Movatterモバイル変換


[0]ホーム

URL:


US20190058725A1 - Security management platforms for assessing threats to an internal network - Google Patents

Security management platforms for assessing threats to an internal network
Download PDF

Info

Publication number
US20190058725A1
US20190058725A1US16/167,029US201816167029AUS2019058725A1US 20190058725 A1US20190058725 A1US 20190058725A1US 201816167029 AUS201816167029 AUS 201816167029AUS 2019058725 A1US2019058725 A1US 2019058725A1
Authority
US
United States
Prior art keywords
management platform
security management
address
network
internal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US16/167,029
Inventor
Matthew Kraning
Gregory Heon
Pamela Toman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Palo Alto Networks Inc
Original Assignee
Expanse Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Expanse IncfiledCriticalExpanse Inc
Priority to US16/167,029priorityCriticalpatent/US20190058725A1/en
Publication of US20190058725A1publicationCriticalpatent/US20190058725A1/en
Assigned to Expanse, Inc.reassignmentExpanse, Inc.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: Qadium, Inc.
Assigned to Qadium, Inc.reassignmentQadium, Inc.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: HEON, Gregory, KRANING, Matthew, TOMAN, Pamela
Assigned to EXPANSE, LLC.reassignmentEXPANSE, LLC.CHANGE OF NAME (SEE DOCUMENT FOR DETAILS).Assignors: Expanse, Inc.
Assigned to PALO ALTO NETWORKS, INC.reassignmentPALO ALTO NETWORKS, INC.ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: EXPANSE, LLC
Abandonedlegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

Introduced here are threat detection systems configured to assess security threats to an internal network, which may be associated with an organization. A threat detection system can include one or more scanning mechanisms and a security management platform. The scanning mechanism(s) can probe at least one Internet Protocol (IP) address by transmitting a query designed to elicit a response, and then create probe data from any responses received from the at least one IP address. The security management platform, meanwhile, can acquire local netflow representative of traffic that crossed a perimeter of an internal network, examine the local network to detect public communication activities, and evaluate a risk posed by the public communication activities based on the local network and the probe data.

Description

Claims (20)

What is claimed is:
1. A system for assessing security threats to an internal network associated with an organization, the system comprising:
one or more scanning mechanisms deployed on a first network,
wherein each scanning mechanism is configured to
probe at least one Internet Protocol (IP) address by transmitting a query designed to elicit a response, and
create probe data from any responses received from the at least one IP address; and
a security management platform configured to
acquire local netflow that includes all traffic that crossed a perimeter of a second network during a certain time interval,
examine the local netflow to detect public communication activities, each public communication activity involving an internal IP address that resides on the second network and an external IP address that does not reside on the second network, and
evaluate a risk posed by the public communication activities based on the local netflow and the probe data.
2. The system ofclaim 1, wherein the first network and the second network are different networks.
3. The system ofclaim 1, wherein the first network is the Internet, and wherein the second network is the internal network associated with the organization.
4. The system ofclaim 1, wherein each scanning mechanism is further configured to:
examine traffic originating from, or directed to, each external IP address involved in a public communication activity to determine which services are running each external IP address.
5. The system ofclaim 4, wherein said examining includes analyzing content of a header of a data packet included in the traffic.
6. The system ofclaim 4, further comprising:
a honeypot server configured to isolate an attempt to gain unauthorized access to a cyber asset residing on the second network; and
a firewall deployed along the perimeter of the second network,
wherein the firewall is configured to
receive a communication from a particular external IP address,
determine that the communication represents an incoming scanning attack, and
prevent a breach of the second network by deflecting the communication to the honeypot server.
7. The system ofclaim 6, wherein the security management platform is further configured to:
acquire global netflow that includes all traffic having a certain characteristic that traversed the first network during the certain time interval,
filter the global netflow to obtain traffic involving one or more IP addresses associated with the honeypot server, and
determine that the traffic includes an attempted scan by a bot.
8. The system ofclaim 7, wherein the security management platform is further configured to:
examine the attempted scan to identify a characteristic of the bot, and identify all internal IP addresses presently involved in communicating with the bot.
9. The system ofclaim 7, wherein the security management platform is further configured:
examine the attempted scan to identify a characteristic of the bot, and
identify a public communication activity involving the bot and a command-and-control center based on the characteristic.
10. A computer-implemented method for estimating risk posed by a public communication activity involving an internal Internet Protocol (IP) address that resides on an internal network and an external IP address that does not reside on the internal network, the method comprising:
acquiring, by a security management platform, probe data from one or more scanning mechanisms deployed on the Internet,
wherein each scanning mechanism is configured to probe at least one Internet Protocol (IP) address by transmitting a query designed to elicit a response from a certain service, and
wherein the probe data includes a first response provided by the internal IP address and a second response provided by the external IP address;
evaluating, by the security management platform, a risk posed by the public communication activity based on the probe data;
determining, by the security management platform, that the risk exceeds a certain threshold; and
transmitting, by the security management platform, an instruction to a firewall deployed on a perimeter of the internal network,
wherein the instruction instructs the firewall to prevent a future breach of the internal network by deflecting an incoming communication from the external IP address to a honeypot server.
11. The computer-implemented method ofclaim 10, further comprising:
acquiring, by the security management platform, local netflow that includes all traffic that crossed the perimeter of the internal network during a certain time interval.
12. The computer-implemented method ofclaim 11, further comprising:
examining, by the security management platform, the local netflow to identify all public communication activities involving the external IP address.
13. The computer-implemented method ofclaim 11, wherein said acquiring comprises:
acquiring, by the security management platform, global netflow that includes all traffic having a certain characteristic that traversed the Internet during the certain time interval; and
filtering the global netflow to obtain the local netflow.
14. The computer-implemented method ofclaim 10, wherein the security management platform resides on a computer server that is communicatively coupled to the internal network.
15. A system comprising:
one or more scanning mechanisms deployed on the Internet,
wherein each scanning mechanism is configured to
probe at least one Internet Protocol (IP) address by transmitting a query designed to elicit a response, and
create probe data from any responses received from the at least one IP address; and
a security management platform configured to
acquire local netflow that includes all traffic that crossed a perimeter of an internal network during a certain time interval,
examine the local netflow to detect a public communication activity involving an internal IP address that resides on the internal network and an external IP address that does not reside on the internal network,
determine that a risk posed by the public communication activity exceeds a certain threshold, and
notify a firewall deployed along a perimeter of the internal network that future communications received from the external IP address should be deflected to a honeypot server.
16. The system ofclaim 15, wherein the honeypot server is configured to isolate attempts to gain unauthorized access to a cyber asset residing on the internal network.
17. The system ofclaim 15, wherein the firewall is configured to, upon receiving a communication from the external IP address, deflect the communication to the honeypot server to prevent a breach of the internal network.
18. The system ofclaim 15, wherein the security management platform is further configured to:
add the external IP address to a blacklist associated with a botnet; and
monitor botnet activity by identifying all public communication activities involving any external IP address included in the blacklist.
19. The system ofclaim 18, wherein the security management platform is further configured to:
update the blacklist on a periodic basis by removing those external IP addresses that have not been involved in any public communication activities for a certain period of time.
20. The system ofclaim 15, wherein the security management platform is further configured to:
examine traffic originating from, or directed to, the external IP address to determine which services, if any, are running on the external IP address.
US16/167,0292017-05-182018-10-22Security management platforms for assessing threats to an internal networkAbandonedUS20190058725A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US16/167,029US20190058725A1 (en)2017-05-182018-10-22Security management platforms for assessing threats to an internal network

Applications Claiming Priority (4)

Application NumberPriority DateFiling DateTitle
US201762508298P2017-05-182017-05-18
US201762586669P2017-11-152017-11-15
US15/984,030US10965707B2 (en)2017-05-182018-05-18Correlation-driven threat assessment and remediation
US16/167,029US20190058725A1 (en)2017-05-182018-10-22Security management platforms for assessing threats to an internal network

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US15/984,030ContinuationUS10965707B2 (en)2017-05-182018-05-18Correlation-driven threat assessment and remediation

Publications (1)

Publication NumberPublication Date
US20190058725A1true US20190058725A1 (en)2019-02-21

Family

ID=64272735

Family Applications (5)

Application NumberTitlePriority DateFiling Date
US15/984,030Active2039-05-24US10965707B2 (en)2017-05-182018-05-18Correlation-driven threat assessment and remediation
US16/167,029AbandonedUS20190058725A1 (en)2017-05-182018-10-22Security management platforms for assessing threats to an internal network
US16/166,972Active2038-10-23US11374957B2 (en)2017-05-182018-10-22Determining risk associated with internet protocol (IP) addresses involved in internet communications
US16/166,906AbandonedUS20190058723A1 (en)2017-05-182018-10-22Discovering internet protocol (ip) addresses involved in flows traversing the internet
US17/216,623Active2039-01-22US12047403B2 (en)2017-05-182021-03-29Externally-driven network attack surface management

Family Applications Before (1)

Application NumberTitlePriority DateFiling Date
US15/984,030Active2039-05-24US10965707B2 (en)2017-05-182018-05-18Correlation-driven threat assessment and remediation

Family Applications After (3)

Application NumberTitlePriority DateFiling Date
US16/166,972Active2038-10-23US11374957B2 (en)2017-05-182018-10-22Determining risk associated with internet protocol (IP) addresses involved in internet communications
US16/166,906AbandonedUS20190058723A1 (en)2017-05-182018-10-22Discovering internet protocol (ip) addresses involved in flows traversing the internet
US17/216,623Active2039-01-22US12047403B2 (en)2017-05-182021-03-29Externally-driven network attack surface management

Country Status (7)

CountryLink
US (5)US10965707B2 (en)
EP (1)EP3625681A1 (en)
JP (1)JP7250703B2 (en)
KR (1)KR20200007931A (en)
AU (1)AU2018269049A1 (en)
CA (1)CA3059788A1 (en)
WO (1)WO2018213778A1 (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110233821A (en)*2019-04-292019-09-13北京邮电大学A kind of detection of smart machine cyberspace and security scanning systems and its method
US20190342210A1 (en)*2018-05-032019-11-07Selligent, S.A.System and Method for Virtual Machine Port Translation and Dynamic Routing
CN110505307A (en)*2019-08-302019-11-26公安部交通管理科学研究所 A method and system for exchanging traffic flow data between networks
CN111509863A (en)*2020-05-262020-08-07广东电网有限责任公司Mobile substation monitoring alarm system and method
US10819716B1 (en)*2019-05-032020-10-27Greynoise Intelligence Inc.Contextual analyses of network traffic
US20210273971A1 (en)*2018-12-102021-09-02Securitymetrics, Inc.Network vulnerability assessment
US11374957B2 (en)2017-05-182022-06-28Palo Alto Networks, Inc.Determining risk associated with internet protocol (IP) addresses involved in internet communications
US11552872B2 (en)*2020-11-232023-01-10Verizon Patent And Licensing Inc.Systems and methods for automated remote network performance monitoring
US11792211B2 (en)2021-01-072023-10-17Bank Of America CorporationSystem for detecting and remediating computing system breaches using computing network traffic monitoring

Families Citing this family (84)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US10805331B2 (en)2010-09-242020-10-13BitSight Technologies, Inc.Information technology security assessment system
US9438615B2 (en)2013-09-092016-09-06BitSight Technologies, Inc.Security risk management
US11405410B2 (en)*2014-02-242022-08-02Cyphort Inc.System and method for detecting lateral movement and data exfiltration
US11182720B2 (en)2016-02-162021-11-23BitSight Technologies, Inc.Relationships among technology assets and services and the entities responsible for them
US10574678B2 (en)*2016-12-132020-02-25Forescout Technologies, Inc.Name translation monitoring
US10476673B2 (en)2017-03-222019-11-12Extrahop Networks, Inc.Managing session secrets for continuous packet capture systems
US10425380B2 (en)2017-06-222019-09-24BitSight Technologies, Inc.Methods for mapping IP addresses and domains to organizations using user activity data
US10841329B2 (en)*2017-08-232020-11-17International Business Machines CorporationCognitive security for workflows
US9967292B1 (en)2017-10-252018-05-08Extrahop Networks, Inc.Inline secret sharing
US10389574B1 (en)2018-02-072019-08-20Extrahop Networks, Inc.Ranking alerts based on network monitoring
US10270794B1 (en)2018-02-092019-04-23Extrahop Networks, Inc.Detection of denial of service attacks
US10257219B1 (en)2018-03-122019-04-09BitSight Technologies, Inc.Correlated risk in cybersecurity
US10812520B2 (en)2018-04-172020-10-20BitSight Technologies, Inc.Systems and methods for external detection of misconfigured systems
US11709946B2 (en)2018-06-062023-07-25Reliaquest Holdings, LlcThreat mitigation system and method
US10965703B2 (en)2018-06-062021-03-30Reliaquest Holdings, LlcThreat mitigation system and method
US11966318B2 (en)*2018-06-122024-04-23Bank Of MontrealSystems and methods for generating a snapshot view of network infrastructure
EP3588897B1 (en)*2018-06-302020-04-22OvhMethod and system for defending an infrastructure against a distributed denial of service attack
US10411978B1 (en)2018-08-092019-09-10Extrahop Networks, Inc.Correlating causes and effects associated with network activity
FR3086821A1 (en)*2018-09-282020-04-03Orange COLLABORATION AND REQUEST FOR COLLABORATION BETWEEN PROTECTION SERVICES ASSOCIATED WITH AT LEAST ONE DOMAIN, CORRESPONDING AGENTS AND COMPUTER PROGRAM.
US11200323B2 (en)2018-10-172021-12-14BitSight Technologies, Inc.Systems and methods for forecasting cybersecurity ratings based on event-rate scenarios
US10521583B1 (en)2018-10-252019-12-31BitSight Technologies, Inc.Systems and methods for remote detection of software through browser webinjects
US11563640B2 (en)*2018-12-132023-01-24At&T Intellectual Property I, L.P.Network data extraction parser-model in SDN
US11811813B2 (en)*2018-12-282023-11-07Trane International Inc.Network security management for a building automation system
US10901375B2 (en)2019-01-312021-01-26Morgan Stanley Services Group Inc.Chaotic system anomaly response by artificial intelligence
US10965702B2 (en)*2019-05-282021-03-30Extrahop Networks, Inc.Detecting injection attacks using passive network monitoring
USD926809S1 (en)2019-06-052021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926810S1 (en)2019-06-052021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926811S1 (en)2019-06-062021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
USD926782S1 (en)2019-06-062021-08-03Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
US11533328B2 (en)*2019-06-062022-12-20Paypal, Inc.Systems and methods for analyzing vulnerabilities of networked systems
USD926200S1 (en)2019-06-062021-07-27Reliaquest Holdings, LlcDisplay screen or portion thereof with a graphical user interface
US10726136B1 (en)2019-07-172020-07-28BitSight Technologies, Inc.Systems and methods for generating security improvement plans for entities
US11165814B2 (en)2019-07-292021-11-02Extrahop Networks, Inc.Modifying triage information based on network monitoring
US10742530B1 (en)2019-08-052020-08-11Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US11388072B2 (en)2019-08-052022-07-12Extrahop Networks, Inc.Correlating network traffic that crosses opaque endpoints
US11409697B2 (en)*2019-08-182022-08-09Capitis Solutions Inc.Efficient configuration compliance verification of resources in a target environment of a computing system
JP7311354B2 (en)*2019-08-212023-07-19株式会社日立製作所 NETWORK MONITORING DEVICE, NETWORK MONITORING METHOD, AND NETWORK MONITORING PROGRAM
US11956265B2 (en)2019-08-232024-04-09BitSight Technologies, Inc.Systems and methods for inferring entity relationships via network communications of users or user devices
US10742677B1 (en)2019-09-042020-08-11Extrahop Networks, Inc.Automatic determination of user roles and asset types based on network monitoring
US10848382B1 (en)2019-09-262020-11-24BitSight Technologies, Inc.Systems and methods for network asset discovery and association thereof with entities
US11032244B2 (en)2019-09-302021-06-08BitSight Technologies, Inc.Systems and methods for determining asset importance in security risk management
CN110958225B (en)*2019-11-082022-02-15杭州安恒信息技术股份有限公司Method for identifying website fingerprint based on flow
US11165823B2 (en)2019-12-172021-11-02Extrahop Networks, Inc.Automated preemptive polymorphic deception
US10791140B1 (en)2020-01-292020-09-29BitSight Technologies, Inc.Systems and methods for assessing cybersecurity state of entities based on computer network characterization
US10893067B1 (en)2020-01-312021-01-12BitSight Technologies, Inc.Systems and methods for rapidly generating security ratings
US11811820B2 (en)*2020-02-242023-11-07Palo Alto Networks (Israel Analytics) Ltd.Malicious C and C channel to fixed IP detection
US10764298B1 (en)2020-02-262020-09-01BitSight Technologies, Inc.Systems and methods for improving a security profile of an entity based on peer security profiles
KR102267101B1 (en)*2020-04-022021-06-18한충희Security control system for responding overseas cyber threat and method thereof
US11516138B2 (en)2020-04-272022-11-29International Business Machines CorporationDetermining network flow direction
US11023585B1 (en)2020-05-272021-06-01BitSight Technologies, Inc.Systems and methods for managing cybersecurity alerts
US20220067153A1 (en)*2020-09-032022-03-03The Government Of The United States, As Represented By The Secretary Of The ArmyArtificial Intelligence Embedded and Secured Augmented Reality
US11463466B2 (en)2020-09-232022-10-04Extrahop Networks, Inc.Monitoring encrypted network traffic
WO2022066910A1 (en)2020-09-232022-03-31Extrahop Networks, Inc.Monitoring encrypted network traffic
US11546368B2 (en)*2020-09-282023-01-03T-Mobile Usa, Inc.Network security system including a multi-dimensional domain name system to protect against cybersecurity threats
US11496522B2 (en)2020-09-282022-11-08T-Mobile Usa, Inc.Digital on-demand coupons for security service of communications system
US11368493B2 (en)*2020-10-022022-06-21Johnson Controls Tyco IP Holdings LLPSystem for and method of detecting communication security in building automation and control networks
US20220159029A1 (en)*2020-11-132022-05-19Cyberark Software Ltd.Detection of security risks based on secretless connection data
US11122073B1 (en)2020-12-112021-09-14BitSight Technologies, Inc.Systems and methods for cybersecurity risk mitigation and management
US11637852B2 (en)*2021-01-042023-04-25Microsoft Technology Licensing, LlcInternet-facing device identification
US12079347B2 (en)2021-03-312024-09-03BitSight Technologies, Inc.Systems and methods for assessing cybersecurity risk in a work from home environment
US11349861B1 (en)2021-06-182022-05-31Extrahop Networks, Inc.Identifying network entities based on beaconing activity
US12205059B1 (en)*2021-06-282025-01-21Rapid7, Inc.Vendor risk assessment using internet telemetry
US12353563B2 (en)2021-07-012025-07-08BitSight Technologies, Inc.Systems and methods for accelerating cybersecurity assessments
US11783001B2 (en)2021-07-082023-10-10Bank Of America CorporationSystem and method for splitting a video stream using breakpoints based on recognizing workflow patterns
US11876775B2 (en)*2021-08-302024-01-16Arbor Networks, Inc.System and method for monitoring communication traffic associated with dynamic internet services via DNS monitoring
US12425437B2 (en)2021-09-172025-09-23BitSight Technologies, Inc.Systems and methods for precomputation of digital asset inventories
US11296967B1 (en)2021-09-232022-04-05Extrahop Networks, Inc.Combining passive network analysis and active probing
US12225040B2 (en)*2021-10-152025-02-11Palo Alto Networks, Inc.Remote attack surface discovery and management
CN114422490B (en)*2021-11-162024-07-30云南电网有限责任公司信息中心Openresty-based numerical control drainage method and system
US12418561B2 (en)*2021-11-192025-09-16Bank Of America CorporationSystem for tracking the controlling entity of internet protocol (IP) addresses and implementing security threat mitigation based on the controlling entity
US11941115B2 (en)2021-11-292024-03-26Bank Of America CorporationAutomatic vulnerability detection based on clustering of applications with similar structures and data flows
US11928221B2 (en)2021-11-292024-03-12Bank Of America CorporationSource code clustering for automatically identifying false positives generated through static application security testing
US12267299B2 (en)*2022-01-122025-04-01Bank Of America CorporationPreemptive threat detection for an information system
US11762755B2 (en)*2022-01-282023-09-19Jpmorgan Chase Bank, N.A.Systems and methods for non-human account tracking
US12282564B2 (en)2022-01-312025-04-22BitSight Technologies, Inc.Systems and methods for assessment of cyber resilience
KR102636138B1 (en)*2022-02-282024-03-12주식회사 에이아이스페라Method, apparatus and computer program of controling security through database server identification based on network traffic
US12270915B2 (en)2022-03-172025-04-08Eagle Technology, LlcSatellite automatic identification system (AIS) for estimating position of potential spoofing maritime vessels and related methods
US12352869B2 (en)2022-03-172025-07-08Eagle Technology, LlcSatellite automatic identification system (AIS) for determining actual spoofing maritime vessels and associated geographic spoof sizes and related methods
US12061272B2 (en)2022-03-172024-08-13Eagle Technology, LlcSatellite automatic identification system (AIS) for determining potential spoofing maritime vessels based upon actual frequency of arrival of AIS messages and related methods
US11843606B2 (en)2022-03-302023-12-12Extrahop Networks, Inc.Detecting abnormal data access based on data similarity
US11968222B2 (en)2022-07-052024-04-23Palo Alto Networks (Israel Analytics) Ltd.Supply chain attack detection
KR102767294B1 (en)*2022-12-272025-02-13(주)싸이터Network apparatus of cyber security for ship and method for performing thereof
US20240250968A1 (en)*2023-01-192024-07-25Palo Alto Networks, Inc.Detecting scanning and attacking uniform resource locators in network traffic
KR20250092717A (en)*2023-12-152025-06-24(주)노르마Method and device for checking vulnerability in electronic device

Family Cites Families (47)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
GB2337903B (en)*1998-05-282000-06-073Com CorpMethods and apparatus for collecting storing processing and using network traffic data
US8010469B2 (en)2000-09-252011-08-30Crossbeam Systems, Inc.Systems and methods for processing data flows
US20020072942A1 (en)2000-12-072002-06-13Kuykendall James B.System and method for push-model fund transfers
US7370356B1 (en)*2002-01-232008-05-06Symantec CorporationDistributed network monitoring system and method
JP3794491B2 (en)2002-08-202006-07-05日本電気株式会社 Attack defense system and attack defense method
US7356584B2 (en)*2003-03-032008-04-08Microsoft CorporationOptimization of service provider load balancing
US7979694B2 (en)*2003-03-032011-07-12Cisco Technology, Inc.Using TCP to authenticate IP source addresses
US8510300B2 (en)2004-07-022013-08-13Goldman, Sachs & Co.Systems and methods for managing information associated with legal, compliance and regulatory risk
US8032594B2 (en)2004-11-102011-10-04Digital Envoy, Inc.Email anti-phishing inspector
US8918883B1 (en)*2005-06-152014-12-23Tripwire, Inc.Prioritizing network security vulnerabilities using accessibility
JP2008545343A (en)*2005-06-292008-12-11トラスティーズ オブ ボストン ユニバーシティ Method and apparatus for all network anomaly diagnosis and method for detecting and classifying network anomalies using traffic feature distribution
US8516104B1 (en)*2005-12-222013-08-20At&T Intellectual Property Ii, L.P.Method and apparatus for detecting anomalies in aggregated traffic volume data
JP4558668B2 (en)*2006-03-062010-10-06株式会社Kddi研究所 Log analysis device, log analysis program, and recording medium
US9003292B2 (en)*2006-07-062015-04-07LiveAction, Inc.System and method for network topology and flow visualization
US7801130B2 (en)*2007-01-312010-09-21At&T Intellectual Property I, L.P.Methods, systems and computer program products for integrating network traffic
US8413238B1 (en)*2008-07-212013-04-02Zscaler, Inc.Monitoring darknet access to identify malicious activity
US8341748B2 (en)*2008-12-182012-12-25Caterpillar Inc.Method and system to detect breaks in a border of a computer network
US8180916B1 (en)*2009-07-172012-05-15Narus, Inc.System and method for identifying network applications based on packet content signatures
US8468606B2 (en)2009-12-082013-06-18Verizon Patent And Licensing Inc.Security handling based on risk management
US8549650B2 (en)*2010-05-062013-10-01Tenable Network Security, Inc.System and method for three-dimensional visualization of vulnerability and asset data
US8595843B1 (en)*2010-08-122013-11-26Amazon Technologies, Inc.Techniques for identifying sources of unauthorized code
KR20130100269A (en)*2010-08-192013-09-10톰슨 라이센싱Personalization of information content by monitoring network traffic
US8561187B1 (en)2010-09-302013-10-15Webroot Inc.System and method for prosecuting dangerous IP addresses on the internet
US8874763B2 (en)*2010-11-052014-10-28At&T Intellectual Property I, L.P.Methods, devices and computer program products for actionable alerting of malevolent network addresses based on generalized traffic anomaly analysis of IP address aggregates
US9455872B2 (en)*2010-12-312016-09-27Open Invention Network, LlcMethod and apparatus of discovering and monitoring network devices
US8762298B1 (en)2011-01-052014-06-24Narus, Inc.Machine learning based botnet detection using real-time connectivity graph based traffic features
US8934352B2 (en)*2011-08-302015-01-13At&T Intellectual Property I, L.P.Hierarchical anomaly localization and prioritization
US9392010B2 (en)*2011-11-072016-07-12Netflow Logic CorporationStreaming method and system for processing network metadata
US9749338B2 (en)2011-12-192017-08-29Verizon Patent And Licensing Inc.System security monitoring
US8803884B2 (en)*2012-02-242014-08-12Florida Institute for Human and Machine CognitionEvent data visualization tool
US9356942B1 (en)*2012-03-052016-05-31Neustar, Inc.Method and system for detecting network compromise
IL219361A (en)*2012-04-232017-09-28Verint Systems LtdSystems and methods for combined physical and cyber data security
US9043920B2 (en)2012-06-272015-05-26Tenable Network Security, Inc.System and method for identifying exploitable weak points in a network
US9088606B2 (en)*2012-07-052015-07-21Tenable Network Security, Inc.System and method for strategic anti-malware monitoring
US9258321B2 (en)2012-08-232016-02-09Raytheon Foreground Security, Inc.Automated internet threat detection and mitigation system and associated methods
US9569232B1 (en)2013-02-192017-02-14Amazon Technologies, Inc.Network traffic data in virtualized environments
US9268967B2 (en)*2013-03-132016-02-23Lawrence Livermore National Security, LlcInternet protocol network mapper
WO2014138817A1 (en)*2013-03-152014-09-18Micropace Pty LimitedSystem and method for monitoring user activity on a plurality of networked computing devices
US9787546B2 (en)2013-08-072017-10-10Harris CorporationNetwork management system generating virtual network map and related methods
US20150121456A1 (en)2013-10-252015-04-30International Business Machines CorporationExploiting trust level lifecycle events for master data to publish security events updating identity management
US20150326592A1 (en)2014-05-072015-11-12Attivo Networks Inc.Emulating shellcode attacks
US10212176B2 (en)*2014-06-232019-02-19Hewlett Packard Enterprise Development LpEntity group behavior profiling
US9202249B1 (en)*2014-07-032015-12-01Palantir Technologies Inc.Data item clustering and analysis
JP6325993B2 (en)*2015-02-042018-05-16日本電信電話株式会社 Service monitoring apparatus and service monitoring method
US10567396B2 (en)*2015-12-152020-02-18Webroot Inc.Real-time scanning of IP addresses
US10999307B2 (en)2016-05-192021-05-04Infinite Group, Inc.Network assessment systems and methods thereof
US10965707B2 (en)2017-05-182021-03-30Expanse, Inc.Correlation-driven threat assessment and remediation

Cited By (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12047403B2 (en)2017-05-182024-07-23Palo Alto Networks, Inc.Externally-driven network attack surface management
US11374957B2 (en)2017-05-182022-06-28Palo Alto Networks, Inc.Determining risk associated with internet protocol (IP) addresses involved in internet communications
US20190342210A1 (en)*2018-05-032019-11-07Selligent, S.A.System and Method for Virtual Machine Port Translation and Dynamic Routing
US10868759B2 (en)*2018-05-032020-12-15Selligent, S.A.System and method for virtual machine port translation and dynamic routing
US20210273971A1 (en)*2018-12-102021-09-02Securitymetrics, Inc.Network vulnerability assessment
CN110233821A (en)*2019-04-292019-09-13北京邮电大学A kind of detection of smart machine cyberspace and security scanning systems and its method
US10819716B1 (en)*2019-05-032020-10-27Greynoise Intelligence Inc.Contextual analyses of network traffic
US11516226B2 (en)2019-05-032022-11-29Greynoise Intelligence Inc.Contextual analyses of network traffic
CN110505307A (en)*2019-08-302019-11-26公安部交通管理科学研究所 A method and system for exchanging traffic flow data between networks
CN111509863A (en)*2020-05-262020-08-07广东电网有限责任公司Mobile substation monitoring alarm system and method
US11552872B2 (en)*2020-11-232023-01-10Verizon Patent And Licensing Inc.Systems and methods for automated remote network performance monitoring
US12113695B2 (en)2020-11-232024-10-08Verizon Patent And Licensing Inc.Systems and methods for automated remote network performance monitoring
US11792211B2 (en)2021-01-072023-10-17Bank Of America CorporationSystem for detecting and remediating computing system breaches using computing network traffic monitoring

Also Published As

Publication numberPublication date
JP7250703B2 (en)2023-04-03
US20190058723A1 (en)2019-02-21
WO2018213778A1 (en)2018-11-22
US11374957B2 (en)2022-06-28
CA3059788A1 (en)2018-11-22
KR20200007931A (en)2020-01-22
US20210288993A1 (en)2021-09-16
US12047403B2 (en)2024-07-23
EP3625681A1 (en)2020-03-25
AU2018269049A1 (en)2019-11-21
US10965707B2 (en)2021-03-30
JP2020521383A (en)2020-07-16
US20180337941A1 (en)2018-11-22
US20190058724A1 (en)2019-02-21

Similar Documents

PublicationPublication DateTitle
US12047403B2 (en)Externally-driven network attack surface management
US11463457B2 (en)Artificial intelligence (AI) based cyber threat analyst to support a cyber security appliance
US20250088856A1 (en)User agent inference and active endpoint fingerprinting for encrypted connections
US9118702B2 (en)System and method for generating and refining cyber threat intelligence data
US8561187B1 (en)System and method for prosecuting dangerous IP addresses on the internet
US20060026679A1 (en)System and method of characterizing and managing electronic traffic
JP2025524952A (en) Systems and methods for cyber threat detection based on new and/or updated cyber threat intelligence
CA3108494C (en)System and method for generating and refining cyber threat intelligence data
Deri et al.Using cyberscore for network traffic monitoring
Fukushi et al.A large-scale analysis of cloud service abuse
AlmazarqiProfiling IoT botnet activity
AhmedMonitoring security of enterprise hosts via DNS data analysis
US20250168199A1 (en)Domain name service protection for secure web gateway
McMillanCompTIA Cybersecurity Analyst (CySA+) Cert Guide
BabuNetwork Traffic Analysis and Anomaly Detection: A Comparative Case Study
Sqalli et al.Classifying malicious activities in Honeynets using entropy and volume‐based thresholds
Bou-Harb et al.On inferring and characterizing large-scale probing and DDoS campaigns
WO2023187309A1 (en)Scored threat signature analysis
AkinrolabuTowards optimising the detection of sophisticated attacks in Security Operation Centres (SOCs)
Lamb et al.Remote Operations and Monitoring: Attack Surfaces
BereIpv6–network security in polytechnic of Namibia network

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

ASAssignment

Owner name:EXPANSE, INC., CALIFORNIA

Free format text:CHANGE OF NAME;ASSIGNOR:QADIUM, INC.;REEL/FRAME:049314/0179

Effective date:20181022

ASAssignment

Owner name:QADIUM, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:KRANING, MATTHEW;HEON, GREGORY;TOMAN, PAMELA;REEL/FRAME:049409/0844

Effective date:20180521

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

ASAssignment

Owner name:EXPANSE, LLC., DELAWARE

Free format text:CHANGE OF NAME;ASSIGNOR:EXPANSE, INC.;REEL/FRAME:056355/0769

Effective date:20201116

ASAssignment

Owner name:PALO ALTO NETWORKS, INC., CALIFORNIA

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EXPANSE, LLC;REEL/FRAME:056379/0222

Effective date:20210517

STCBInformation on status: application discontinuation

Free format text:ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION


[8]ページ先頭

©2009-2025 Movatter.jp