HK1249603A1 - Systems and methods for generating network threat intelligence - Google Patents

Systems and methods for generating network threat intelligence

Info

Publication number
HK1249603A1
HK1249603A1 HK18108921.7A HK18108921A HK1249603A1 HK 1249603 A1 HK1249603 A1 HK 1249603A1 HK 18108921 A HK18108921 A HK 18108921A HK 1249603 A1 HK1249603 A1 HK 1249603A1
Authority
HK
Hong Kong
Prior art keywords
systems
methods
threat intelligence
generating network
network threat
Prior art date
Application number
HK18108921.7A
Other languages
Chinese (zh)
Inventor
Skyler J Bingham
Mahendra K Chandrakar
Lawrence W Gowin
Ryan T Korte
Original Assignee
Level 3 Communications Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/683,964 external-priority patent/US20150215334A1/en
Application filed by Level 3 Communications Llc filed Critical Level 3 Communications Llc
Publication of HK1249603A1 publication Critical patent/HK1249603A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
HK18108921.7A 2015-04-10 2018-07-10 Systems and methods for generating network threat intelligence HK1249603A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/683,964 US20150215334A1 (en) 2012-09-28 2015-04-10 Systems and methods for generating network threat intelligence
PCT/US2016/026131 WO2016164403A1 (en) 2015-04-10 2016-04-06 Systems and methods for generating network threat intelligence

Publications (1)

Publication Number Publication Date
HK1249603A1 true HK1249603A1 (en) 2018-11-02

Family

ID=57072871

Family Applications (1)

Application Number Title Priority Date Filing Date
HK18108921.7A HK1249603A1 (en) 2015-04-10 2018-07-10 Systems and methods for generating network threat intelligence

Country Status (4)

Country Link
EP (1) EP3281116A4 (en)
CA (1) CA2982107A1 (en)
HK (1) HK1249603A1 (en)
WO (1) WO2016164403A1 (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
PL3574412T3 (en) * 2017-01-27 2023-09-11 Level 3 Communications, Llc System and method for scrubbing dns in a telecommunications network to mitigate attacks
US10778645B2 (en) 2017-06-27 2020-09-15 Microsoft Technology Licensing, Llc Firewall configuration manager
US20210089978A1 (en) 2019-09-20 2021-03-25 Privva, Inc. Methods and apparatus for data-driven vendor risk assessment
US11616796B2 (en) 2019-11-11 2023-03-28 Volterra, Inc. System and method to protect resource allocation in stateful connection managers
CN111125539B (en) * 2019-12-31 2024-02-02 武汉市烽视威科技有限公司 CDN harmful information blocking method and system based on artificial intelligence
CN112153009A (en) * 2020-08-28 2020-12-29 杭州安恒信息技术股份有限公司 IP address processing method, device, electronic device and storage medium
CN112272179B (en) * 2020-10-23 2022-02-22 新华三信息安全技术有限公司 Network security processing method, device, equipment and machine readable storage medium
CN113726826B (en) * 2021-11-04 2022-06-17 北京微步在线科技有限公司 Threat information generation method and device
US20240007490A1 (en) * 2022-06-29 2024-01-04 Microsoft Technology Licensing, Llc Malicious activity probability determinations for autonomous systems
CN115865526B (en) * 2023-02-20 2023-05-30 国家工业信息安全发展研究中心 Industrial Internet security detection method and system based on cloud edge cooperation

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8806632B2 (en) * 2008-11-17 2014-08-12 Solarwinds Worldwide, Llc Systems, methods, and devices for detecting security vulnerabilities in IP networks
US8516576B2 (en) * 2010-01-13 2013-08-20 Microsoft Corporation Network intrusion detection with distributed correlation
US20130074143A1 (en) * 2011-09-15 2013-03-21 Mcafee, Inc. System and method for real-time customized threat protection
US20130254260A1 (en) * 2012-03-22 2013-09-26 Akamai Technologies Inc. Network threat assessment system with servers performing message exchange accounting
US8925082B2 (en) * 2012-08-22 2014-12-30 International Business Machines Corporation Cooperative intrusion detection ecosystem for IP reputation-based security
EP2901612A4 (en) * 2012-09-28 2016-06-15 Level 3 Communications Llc Apparatus, system and method for identifying and mitigating malicious network threats
US8881281B1 (en) * 2014-05-29 2014-11-04 Singularity Networks, Inc. Application and network abuse detection with adaptive mitigation utilizing multi-modal intelligence data

Also Published As

Publication number Publication date
WO2016164403A1 (en) 2016-10-13
CA2982107A1 (en) 2016-10-13
EP3281116A1 (en) 2018-02-14
EP3281116A4 (en) 2018-08-15

Similar Documents

Publication Publication Date Title
HK1249603A1 (en) Systems and methods for generating network threat intelligence
ZA201608349B (en) Systems and methods for communication
GB201720065D0 (en) Systems and methods
EP3105888A4 (en) Network security systems and methods
HK1260891A1 (en) Cloaking systems and methods
EP3205073A4 (en) Systems and methods for protecting network devices
EP3175579A4 (en) Systems and methods for network management
GB201506119D0 (en) Systems and methods
EP3317797A4 (en) Threat intelligence system and method
GB2529509B (en) Adaptive beam forming devices, methods, and systems
EP3132356A4 (en) Systems and methods for generating network intelligence through real-time analytics
ZA202007214B (en) Systems and methods for encoder-guided adaptive-quality rendering
GB2543202B (en) Well ranging apparatus, methods, and systems
PL3378213T3 (en) Systems and methods for authenticating network messages
GB2549200B (en) Well ranging apparatus, methods and systems
HUE041722T2 (en) Inerting fuel systems, methods, and apparatuses
HUE052631T2 (en) Method and apparatus for generating policies for improving network system performance
GB201508175D0 (en) Methods and systems
IL268388B (en) Firearm systems and methods
GB201505637D0 (en) Report generation system and method
GB201415688D0 (en) Method and Systems
IL257134B (en) Systems and methods for providing multi-level network security
SG10201502612SA (en) Engineering method and establishing system
GB201406898D0 (en) Telecommunications system and method