Movatterモバイル変換


[0]ホーム

URL:


US20170149816A1 - Method and Apparatus for Detecting a Change in Security Status of a Target - Google Patents

Method and Apparatus for Detecting a Change in Security Status of a Target
Download PDF

Info

Publication number
US20170149816A1
US20170149816A1US15/396,698US201715396698AUS2017149816A1US 20170149816 A1US20170149816 A1US 20170149816A1US 201715396698 AUS201715396698 AUS 201715396698AUS 2017149816 A1US2017149816 A1US 2017149816A1
Authority
US
United States
Prior art keywords
server
services
service
vulnerability
agent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/396,698
Inventor
Samir Gurunath Kelekar
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
RPX Corp
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US15/396,698priorityCriticalpatent/US20170149816A1/en
Publication of US20170149816A1publicationCriticalpatent/US20170149816A1/en
Assigned to RPX CORPORATIONreassignmentRPX CORPORATIONASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: ZENO SECURITY CORPORATION
Assigned to JEFFERIES FINANCE LLCreassignmentJEFFERIES FINANCE LLCSECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: RPX CORPORATION
Assigned to RPX CORPORATIONreassignmentRPX CORPORATIONRELEASE BY SECURED PARTY (SEE DOCUMENT FOR DETAILS).Assignors: JEFFERIES FINANCE LLC
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A method and apparatus for detecting a change in security status of a target are provided. The method comprises receiving at a server from a target, a notification, the notification providing notice of detection, immediately upon occurrence or at a predefined time interval, of an event on the target. The event on the target comprises a detected change in status of at least one of a network interface from active to inactive or from inactive to active, a client network service from start to stop or from stop to start, a server network service from start to stop or from stop to start, or a port from open to close or from close to open. The method determines, at the server, in response to the notification, that the security status of the target is vulnerable.

Description

Claims (3)

US15/396,6982003-04-112017-01-02Method and Apparatus for Detecting a Change in Security Status of a TargetAbandonedUS20170149816A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/396,698US20170149816A1 (en)2003-04-112017-01-02Method and Apparatus for Detecting a Change in Security Status of a Target

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US46181803P2003-04-112003-04-11
US10/820,790US8127359B2 (en)2003-04-112004-04-09Systems and methods for real-time network-based vulnerability assessment
US13/350,738US9537876B2 (en)2003-04-112012-01-14Method and apparatus for detecting vulnerability status of a target
US15/396,698US20170149816A1 (en)2003-04-112017-01-02Method and Apparatus for Detecting a Change in Security Status of a Target

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US13/350,738ContinuationUS9537876B2 (en)2003-04-112012-01-14Method and apparatus for detecting vulnerability status of a target

Publications (1)

Publication NumberPublication Date
US20170149816A1true US20170149816A1 (en)2017-05-25

Family

ID=47220215

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US10/820,790Expired - Fee RelatedUS8127359B2 (en)2003-04-112004-04-09Systems and methods for real-time network-based vulnerability assessment
US13/350,738Expired - Fee RelatedUS9537876B2 (en)2003-04-112012-01-14Method and apparatus for detecting vulnerability status of a target
US13/732,453Expired - LifetimeUS8789193B2 (en)2003-04-112013-01-02Method and apparatus for detecting events pertaining to potential change in vulnerability status
US15/396,698AbandonedUS20170149816A1 (en)2003-04-112017-01-02Method and Apparatus for Detecting a Change in Security Status of a Target

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US10/820,790Expired - Fee RelatedUS8127359B2 (en)2003-04-112004-04-09Systems and methods for real-time network-based vulnerability assessment
US13/350,738Expired - Fee RelatedUS9537876B2 (en)2003-04-112012-01-14Method and apparatus for detecting vulnerability status of a target
US13/732,453Expired - LifetimeUS8789193B2 (en)2003-04-112013-01-02Method and apparatus for detecting events pertaining to potential change in vulnerability status

Country Status (1)

CountryLink
US (4)US8127359B2 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20150235035A1 (en)*2012-04-122015-08-20Netflix, IncMethod and system for improving security and reliability in a networked application environment
US20160308787A1 (en)*2013-11-282016-10-20Kt CorporationMethod for processing event between controller and network device
US10880326B1 (en)2019-08-012020-12-29Xm Cyber Ltd.Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic
US11005878B1 (en)2019-11-072021-05-11Xm Cyber Ltd.Cooperation between reconnaissance agents in penetration testing campaigns
US11206281B2 (en)2019-05-082021-12-21Xm Cyber Ltd.Validating the use of user credentials in a penetration testing campaign
US11206282B2 (en)2017-11-152021-12-21Xm Cyber Ltd.Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
US11283827B2 (en)2019-02-282022-03-22Xm Cyber Ltd.Lateral movement strategy during penetration testing of a networked system
US11575700B2 (en)2020-01-272023-02-07Xm Cyber Ltd.Systems and methods for displaying an attack vector available to an attacker of a networked system
US11582256B2 (en)2020-04-062023-02-14Xm Cyber Ltd.Determining multiple ways for compromising a network node in a penetration testing campaign
US11706102B2 (en)*2008-10-102023-07-18Sciencelogic, Inc.Dynamically deployable self configuring distributed network management system
US11741196B2 (en)2018-11-152023-08-29The Research Foundation For The State University Of New YorkDetecting and preventing exploits of software vulnerability using instruction tags

Families Citing this family (131)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6779120B1 (en)*2000-01-072004-08-17Securify, Inc.Declarative language for specifying a security policy
US8074256B2 (en)2000-01-072011-12-06Mcafee, Inc.Pdstudio design system and method
US8140635B2 (en)2005-03-312012-03-20Tripwire, Inc.Data processing environment change management methods and apparatuses
US8127359B2 (en)*2003-04-112012-02-28Samir Gurunath KelekarSystems and methods for real-time network-based vulnerability assessment
US7451488B2 (en)*2003-04-292008-11-11Securify, Inc.Policy-based vulnerability assessment
US7317693B1 (en)*2003-05-122008-01-08Sourcefire, Inc.Systems and methods for determining the network topology of a network
US7716742B1 (en)2003-05-122010-05-11Sourcefire, Inc.Systems and methods for determining characteristics of a network and analyzing vulnerabilities
US20070113272A2 (en)2003-07-012007-05-17Securityprofiling, Inc.Real-time vulnerability monitoring
US9118708B2 (en)2003-07-012015-08-25Securityprofiling, LlcMulti-path remediation
US9350752B2 (en)2003-07-012016-05-24Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9118710B2 (en)2003-07-012015-08-25Securityprofiling, LlcSystem, method, and computer program product for reporting an occurrence in different manners
US9118709B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US8984644B2 (en)2003-07-012015-03-17Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US9100431B2 (en)2003-07-012015-08-04Securityprofiling, LlcComputer program product and apparatus for multi-path remediation
US9118711B2 (en)2003-07-012015-08-25Securityprofiling, LlcAnti-vulnerability system, method, and computer program product
US7996511B1 (en)*2003-10-282011-08-09Emc CorporationEnterprise-scalable scanning using grid-based architecture with remote agents
US8561154B2 (en)*2003-12-222013-10-15International Business Machines CorporationMethod for providing network perimeter security assessment
US20050198058A1 (en)*2004-03-042005-09-08International Business Machines CorporationServices offering delivery method
US7698730B2 (en)*2004-03-162010-04-13Riverbed Technology, Inc.Service detection
US7539681B2 (en)2004-07-262009-05-26Sourcefire, Inc.Methods and systems for multi-pattern searching
US7496962B2 (en)*2004-07-292009-02-24Sourcefire, Inc.Intrusion detection strategies for hypertext transport protocol
US20060090206A1 (en)*2004-10-152006-04-27Ladner Michael VMethod, system and apparatus for assessing vulnerability in Web services
US7310669B2 (en)*2005-01-192007-12-18Lockdown Networks, Inc.Network appliance for vulnerability assessment auditing over multiple networks
US7587752B2 (en)*2005-03-042009-09-08Qualcomm IncorporatedMethods and apparatus for providing a control channel in a data network
US8176158B2 (en)2005-08-092012-05-08Tripwire, Inc.Information technology governance and controls methods and apparatuses
US10318894B2 (en)2005-08-162019-06-11Tripwire, Inc.Conformance authority reconciliation
US7733803B2 (en)*2005-11-142010-06-08Sourcefire, Inc.Systems and methods for modifying network map attributes
US8046833B2 (en)*2005-11-142011-10-25Sourcefire, Inc.Intrusion event correlation with network discovery information
JP5452836B2 (en)*2006-03-312014-03-26日本電気株式会社 Qualification examination system, its examination method and qualification examination apparatus
US7948988B2 (en)*2006-07-272011-05-24Sourcefire, Inc.Device, system and method for analysis of fragments in a fragment train
US7701945B2 (en)2006-08-102010-04-20Sourcefire, Inc.Device, system and method for analysis of segments in a transmission control protocol (TCP) session
CA2672908A1 (en)*2006-10-062008-04-17Sourcefire, Inc.Device, system and method for use of micro-policies in intrusion detection/prevention
GB2443459A (en)*2006-10-312008-05-07Hewlett Packard Development CoData packet incuding computing platform indication
US8069352B2 (en)2007-02-282011-11-29Sourcefire, Inc.Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session
US8302196B2 (en)*2007-03-202012-10-30Microsoft CorporationCombining assessment models and client targeting to identify network security vulnerabilities
US8127353B2 (en)*2007-04-302012-02-28Sourcefire, Inc.Real-time user awareness for a computer network
US8256003B2 (en)*2007-05-102012-08-28Microsoft CorporationReal-time network malware protection
US9118706B2 (en)*2007-06-292015-08-25Verizon Patent And Licensing Inc.Using imported data from security tools
US8122510B2 (en)*2007-11-142012-02-21Bank Of America CorporationMethod for analyzing and managing unstructured data
US9336385B1 (en)*2008-02-112016-05-10Adaptive Cyber Security Instruments, Inc.System for real-time threat detection and management
US20090235359A1 (en)*2008-03-122009-09-17Comodo Ca LimitedMethod and system for performing security and vulnerability scans on devices behind a network security device
US8474043B2 (en)*2008-04-172013-06-25Sourcefire, Inc.Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing
KR20090121579A (en)*2008-05-222009-11-26주식회사 이베이지마켓 System and method for checking vulnerability of server
US8914341B2 (en)2008-07-032014-12-16Tripwire, Inc.Method and apparatus for continuous compliance assessment
US8272055B2 (en)2008-10-082012-09-18Sourcefire, Inc.Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system
US8972352B1 (en)*2008-12-312015-03-03Emc CorporationProbe based backup
US20130247182A1 (en)*2009-04-212013-09-19Seagen James LevitesSystem, method, and computer program product for identifying hidden or modified data objects
US8914787B2 (en)*2009-08-312014-12-16Red Hat, Inc.Registering software management component types in a managed network
WO2011027352A1 (en)*2009-09-032011-03-10Mcafee, Inc.Network access control
WO2011079182A2 (en)*2009-12-232011-06-30Citrix Systems, Inc.Systems and methods for managing ports for rtsp across cores in a multi-core system
US9098335B2 (en)2009-12-232015-08-04Citrix Systems, Inc.Systems and methods for managing spillover limits in a multi-core system
US8825859B2 (en)*2009-12-232014-09-02Citrix Systems, Inc.System and methods for mixed mode of IPv6 and IPv4 DNS of global server load balancing
US20110197253A1 (en)*2010-02-082011-08-11Comodo Security Solutions, Inc.Method and System of Responding to Buffer Overflow Vulnerabilities
JP5809238B2 (en)2010-04-162015-11-10シスコ テクノロジー,インコーポレイテッド System and method for near real-time network attack detection, and system and method for integrated detection by detection routing
US8433790B2 (en)2010-06-112013-04-30Sourcefire, Inc.System and method for assigning network blocks to sensors
US8671182B2 (en)2010-06-222014-03-11Sourcefire, Inc.System and method for resolving operating system or service identity conflicts
RU2657170C2 (en)*2010-07-012018-06-08Онапсис, Инк.Automated safety assessment of business-critical computer systems and resources
US9077745B1 (en)*2010-08-042015-07-07Saint CorporationMethod of resolving port binding conflicts, and system and method of remote vulnerability assessment
US8938531B1 (en)*2011-02-142015-01-20Digital Defense IncorporatedApparatus, system and method for multi-context event streaming network vulnerability scanner
US8601034B2 (en)2011-03-112013-12-03Sourcefire, Inc.System and method for real time data awareness
US8595822B2 (en)2011-12-292013-11-26Mcafee, Inc.System and method for cloud based scanning for computer vulnerabilities in a network environment
US9497212B2 (en)2012-05-212016-11-15Fortinet, Inc.Detecting malicious resources in a network based upon active client reputation monitoring
KR101957778B1 (en)*2012-10-102019-03-19주식회사 아이디어웨어Recording Medium, Method and Device for Detection of Keep Alive
US20140137190A1 (en)*2012-11-092014-05-15Rapid7, Inc.Methods and systems for passively detecting security levels in client devices
US20140143864A1 (en)*2012-11-212014-05-22Snoopwall LlcSystem and method for detecting, alerting and blocking data leakage, eavesdropping and spyware
US9990499B2 (en)*2013-08-052018-06-05Netflix, Inc.Dynamic security testing
CA2920908A1 (en)*2013-08-152015-02-19Immun.io Inc.Method and system to dynamically alter application functionality at runtime in a constrained and secure manner
US9774566B2 (en)*2013-11-292017-09-26Acer IncorporatedCommunication method and mobile electronic device using the same
US9485262B1 (en)*2014-03-282016-11-01Juniper Networks, Inc.Detecting past intrusions and attacks based on historical network traffic information
US9300895B2 (en)*2014-08-052016-03-29Echostar Uk Holdings LimitedSystems, methods, and apparatus for facilitating expansion of media device interface capabilities
WO2016053261A1 (en)*2014-09-292016-04-07Hewlett Packard Enterprise Development LpDetection of email-related vulnerabilities
US9208349B1 (en)2015-01-132015-12-08Snoopwall, Inc.Securing data gathering devices of a personal computing device while performing sensitive data gathering activities to prevent the misappropriation of personal user data gathered therewith
US10178070B2 (en)2015-03-132019-01-08Varmour Networks, Inc.Methods and systems for providing security to distributed microservices
US9467476B1 (en)2015-03-132016-10-11Varmour Networks, Inc.Context aware microsegmentation
US9609026B2 (en)*2015-03-132017-03-28Varmour Networks, Inc.Segmented networks that implement scanning
WO2016190883A1 (en)*2015-05-282016-12-01Hewlett Packard Enterprise Development LpSecurity vulnerability detection
US11227674B2 (en)*2015-06-302022-01-18K4Connect Inc.Home automation system generating user health score and related methods
US10630649B2 (en)2015-06-302020-04-21K4Connect Inc.Home automation system including encrypted device connection based upon publicly accessible connection file and related methods
WO2017004200A1 (en)*2015-06-302017-01-05K4Connect Inc.Home automation system including security controller for terminating communication with abnormally operating addressable devices and related methods
CN105095769A (en)*2015-08-282015-11-25中国航天科工集团第二研究院七〇六所Information service software vulnerability detection method
US20170093887A1 (en)*2015-09-242017-03-30General Electric CompanyNetwork command evaluation and response system
US11032306B2 (en)2015-12-302021-06-08International Business Machines CorporationSystem, method and apparatus for fully precise hybrid security verification of mobile applications
US9723489B1 (en)*2016-04-192017-08-01Synack, Inc.Automated vulnerability discovery in mobile device applications
KR101695278B1 (en)*2016-04-262017-01-23(주)시큐레이어Method for detecting real-time event and server using the same
CN107342968A (en)*2016-05-032017-11-10阿里巴巴集团控股有限公司Attack detection method, the apparatus and system of web page server
CN107347059B (en)*2016-05-062020-06-02腾讯科技(深圳)有限公司Vulnerability detection method and detection terminal
US10999307B2 (en)*2016-05-192021-05-04Infinite Group, Inc.Network assessment systems and methods thereof
US9652618B1 (en)*2016-06-102017-05-16Optum, Inc.Systems and apparatuses for architecture assessment and policy enforcement
RU2713574C1 (en)2016-06-102020-02-05Оптум, Инк.Systems and devices for assessing the architecture and implementing strategies for security
CN106503563B (en)*2016-10-172019-03-08成都知道创宇信息技术有限公司Batch leak detection method based on general framework
US10999308B2 (en)2017-01-302021-05-04Xm Cyber Ltd.Setting-up penetration testing campaigns
US10068095B1 (en)2017-05-152018-09-04XM Cyber LtdSystems and methods for selecting a termination rule for a penetration testing campaign
WO2018138608A2 (en)*2017-01-302018-08-02XM Ltd.Penetration testing of a networked system
US10257220B2 (en)2017-01-302019-04-09Xm Cyber Ltd.Verifying success of compromising a network node during penetration testing of a networked system
US10686822B2 (en)2017-01-302020-06-16Xm Cyber Ltd.Systems and methods for selecting a lateral movement strategy for a penetration testing campaign
US10581802B2 (en)2017-03-162020-03-03Keysight Technologies Singapore (Sales) Pte. Ltd.Methods, systems, and computer readable media for advertising network security capabilities
CN107231364B (en)*2017-06-132020-06-09深信服科技股份有限公司Website vulnerability detection method and device, computer device and storage medium
US10534917B2 (en)2017-06-202020-01-14Xm Cyber Ltd.Testing for risk of macro vulnerability
US10574684B2 (en)2017-07-092020-02-25Xm Cyber Ltd.Locally detecting phishing weakness
KR102199054B1 (en)*2017-08-102021-01-07한국전자통신연구원Apparatus for serial port based cyber security vulnerability assessment and method for the same
CN107592302B (en)*2017-08-232021-07-20北京国信云服科技有限公司 Port scanner and method for mobile terminal
US10412112B2 (en)2017-08-312019-09-10Xm Cyber Ltd.Time-tagged pre-defined scenarios for penetration testing
US10447721B2 (en)2017-09-132019-10-15Xm Cyber Ltd.Systems and methods for using multiple lateral movement strategies in penetration testing
CN107634868B (en)2017-10-292020-06-23网宿科技股份有限公司Method and system for managing network service
US11075936B2 (en)2018-02-222021-07-27Illumio, Inc.Generating vulnerability exposure scores in a segmented computing environment
US11075937B2 (en)*2018-02-222021-07-27Illumio, Inc.Generating a segmentation policy based on vulnerabilities
US10440044B1 (en)2018-04-082019-10-08Xm Cyber Ltd.Identifying communicating network nodes in the same local network
US11113405B2 (en)2018-04-102021-09-07Rapid7, Inc.Vulnerability assessment
US10382473B1 (en)2018-09-122019-08-13Xm Cyber Ltd.Systems and methods for determining optimal remediation recommendations in penetration testing
US10469521B1 (en)2018-11-042019-11-05Xm Cyber Ltd.Using information about exportable data in penetration testing
US10630718B2 (en)*2018-11-272020-04-21BehavioSec IncDetection of remote fraudulent activity in a client-server-system
US10574687B1 (en)2018-12-132020-02-25Xm Cyber Ltd.Systems and methods for dynamic removal of agents from nodes of penetration testing systems
IL263958B (en)2018-12-252020-05-31Hayman MeirMethod and system for identifying vulnerability levels in devices operated on a given network
WO2020161532A1 (en)2019-02-062020-08-13Xm Cyber Ltd.Taking privilege escalation into account in penetration testing campaigns
US10637883B1 (en)2019-07-042020-04-28Xm Cyber Ltd.Systems and methods for determining optimal remediation recommendations in penetration testing
US11416623B2 (en)*2019-07-312022-08-16International Business Machines CorporationAutomatic penetration testing enablement of regression buckets
US11533329B2 (en)2019-09-272022-12-20Keysight Technologies, Inc.Methods, systems and computer readable media for threat simulation and threat mitigation recommendations
US20210194916A1 (en)*2019-12-242021-06-24Infinite Group, Inc.Methods for inventorying network hosts and devices thereof
CN111131262B (en)*2019-12-262021-11-16绿盟科技集团股份有限公司Vulnerability scanning method and device
CN111240994B (en)*2020-01-202021-02-19北京国舜科技股份有限公司Vulnerability processing method and device, electronic equipment and readable storage medium
US11930031B2 (en)*2020-06-232024-03-12Tenable, Inc.Distributed network based vulnerability scanning via endpoint agent deployment
CN112153044B (en)*2020-09-232021-11-12腾讯科技(深圳)有限公司Flow data detection method and related equipment
CN112836219B (en)*2021-02-042022-10-25清华大学Target system security evaluation device and method
TWI767582B (en)*2021-02-232022-06-11財團法人資訊工業策進會File weakness detection system and detection method thereof
US11516033B1 (en)2021-05-312022-11-29Nutanix, Inc.System and method for metering consumption
US12081518B1 (en)2022-02-222024-09-03Everything Set Inc.Selective inspection of network traffic associated with a plurality of network-connected smart devices using man-in-the-middle (MITM) gateway
US12407705B1 (en)2022-02-222025-09-02Everything Set Inc.Prediction of network vulnerability of a user's network-connected smart device using crowdsourced vulnerability profiles
US12301608B1 (en)2022-02-222025-05-13Everything Set Inc.Identification of one or more services for a user's network-connected smart device using a smart device fingerprint of the network-connected smart device
US12149543B1 (en)2022-02-222024-11-19Everything Set Inc.Crowdsourced Bayesian packet analysis for detecting anomalies in network packet header data associated with a user's smart device
US12174968B2 (en)*2022-10-192024-12-24Dell Products, L.P.Systems and methods for vulnerability proofing when adding and replacing IHS hardware
US20240372884A1 (en)*2023-05-032024-11-07Fortinet, Inc.Risk evaluation for a vulnerability assessment system on a data communication network from a collection of threats

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6484202B1 (en)*1999-11-162002-11-19Lucent Technologies Inc.Method and apparatus for determining the status of a transmission link
US20030212779A1 (en)*2002-04-302003-11-13Boyter Brian A.System and Method for Network Security Scanning

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6160423A (en)1998-03-162000-12-12Jazio, Inc.High speed source synchronous signaling for interfacing VLSI CMOS circuits to transmission lines
US6282546B1 (en)*1998-06-302001-08-28Cisco Technology, Inc.System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
US6324656B1 (en)*1998-06-302001-11-27Cisco Technology, Inc.System and method for rules-driven multi-phase network vulnerability assessment
US6226372B1 (en)1998-12-112001-05-01Securelogix CorporationTightly integrated cooperative telecommunications firewall and scanner with distributed capabilities
US6301668B1 (en)1998-12-292001-10-09Cisco Technology, Inc.Method and system for adaptive network security using network vulnerability assessment
US6499107B1 (en)1998-12-292002-12-24Cisco Technology, Inc.Method and system for adaptive network security using intelligent packet analysis
US7574740B1 (en)2000-04-282009-08-11International Business Machines CorporationMethod and system for intrusion detection in a computer network
US7089428B2 (en)*2000-04-282006-08-08Internet Security Systems, Inc.Method and system for managing computer security information
CA2423175A1 (en)2000-09-222002-03-28Patchlink.Com CorporationNon-invasive automatic offsite patch fingerprinting and updating system and method
AU2002244083A1 (en)*2001-01-312002-08-12Timothy David DoddMethod and system for calculating risk in association with a security audit of a computer network
US20030028803A1 (en)*2001-05-182003-02-06Bunker Nelson WaldoNetwork vulnerability assessment system and method
US7325252B2 (en)*2001-05-182008-01-29Achilles Guard Inc.Network security testing
US20030056116A1 (en)*2001-05-182003-03-20Bunker Nelson WaldoReporter
US7228566B2 (en)*2001-07-102007-06-05Core Sdi, IncorporatedAutomated computer system security compromise
US7257630B2 (en)*2002-01-152007-08-14Mcafee, Inc.System and method for network vulnerability detection and reporting
US7152105B2 (en)*2002-01-152006-12-19Mcafee, Inc.System and method for network vulnerability detection and reporting
US6952779B1 (en)*2002-10-012005-10-04Gideon CohenSystem and method for risk detection and analysis in a computer network
US7603711B2 (en)2002-10-312009-10-13Secnap Networks Security, LLCIntrusion detection system
US8479057B2 (en)2002-11-042013-07-02Riverbed Technology, Inc.Aggregator for connection based anomaly detection
US20040172467A1 (en)*2003-02-282004-09-02Gabriel WechterMethod and system for monitoring a network
US8127359B2 (en)2003-04-112012-02-28Samir Gurunath KelekarSystems and methods for real-time network-based vulnerability assessment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6484202B1 (en)*1999-11-162002-11-19Lucent Technologies Inc.Method and apparatus for determining the status of a transmission link
US20030212779A1 (en)*2002-04-302003-11-13Boyter Brian A.System and Method for Network Security Scanning

Cited By (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US11706102B2 (en)*2008-10-102023-07-18Sciencelogic, Inc.Dynamically deployable self configuring distributed network management system
US9953173B2 (en)*2012-04-122018-04-24Netflix, Inc.Method and system for improving security and reliability in a networked application environment
US20180307849A1 (en)*2012-04-122018-10-25Netflix, Inc.Method and system for improving security and reliability in a networked application environment
US10691814B2 (en)*2012-04-122020-06-23Netflix, Inc.Method and system for improving security and reliability in a networked application environment
US20150235035A1 (en)*2012-04-122015-08-20Netflix, IncMethod and system for improving security and reliability in a networked application environment
US20160308787A1 (en)*2013-11-282016-10-20Kt CorporationMethod for processing event between controller and network device
US10263915B2 (en)*2013-11-282019-04-16Kt CorporationMethod for processing event between controller and network device
US11206282B2 (en)2017-11-152021-12-21Xm Cyber Ltd.Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
US12061677B2 (en)2018-11-152024-08-13The Research Foundation For The State University Of New YorkSecure processor for detecting and preventing exploits of software vulnerability
US11741196B2 (en)2018-11-152023-08-29The Research Foundation For The State University Of New YorkDetecting and preventing exploits of software vulnerability using instruction tags
US11283827B2 (en)2019-02-282022-03-22Xm Cyber Ltd.Lateral movement strategy during penetration testing of a networked system
US11206281B2 (en)2019-05-082021-12-21Xm Cyber Ltd.Validating the use of user credentials in a penetration testing campaign
US10880326B1 (en)2019-08-012020-12-29Xm Cyber Ltd.Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic
US11005878B1 (en)2019-11-072021-05-11Xm Cyber Ltd.Cooperation between reconnaissance agents in penetration testing campaigns
US11575700B2 (en)2020-01-272023-02-07Xm Cyber Ltd.Systems and methods for displaying an attack vector available to an attacker of a networked system
US11582256B2 (en)2020-04-062023-02-14Xm Cyber Ltd.Determining multiple ways for compromising a network node in a penetration testing campaign

Also Published As

Publication numberPublication date
US20120304299A1 (en)2012-11-29
US8127359B2 (en)2012-02-28
US20050005169A1 (en)2005-01-06
US9537876B2 (en)2017-01-03
US20130167240A1 (en)2013-06-27
US8789193B2 (en)2014-07-22

Similar Documents

PublicationPublication DateTitle
US9537876B2 (en)Method and apparatus for detecting vulnerability status of a target
WO2005101789A1 (en)A system for real-time network based vulnerability assessment of a host/device
JP4914052B2 (en) Method and system for distributing security policies
US7134141B2 (en)System and method for host and network based intrusion detection and response
US7007301B2 (en)Computer architecture for an intrusion detection system
Schnackengerg et al.Cooperative intrusion traceback and response architecture (CITRA)
US7325252B2 (en)Network security testing
DebarAn introduction to intrusion-detection systems
US8955135B2 (en)Malicious code infection cause-and-effect analysis
US8806009B2 (en)System and method for optimization of security tasks by configuring security modules
US7506056B2 (en)System analyzing configuration fingerprints of network nodes for granting network access and detecting security threat
US7343599B2 (en)Network-based patching machine
US20030028803A1 (en)Network vulnerability assessment system and method
US20070174917A1 (en)Platform for analyzing the security of communication protocols and channels
US20030145226A1 (en)Integrated intrusion detection services
US20070056020A1 (en)Automated deployment of protection agents to devices connected to a distributed computer network
US20060203815A1 (en)Compliance verification and OSI layer 2 connection of device using said compliance verification
EP1451999A1 (en)Detecting intrusions in a network
Atighetchi et al.Adaptive cyberdefense for survival and intrusion tolerance
Khosravifar et al.An experience improving intrusion detection systems false alarm ratio by using honeypot
RU2514137C1 (en)Method for automatic adjustment of security means
CN113608821B (en)Data processing method and device of boundary safety equipment
Paxson et al.Bro User Manual
Shouman et al.Multiagent-Based Intrusion Prevention System
Miller et al.The Management and Security Expert (MASE)

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:RPX CORPORATION, CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ZENO SECURITY CORPORATION;REEL/FRAME:045676/0138

Effective date:20180428

ASAssignment

Owner name:JEFFERIES FINANCE LLC, NEW YORK

Free format text:SECURITY INTEREST;ASSIGNOR:RPX CORPORATION;REEL/FRAME:047159/0639

Effective date:20180830

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION

ASAssignment

Owner name:RPX CORPORATION, CALIFORNIA

Free format text:RELEASE BY SECURED PARTY;ASSIGNOR:JEFFERIES FINANCE LLC;REEL/FRAME:054486/0422

Effective date:20201023


[8]ページ先頭

©2009-2025 Movatter.jp