DEFENSE ENVIRONMENT
US10885393B1 (en)Scalable incident-response and forensics toolkit
US20200162494A1 (en)Automatically grouping malware based on artifacts
US10200390B2 (en)Automatically determining whether malware samples are similar
US9832216B2 (en)System and method for network data characterization
WO2017151515A1 (en)Automatically grouping malware based on artifacts
WO2022251132A1 (en)Identification of invalid advertising traffic
HK1225475B (en)Cybersecurity system

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:IRONNET CYBERSECURITY, INC., MARYLAND

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GROSSMAN, ROBERT L.;HEATH, JAMES E.;RICHARDSON, RUSSELL D.;AND OTHERS;SIGNING DATES FROM 20151015 TO 20151016;REEL/FRAME:036879/0649

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FEPPFee payment procedure

Free format text:PETITION RELATED TO MAINTENANCE FEES GRANTED (ORIGINAL EVENT CODE: PTGR)

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:4

MAFPMaintenance fee payment

Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment:8

ASAssignment

Owner name:FERROUS INVESTORS LP, DISTRICT OF COLUMBIA

Free format text:SECURITY INTEREST;ASSIGNORS:IRONNET CYBERSECURITY, INC.;IRONCAD LLC;REEL/FRAME:065194/0555

Effective date:20231011

ASAssignment

Owner name:ITC GLOBAL ADVISORS, LLC, DISTRICT OF COLUMBIA

Free format text:SECURITY INTEREST;ASSIGNORS:IRONNET CYBERSECURITY, INC.;IRONCAD LLC;REEL/FRAME:066759/0535

Effective date:20240221

Owner name:FERROUS INVESTORS LP, DISTRICT OF COLUMBIA

Free format text:SECURITY INTEREST;ASSIGNORS:IRONNET CYBERSECURITY, INC.;IRONCAD LLC;REEL/FRAME:066759/0535

Effective date:20240221

Owner name:IRONCAD LLC, VIRGINIA

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:FERROUS INVESTORS LP, AS SECURED PARTY;REEL/FRAME:066759/0501

Effective date:20240221

Owner name:IRONNET CYBERSECURITY, INC., VIRGINIA

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:FERROUS INVESTORS LP, AS SECURED PARTY;REEL/FRAME:066759/0501

Effective date:20240221


[8]ページ先頭

©2009-2025 Movatter.jp