Movatterモバイル変換


[0]ホーム

URL:


US20180146002A1 - Cyber Security System and Method Using Intelligent Agents - Google Patents

Cyber Security System and Method Using Intelligent Agents
Download PDF

Info

Publication number
US20180146002A1
US20180146002A1US15/566,691US201615566691AUS2018146002A1US 20180146002 A1US20180146002 A1US 20180146002A1US 201615566691 AUS201615566691 AUS 201615566691AUS 2018146002 A1US2018146002 A1US 2018146002A1
Authority
US
United States
Prior art keywords
target
network
scan
results
network scan
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US15/566,691
Inventor
Raymond Canfield
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to US15/566,691priorityCriticalpatent/US20180146002A1/en
Publication of US20180146002A1publicationCriticalpatent/US20180146002A1/en
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A cyber security method using intelligent agents (IAs) includes: watching, by the intelligent agent (IA), over a network, a software program running on a system; receiving, by the IA, results generated by the software; presenting, by the IA, the results; categorizing the results, by the IA, for efficient storage and efficient future retrieval; saving, by the IA, the categorized results; using the categorized results, by the IA, inferring new knowledge; categorizing the new knowledge, by the IA, for efficient storage and efficient future retrieval; saving, by the IA, the categorized new knowledge; and using one or more of the saved categorized results and the saved categorized new knowledge, by the IA, configuring the software.

Description

Claims (57)

What is claimed is:
1. A cyber security method using intelligent agents (IAs), comprising:
a) setting up, by the IA, a first network scan of a system over a network;
b) running, by the IA, using a first network scan parameter, the first network scan, generating first network scan results;
c) storing, by the IA, the first network scan results;
d) running, by the IA, using a second network scan parameter, a second network scan of the system over the network, generating second network scan results;
e) storing, by the IA, the second network scan results;
f) running a port scan of the system, by the IA, generating port scan results;
g) storing, by the IA, the port scan results;
h) using one or more of the first network scan results and the second network scan results, by the IA, optimizing the first network scan parameter;
i) using one or more of the first network scan parameter, the second network scan parameter, and the port scan configuring, by the IA, a vulnerability scan of the system over the network;
j) using one or more of the first network scan parameter, the second network scan parameter, and the port scan results, running the vulnerability scan of the system, generating vulnerability scan results;
k) storing, by the IA, the vulnerability scan results;
l) collecting, by the IA, at least one of service information and availability knowledge regarding at least one of an available target and an available service;
m) using the at least one of service information and availability knowledge, by the IA, identifying a needed setting; and
n) storing, by the IA, the needed setting.
2. The method ofclaim 1, wherein the step of setting up comprises setting the first network scan parameter.
3. The method ofclaim 1, wherein the network comprises one or more of the Internet, the World-Wide Web (WWW), Secure Shell (SSH), Simple Network Management Protocol (SNMP), command-line interface (CLI), and another network protocol configured to facilitate access to the system.
4. The method ofclaim 1, wherein the first network scan parameter comprises one or more of a scan frequency, a scan wait time, a blast rate, and another network scan parameter.
5. The method ofclaim 1, wherein the step of running the first network scan comprises one or more of analyzing criticality of a target, scoring the criticality of the target, and exploring a security weather pattern.
6. The method ofclaim 5, wherein the security weather pattern comprises one or more of a new device, a new service on an existing device, a changed service on an existing device, a change in traffic to a target, and a change in traffic from a target.
7. The method ofclaim 5, wherein the target comprises one or more of a target device, a target sub-system, a target port, and another target.
8. The method ofclaim 5, wherein the analyzing sub-step comprises
collecting target information; and
using the target information to perform the analysis.
9. The method ofclaim 8, wherein the target information comprises one or more of a frequency of changes, a vulnerability history, a target type, a target location, services used by the target, service usages by the target, and other target information.
10. The method ofclaim 9, wherein the target location comprises a proximity to a network.
11. The method ofclaim 5, wherein the scoring sub-step comprises collecting target information; and
using the target information to perform the scoring.
12. The method ofclaim 1, wherein the step of running the first network scan comprises continually running the first network scan.
13. The method ofclaim 1, wherein the first network scan generates first pings.
14. The method ofclaim 13, wherein the first pings comprise frequent, multiple, low accuracy first pings.
15. The method ofclaim 14, wherein the first pings have an accuracy between approximately eighty percent and approximately 95 percent.
16. The method ofclaim 14, wherein the first pings have return times of approximately thirty seconds to approximately sixty seconds for a system comprising 256 sub-systems.
17. The method ofclaim 1, wherein the second network scan parameter comprises one or more of a number of target checks, a size of data being sent, and another second network scan parameter.
18. The method ofclaim 1, wherein the step of running the first network scan comprises running the first network scan using one or more of an active scan of the network, a ping networking utility, a network mapping (NMAP) security scanner, and another first network scan.
19. The method ofclaim 18, wherein the step of running the first network scan comprises a sub-step of:
actively scanning the network, by the IA.
20. The method ofclaim 19, wherein the generating sub-step comprises using the first network scan results to accomplish one or more of maximizing a success rate, minimizing a scan time, minimizing a scan frequency, improving efficiency of scanning, and increasing scan frequency.
21. The method ofclaim 1, wherein the step of running the second network scan comprises running the second network scan using one or more of an active scan of the network, a ping networking utility, a network mapping (NMAP) security scanner, and another second network scan.
22. The method ofclaim 21, wherein the step of running the first network scan comprises a sub-step of:
actively scanning the network, by the IA.
23. The method ofclaim 1, wherein the second network scan generates second pings.
24. The method ofclaim 23, wherein the second pings comprise infrequent, high accuracy second pings.
25. The method ofclaim 24, wherein the second pings have an accuracy of at least approximately ninety-five percent.
26. The method ofclaim 24, wherein the second pings have return times of approximately seventeen minutes to approximately twenty-two minutes for a system comprising 256 sub-systems.
27. The method ofclaim 1, wherein the step of running the second network scan comprises accessing the second network scan on an operating system of the system.
28. The method ofclaim 1, wherein the second network scan results have an accuracy of at least approximately ninety-five percent.
29. The method ofclaim 1, comprising additional steps, performed after the optimizing step h), of:
o) determining that a new second network scan is needed; and
p) returning to the step of d) running a second network scan.
30. The method ofclaim 1, comprising an additional step, performed after the optimizing step h), of:
o) using the optimized first network scan parameter, by the IA, in one or more of a first network scan, a second network scans, a port scans, and a vulnerability scan.
31. The method ofclaim 30, wherein the determining step comprises one or more of determine performance of the system, determining success of the first network scan, determining a second network scan start time, and determining a second network scan frequency.
32. The method ofclaim 1, wherein the step of running a port scan comprises scanning the network to identify one or more of a target, a scan time, and a scan frequency.
33. The method ofclaim 1, wherein the step of running a port scan comprises running a port scan using one or more of data stored in storage and environment information.
34. The method ofclaim 33, wherein the environment information comprises one or more of network utilization information, resource usage, and other environment information.
35. The method ofclaim 1, wherein the step of running the vulnerability scan comprises identifying an at-risk target.
36. The method ofclaim 35, wherein identifying the at-risk target comprises identifying the at-risk target using one or more of pre-set risk determination parameters and risk determination parameters that are calculated on the fly.
37. The method ofclaim 1, further comprising a step of providing a device configured to perform one or more of tracking traffic and collecting information regarding traffic.
38. A cyber security method using intelligent agents (IAs), comprising:
watching, by the IA, over a network, a software program running on a system;
receiving, by the IA, results generated by the software;
presenting, by the IA, the results;
categorizing the results, by the IA, for efficient storage and efficient future retrieval;
saving, by the IA, the categorized results;
using the categorized results, by the IA, inferring new knowledge;
categorizing the new knowledge, by the IA, for efficient storage and efficient future retrieval;
saving, by the IA, the categorized new knowledge; and
using one or more of the saved categorized results and the saved categorized new knowledge, by the IA, configuring the software.
39. The method ofclaim 38, wherein the step of watching comprises identifying in the software one or more of an inefficiency, a deficiency, an incomplete aspect and an error.
40. The method ofclaim 38, wherein the step of presenting comprises presenting the results for usage by a human user.
41. The method ofclaim 40, wherein the step of presenting comprises presenting the results for usage by a human user in one or more of an alert, a web page update, a graph, a database entry, and a report.
42. A cyber security method using intelligent agents (IAs), comprising:
seeking, by the IA, required configuration information from storage;
determining, by the IA, that the required configuration information cannot be retrieved from storage;
identifying, by the IA, a software program;
running, by the IA, the software program;
verifying, by the IA, that the required configuration information has been obtained;
re-running the software program, by the IA, using the required configuration information, generating a result;
reviewing the result, by the IA;
determining, by the IA, that the result is acceptable; and
using the result, by the IA, generating a result response.
43. The method ofclaim 42, wherein the configuration information comprises one or more of an Internet Protocol (IP) address, login information, a device type, network access information, and other configuration information.
44. The method ofclaim 42, wherein the result response comprises one or more of an alert, a web page update, a graph, a database entry, a report, recommended corrective action on a target, and another result response.
45. A cyber security method using intelligent agents (IAs), comprising:
after initial setup, directing, by the IA, a knowledge base program to scan data comprised in a target;
collecting, by the IA, configuration information required to run the target;
using the configuration information, by the IA, attempting a connection to the target;
passing, by the IA, to a human user interface target information regarding the target;
using the human user interface, by the IA, accumulating pertinent knowledge regarding one or more of a connection method and target information;
using the human user interface, by the IA, communicating with the target using the pertinent knowledge;
using the human user interface, receiving, by the IA, a response to the command from the target;
processing the response, by the IA, thereby generating a result;
transmitting, by the IA, the result to the knowledge base program;
using the knowledge base program, by the IA, processing the result;
receiving the processed result, by the IA, from the knowledge base program; and
transmitting, by the IA, the processed result to storage.
46. The method ofclaim 45, wherein the step of attempting a connection comprises attempting a connection to the target in descending order of estimated likelihood of success for the connection method, until a connection succeeds.
47. The method ofclaim 45, wherein the human user interface comprises one or more of a Graphical User Interface (GUI), a Command Line Interface (CLI), and another human user interface.
48. The method ofclaim 45, wherein the processing step comprises one or more of interpreting the response, categorizing the response, placing the response into storage, and processing the response in another way.
49. The method ofclaim 45, wherein the processing response comprises processing the result using a processing block comprised in the knowledge base program.
50. A cyber security method using intelligent agents (IAs), comprising:
after initial setup, directing, by the IA, a knowledge base program to scan data comprised in a target;
collecting, by the IA, configuration information required to run the target;
using the configuration information, by the IA, attempting a connection to the target;
using one or more of a connection method and target information regarding the target,
sending, by the IA, a command to the target;
receiving, by the IA, a response to the command from the target;
processing the response, by the IA, thereby generating a result;
transmitting, by the IA, the result to the knowledge base program;
using the knowledge base program, by the IA, processing the result;
receiving the processed result, by the IA, from the knowledge base program; and
transmitting, by the IA, the processed result to storage.
51. A cyber security method using intelligent agents (IAs), comprising:
observing, by the IA, traffic through a master system;
identifying, by the IA, a vulnerability;
diverting, by the IA, the vulnerability onto a temporary target;
constructing, by the IA, a decoy system configured to replicate one or more of the appearance and the operation of the master system; and
launching, by the IA, the decoy system.
52. The method ofclaim 51, wherein the vulnerability comprises one or more of a a new vulnerability, a pattern indicating a vulnerability, a series of communication events indicating a vulnerability, a new attack method, malware, a computer virus, a document comprising a secret, and another vulnerability.
53. The system ofclaim 51, wherein the decoy system is configured to mislead an attacker into thinking he has entered into the master system.
54. The system ofclaim 51, wherein for the decoy system, one or more of an operating system, an application, a software version, a patch, and another decoy system parameter is substantially the same as in the master system.
55. The method ofclaim 51, further comprising an additional step, performed after the launching step, of:
reviewing, by the IA, effectiveness of the decoy system in promoting safety of the master system.
56. A cyber security method using intelligent agents (IAs), comprising:
observing, by the IA, traffic through a master system;
identifying, by the IA, a vulnerability;
diverting, by the IA, the vulnerability onto a temporary target;
tracking the vulnerability as it moves through the master system;
investigating the vulnerability, generating investigation results;
reporting the investigation results to the master system;
storing the investigation results;
constructing, by the IA, a decoy system configured to replicate one or more of the appearance and the operation of the master system;
launching, by the IA, the decoy system; and
reviewing, by the IA, effectiveness of the decoy system in promoting safety of the master system.
57. The method ofclaim 56, wherein the step of investigating comprises one or more of virus scanning, binary analysis, text analysis, steganalysis, and other investigating.
US15/566,6912015-07-162016-07-18Cyber Security System and Method Using Intelligent AgentsAbandonedUS20180146002A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US15/566,691US20180146002A1 (en)2015-07-162016-07-18Cyber Security System and Method Using Intelligent Agents

Applications Claiming Priority (3)

Application NumberPriority DateFiling DateTitle
US201562193486P2015-07-162015-07-16
US15/566,691US20180146002A1 (en)2015-07-162016-07-18Cyber Security System and Method Using Intelligent Agents
PCT/US2016/042820WO2017011833A1 (en)2015-07-162016-07-18Cyber security system and method using intelligent agents

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
PCT/US2016/042820A-371-Of-InternationalWO2017011833A1 (en)2015-07-162016-07-18Cyber security system and method using intelligent agents

Related Child Applications (1)

Application NumberTitlePriority DateFiling Date
US17/202,176DivisionUS11962611B2 (en)2015-07-162021-03-15Cyber security system and method using intelligent agents

Publications (1)

Publication NumberPublication Date
US20180146002A1true US20180146002A1 (en)2018-05-24

Family

ID=57757695

Family Applications (3)

Application NumberTitlePriority DateFiling Date
US15/566,691AbandonedUS20180146002A1 (en)2015-07-162016-07-18Cyber Security System and Method Using Intelligent Agents
US17/202,176Active2036-08-02US11962611B2 (en)2015-07-162021-03-15Cyber security system and method using intelligent agents
US18/635,726ActiveUS12335299B2 (en)2015-07-162024-04-15Cyber security system and method using intelligent agents

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
US17/202,176Active2036-08-02US11962611B2 (en)2015-07-162021-03-15Cyber security system and method using intelligent agents
US18/635,726ActiveUS12335299B2 (en)2015-07-162024-04-15Cyber security system and method using intelligent agents

Country Status (5)

CountryLink
US (3)US20180146002A1 (en)
EP (1)EP3281114B1 (en)
CA (1)CA2983458A1 (en)
HK (1)HK1244072A1 (en)
WO (1)WO2017011833A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110865774A (en)*2018-12-282020-03-06哈尔滨安天科技集团股份有限公司Information security detection method and device for printing equipment
US10757137B1 (en)*2018-09-262020-08-25NortonLifeLock Inc.Thwarting an impersonation attack using online decoy text
US20210392153A1 (en)*2020-06-102021-12-16Saudi Arabian Oil CompanySystem and method for vulnerability remediation prioritization
US11263295B2 (en)*2019-07-082022-03-01Cloud Linux Software Inc.Systems and methods for intrusion detection and prevention using software patching and honeypots
US20220309174A1 (en)*2021-03-242022-09-29Bank Of America CorporationSystem for dynamic exposure monitoring
WO2022231926A1 (en)*2021-04-292022-11-03Google LlcDetermining the exposure level of vulnerabilities
US20230308467A1 (en)*2022-03-242023-09-28At&T Intellectual Property I, L.P.Home Gateway Monitoring for Vulnerable Home Internet of Things Devices
US11790537B2 (en)2019-03-282023-10-17Olympus CorporationTracking device, endoscope system, and tracking method
CN118764246A (en)*2024-07-042024-10-11中国人民解放军总医院 A network scanning method, device, equipment and storage medium
US12272363B2 (en)2021-06-302025-04-08Google LlcAdvancing the use of text and speech in ASR pretraining with consistency and contrastive losses
US20250209156A1 (en)*2023-12-212025-06-26Microsoft Technology Licensing, LlcSecurity threat mitigation

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
EP3366755B1 (en)2017-02-222023-11-29Infineum International LimitedImprovements in and relating to lubricating compositions
WO2020194663A1 (en)*2019-03-282020-10-01オリンパス株式会社Tracking device, pretained model, endoscope system, and tracking method

Citations (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6363411B1 (en)*1998-08-052002-03-26Mci Worldcom, Inc.Intelligent network
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US20030152034A1 (en)*2002-02-012003-08-14Microsoft CorporationPeer-to-peer method of quality of service (Qos) probing and analysis and infrastructure employing same
US20040015728A1 (en)*2002-01-152004-01-22Cole David M.System and method for network vulnerability detection and reporting
US20040039942A1 (en)*2000-06-162004-02-26Geoffrey CooperPolicy generator tool
US20040088403A1 (en)*2002-11-012004-05-06Vikas AggarwalSystem configuration for use with a fault and performance monitoring system using distributed data gathering and storage
US20040193918A1 (en)*2003-03-282004-09-30Kenneth GreenApparatus and method for network vulnerability detection and compliance assessment
US20050015624A1 (en)*2003-06-092005-01-20Andrew GinterEvent monitoring and management
US20060159025A1 (en)*2002-06-242006-07-20Miguel AbdoDetermination of network performance characteristics
US20070050777A1 (en)*2003-06-092007-03-01Hutchinson Thomas WDuration of alerts and scanning of large data stores
US20070180490A1 (en)*2004-05-202007-08-02Renzi Silvio JSystem and method for policy management
US20080159162A1 (en)*2006-12-282008-07-03Morikuni James JUniversal Plug-and-Play latency and delay compensation
US20140165130A1 (en)*2012-12-112014-06-12Kaspersky Lab ZaoApplication-specific re-adjustment of computer security settings
US9578060B1 (en)*2012-06-112017-02-21Dell Software Inc.System and method for data loss prevention across heterogeneous communications platforms
US20170222972A1 (en)*2014-09-302017-08-03Hitachi Kokusai Electric Inc.Ip communication system, ip address setting unit, and ip address setting method

Family Cites Families (46)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
AU8567798A (en)*1998-06-192000-01-05Netsafe, Inc.Method and apparatus for providing connections over a network
US6321338B1 (en)*1998-11-092001-11-20Sri InternationalNetwork surveillance
US6202062B1 (en)*1999-02-262001-03-13Ac Properties B.V.System, method and article of manufacture for creating a filtered information summary based on multiple profiles of each single user
US20030074301A1 (en)*1999-11-012003-04-17Neal SolomonSystem, method, and apparatus for an intelligent search agent to access data in a distributed network
US6981028B1 (en)*2000-04-282005-12-27Obongo, Inc.Method and system of implementing recorded data for automating internet interactions
US6918066B2 (en)*2001-09-262005-07-12International Business Machines CorporationMethod and system for evaluating applications on different user agents
CA2410118C (en)*2001-10-262007-12-18Research In Motion LimitedSystem and method for controlling configuration settings for mobile communication devices and services
CA2472268A1 (en)*2001-12-312003-07-17Citadel Security Software Inc.Automated computer vulnerability resolution system
US7664845B2 (en)*2002-01-152010-02-16Mcafee, Inc.System and method for network vulnerability detection and reporting
US20030135507A1 (en)*2002-01-172003-07-17International Business Machines CorporationSystem and method for managing and securing meta data using central repository
DK1365537T3 (en)*2002-05-242004-11-01Swisscom Mobile Ag Devices and methods for certification of digital signatures
US9009084B2 (en)*2002-10-212015-04-14Rockwell Automation Technologies, Inc.System and methodology providing automation security analysis and network intrusion protection in an industrial environment
US9503470B2 (en)*2002-12-242016-11-22Fred Herz Patents, LLCDistributed agent based model for security monitoring and response
US7099853B1 (en)*2004-02-092006-08-29Trend Micro IncorporatedConfigurable hierarchical content filtering system
US8605715B2 (en)*2005-11-022013-12-10Panayiotis ThermosSystem and method for detecting vulnerabilities in voice over IP networks
CN101495992A (en)*2006-01-242009-07-29游戏解决方案国际有限公司Systems and methods for data mining and interactive presentation of same
US8429746B2 (en)*2006-05-222013-04-23Neuraliq, Inc.Decoy network technology with automatic signature generation for intrusion detection and intrusion prevention systems
US7930256B2 (en)*2006-05-232011-04-19Charles River Analytics, Inc.Security system for and method of detecting and responding to cyber attacks on large network systems
SG141289A1 (en)*2006-09-292008-04-28Wireless Intellect Labs Pte LtAn event update management system
US8302196B2 (en)*2007-03-202012-10-30Microsoft CorporationCombining assessment models and client targeting to identify network security vulnerabilities
US20090006399A1 (en)*2007-06-292009-01-01International Business Machines CorporationCompression method for relational tables based on combined column and row coding
US8281396B2 (en)*2008-08-152012-10-02Qualys, Inc.System and method for performing remote security assessment of firewalled computer
US8549650B2 (en)*2010-05-062013-10-01Tenable Network Security, Inc.System and method for three-dimensional visualization of vulnerability and asset data
KR20120004162A (en)*2010-07-062012-01-12삼성전자주식회사 Database management method and database server system using the same
US9246932B2 (en)*2010-07-192016-01-26Sitelock, LlcSelective website vulnerability and infection testing
RU2446459C1 (en)*2010-07-232012-03-27Закрытое акционерное общество "Лаборатория Касперского"System and method for checking web resources for presence of malicious components
WO2012109633A2 (en)*2011-02-112012-08-16Achilles Guard, Inc. D/B/A Critical WatchSecurity countermeasure management platform
US20130263226A1 (en)*2012-01-222013-10-03Frank W. SudiaFalse Banking, Credit Card, and Ecommerce System
KR101909141B1 (en)*2012-07-272018-10-17엘지전자 주식회사Electronic device and method for controlling electronic device
US8756698B2 (en)*2012-08-102014-06-17Nopsec Inc.Method and system for managing computer system vulnerabilities
US20140108215A1 (en)*2012-10-122014-04-17Optionsxpress Holdings, Inc.System and methods for trading
US20140181975A1 (en)*2012-11-062014-06-26William SpernowMethod to scan a forensic image of a computer system with multiple malicious code detection engines simultaneously from a master control point
US9912549B2 (en)*2013-06-142018-03-06Catbird Networks, Inc.Systems and methods for network analysis and reporting
US9208324B2 (en)*2013-09-172015-12-08iViZ Techno Solutions Private LimitedSystem and method to perform secure web application testing based on a hybrid pipelined approach
US10305929B2 (en)*2013-09-272019-05-28Mcafee, LlcManaged software remediation
GB2520987B (en)*2013-12-062016-06-01Cyberlytic LtdUsing fuzzy logic to assign a risk level profile to a potential cyber threat
WO2015134008A1 (en)*2014-03-052015-09-11Foreground SecurityAutomated internet threat detection and mitigation system and associated methods
US9864952B2 (en)*2014-05-272018-01-09Genesys Telecommunications Laboratories, Inc.Controlled question and answer knowledge system management confirming customer does not want to terminate/cancel service/relationship
US9386078B2 (en)*2014-05-302016-07-05Ca, Inc.Controlling application programming interface transactions based on content of earlier transactions
US10936616B2 (en)*2014-06-092021-03-02Oracle International CorporationStorage-side scanning on non-natively formatted data
US9619655B2 (en)*2014-09-122017-04-11Salesforce.Com, Inc.Cloud-based security profiling, threat analysis and intelligence
US10878039B2 (en)*2014-09-222020-12-29International Business Machines CorporationCreating knowledge base of similar systems from plurality of systems
US10146635B1 (en)*2015-06-302018-12-04EMC IP Holding Company LLCVirtual machine backup
US10567396B2 (en)*2015-12-152020-02-18Webroot Inc.Real-time scanning of IP addresses
US20180041533A1 (en)*2016-08-032018-02-08Empow Cyber Security Ltd.Scoring the performance of security products
CN114915446B (en)*2022-04-022023-08-29中国人民解放军国防科技大学 An Intelligent Network Security Detection Method Integrating Prior Knowledge

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6363411B1 (en)*1998-08-052002-03-26Mci Worldcom, Inc.Intelligent network
US20040039942A1 (en)*2000-06-162004-02-26Geoffrey CooperPolicy generator tool
US20030051026A1 (en)*2001-01-192003-03-13Carter Ernst B.Network surveillance and security system
US20040015728A1 (en)*2002-01-152004-01-22Cole David M.System and method for network vulnerability detection and reporting
US20030152034A1 (en)*2002-02-012003-08-14Microsoft CorporationPeer-to-peer method of quality of service (Qos) probing and analysis and infrastructure employing same
US20060159025A1 (en)*2002-06-242006-07-20Miguel AbdoDetermination of network performance characteristics
US20040088403A1 (en)*2002-11-012004-05-06Vikas AggarwalSystem configuration for use with a fault and performance monitoring system using distributed data gathering and storage
US20040193918A1 (en)*2003-03-282004-09-30Kenneth GreenApparatus and method for network vulnerability detection and compliance assessment
US20050015624A1 (en)*2003-06-092005-01-20Andrew GinterEvent monitoring and management
US20070050777A1 (en)*2003-06-092007-03-01Hutchinson Thomas WDuration of alerts and scanning of large data stores
US20070180490A1 (en)*2004-05-202007-08-02Renzi Silvio JSystem and method for policy management
US20080159162A1 (en)*2006-12-282008-07-03Morikuni James JUniversal Plug-and-Play latency and delay compensation
US9578060B1 (en)*2012-06-112017-02-21Dell Software Inc.System and method for data loss prevention across heterogeneous communications platforms
US20140165130A1 (en)*2012-12-112014-06-12Kaspersky Lab ZaoApplication-specific re-adjustment of computer security settings
US20170222972A1 (en)*2014-09-302017-08-03Hitachi Kokusai Electric Inc.Ip communication system, ip address setting unit, and ip address setting method

Cited By (16)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10757137B1 (en)*2018-09-262020-08-25NortonLifeLock Inc.Thwarting an impersonation attack using online decoy text
CN110865774A (en)*2018-12-282020-03-06哈尔滨安天科技集团股份有限公司Information security detection method and device for printing equipment
US11790537B2 (en)2019-03-282023-10-17Olympus CorporationTracking device, endoscope system, and tracking method
US11263295B2 (en)*2019-07-082022-03-01Cloud Linux Software Inc.Systems and methods for intrusion detection and prevention using software patching and honeypots
US20210392153A1 (en)*2020-06-102021-12-16Saudi Arabian Oil CompanySystem and method for vulnerability remediation prioritization
US11477231B2 (en)*2020-06-102022-10-18Saudi Arabian Oil CompanySystem and method for vulnerability remediation prioritization
US11783068B2 (en)*2021-03-242023-10-10Bank Of America CorporationSystem for dynamic exposure monitoring
US20220309174A1 (en)*2021-03-242022-09-29Bank Of America CorporationSystem for dynamic exposure monitoring
WO2022231926A1 (en)*2021-04-292022-11-03Google LlcDetermining the exposure level of vulnerabilities
US11824886B2 (en)2021-04-292023-11-21Google LlcDetermining the exposure level of vulnerabilities
US12120144B2 (en)2021-04-292024-10-15Google LlcDetermining the exposure level of vulnerabilities
US12272363B2 (en)2021-06-302025-04-08Google LlcAdvancing the use of text and speech in ASR pretraining with consistency and contrastive losses
US20230308467A1 (en)*2022-03-242023-09-28At&T Intellectual Property I, L.P.Home Gateway Monitoring for Vulnerable Home Internet of Things Devices
US12432244B2 (en)*2022-03-242025-09-30At&T Intellectual Property I, L.P.Home gateway monitoring for vulnerable home internet of things devices
US20250209156A1 (en)*2023-12-212025-06-26Microsoft Technology Licensing, LlcSecurity threat mitigation
CN118764246A (en)*2024-07-042024-10-11中国人民解放军总医院 A network scanning method, device, equipment and storage medium

Also Published As

Publication numberPublication date
HK1244072A1 (en)2018-07-27
US20210281599A1 (en)2021-09-09
CA2983458A1 (en)2017-01-19
US11962611B2 (en)2024-04-16
US20240275811A1 (en)2024-08-15
EP3281114A1 (en)2018-02-14
US12335299B2 (en)2025-06-17
EP3281114B1 (en)2025-10-01
EP3281114A4 (en)2018-03-14
WO2017011833A1 (en)2017-01-19

Similar Documents

PublicationPublication DateTitle
US12335299B2 (en)Cyber security system and method using intelligent agents
US11171925B2 (en)Evaluating and modifying countermeasures based on aggregate transaction status
US11316891B2 (en)Automated real-time multi-dimensional cybersecurity threat modeling
EP3776307B1 (en)Distributed system for adaptive protection against web-service-targeted vulnerability scanners
US10972461B2 (en)Device aware network communication management
US10491630B2 (en)System and method for providing data-driven user authentication misuse detection
Siadati et al.Detecting structurally anomalous logins within enterprise networks
EP3369232B1 (en)Detection of cyber threats against cloud-based applications
RU2676021C1 (en)DDoS-ATTACKS DETECTION SYSTEM AND METHOD
US8356001B2 (en)Systems and methods for application-level security
US20230095415A1 (en)Helper agent and system
CN113660224B (en)Situation awareness defense method, device and system based on network vulnerability scanning
US10542044B2 (en)Authentication incident detection and management
JP2019506674A (en) Pattern matching based dataset extraction
US11481478B2 (en)Anomalous user session detector
Cotroneo et al.Automated root cause identification of security alerts: Evaluation in a SaaS Cloud
US20220159026A1 (en)Anomalous asset detection based on open ports
KR102018348B1 (en)User behavior analysis based target account exploit detection apparatus
US12341672B2 (en)Logging configuration system and method
US12413610B1 (en)Assessing security of service provider computing systems
RU2665919C1 (en)System and method of determination of ddos-attacks under failure of service servers
RU2659735C1 (en)System and method of setting security systems under ddos attacks
LinLog Analysis
KR20220016592A (en)Security system for detecting data breach and method thereof
LehtinenAnomaly detection in interception proxies

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp