US7126964B1
(en)
*
|
2000-02-11 |
2006-10-24 |
Microsoft Corporation |
Method and apparatus for network analysis, such as analyzing and correlating identifiers of frame relay circuits in a network
|
JP3936835B2
(ja)
*
|
2000-09-20 |
2007-06-27 |
株式会社日立製作所 |
計算機ネットワーク用の端末装置および操作履歴記録方法
|
EP1244264B1
(de)
*
|
2001-02-14 |
2006-06-28 |
Mitsubishi Denki Kabushiki Kaisha |
Verfahren und Vorrichtung zur Behandlung von unerlaubten Zugriffsdaten
|
US7461403B1
(en)
*
|
2001-08-03 |
2008-12-02 |
Mcafee, Inc. |
System and method for providing passive screening of transient messages in a distributed computing environment
|
US20030159060A1
(en)
*
|
2001-10-31 |
2003-08-21 |
Gales George S. |
System and method of defining the security condition of a computer system
|
GB2381721B
(en)
*
|
2001-10-31 |
2005-02-23 |
Hewlett Packard Co |
System and method of defining unauthorized intrusions on a computer system
|
FR2832577B1
(fr)
*
|
2001-11-16 |
2005-03-18 |
Cit Alcatel |
Acquisition adaptative de donnees pour systeme de gestion de reseaux ou de services
|
NZ516346A
(en)
*
|
2001-12-21 |
2004-09-24 |
Esphion Ltd |
A device for evaluating traffic on a computer network to detect traffic abnormalities such as a denial of service attack
|
US8087083B1
(en)
*
|
2002-01-04 |
2011-12-27 |
Verizon Laboratories Inc. |
Systems and methods for detecting a network sniffer
|
US7543056B2
(en)
*
|
2002-01-15 |
2009-06-02 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7257630B2
(en)
|
2002-01-15 |
2007-08-14 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
US7152105B2
(en)
*
|
2002-01-15 |
2006-12-19 |
Mcafee, Inc. |
System and method for network vulnerability detection and reporting
|
AU2003223379A1
(en)
*
|
2002-03-29 |
2003-10-13 |
Global Dataguard, Inc. |
Adaptive behavioral intrusion detection systems and methods
|
US20030225883A1
(en)
*
|
2002-06-03 |
2003-12-04 |
Sevenspace, Inc. |
System and method for reliable delivery of event information
|
US7203963B1
(en)
*
|
2002-06-13 |
2007-04-10 |
Mcafee, Inc. |
Method and apparatus for adaptively classifying network traffic
|
US8140660B1
(en)
*
|
2002-07-19 |
2012-03-20 |
Fortinet, Inc. |
Content pattern recognition language processor and methods of using the same
|
US7350203B2
(en)
*
|
2002-07-23 |
2008-03-25 |
Alfred Jahn |
Network security software
|
DE10241974B4
(de)
*
|
2002-09-11 |
2006-01-05 |
Kämper, Peter |
Überwachung von Datenübertragungen
|
FR2846171B1
(fr)
*
|
2002-10-21 |
2005-03-04 |
France Telecom |
Capture de donnees sur un lien informatique avec echantillonnage
|
JP2006504178A
(ja)
*
|
2002-10-22 |
2006-02-02 |
ウンホ チェ |
Itインフラにおける総合侵害事故対応システムおよびその動作方法
|
US8479057B2
(en)
*
|
2002-11-04 |
2013-07-02 |
Riverbed Technology, Inc. |
Aggregator for connection based anomaly detection
|
US8504879B2
(en)
*
|
2002-11-04 |
2013-08-06 |
Riverbed Technology, Inc. |
Connection based anomaly detection
|
US7219239B1
(en)
*
|
2002-12-02 |
2007-05-15 |
Arcsight, Inc. |
Method for batching events for transmission by software agent
|
US7624422B2
(en)
|
2003-02-14 |
2009-11-24 |
Preventsys, Inc. |
System and method for security information normalization
|
US7949732B1
(en)
|
2003-05-12 |
2011-05-24 |
Sourcefire, Inc. |
Systems and methods for determining characteristics of a network and enforcing policy
|
WO2004107706A1
(en)
*
|
2003-05-30 |
2004-12-09 |
International Business Machines Corporation |
Detecting network attacks
|
US7725936B2
(en)
*
|
2003-10-31 |
2010-05-25 |
International Business Machines Corporation |
Host-based network intrusion detection systems
|
JP2007534223A
(ja)
*
|
2003-11-24 |
2007-11-22 |
エフエスシー インターネット コーポレイション |
ネットワークセッション再構築
|
US20070297349A1
(en)
*
|
2003-11-28 |
2007-12-27 |
Ofir Arkin |
Method and System for Collecting Information Relating to a Communication Network
|
FR2864282A1
(fr)
*
|
2003-12-17 |
2005-06-24 |
France Telecom |
Procede de gestion d'un ensemble d'alertes issus de sondes de detection d'intrusions d'un systeme de securite d'informations.
|
WO2005071923A1
(en)
*
|
2004-01-20 |
2005-08-04 |
Intrusic, Inc |
Systems and methods for monitoring data transmissions to detect a compromised network
|
US7620989B1
(en)
*
|
2004-02-19 |
2009-11-17 |
Spirent Communications Inc. |
Network testing methods and systems
|
EP1719290A1
(de)
*
|
2004-02-27 |
2006-11-08 |
Actix Limited |
Datenspeicher- und verarbeitungssysteme
|
US8046464B2
(en)
*
|
2004-03-10 |
2011-10-25 |
The Boeing Company |
Quality of service resource management apparatus and method for middleware services
|
US7698730B2
(en)
*
|
2004-03-16 |
2010-04-13 |
Riverbed Technology, Inc. |
Service detection
|
US8201257B1
(en)
|
2004-03-31 |
2012-06-12 |
Mcafee, Inc. |
System and method of managing network security risks
|
US9027135B1
(en)
|
2004-04-01 |
2015-05-05 |
Fireeye, Inc. |
Prospective client identification using malware attack detection
|
US8566946B1
(en)
|
2006-04-20 |
2013-10-22 |
Fireeye, Inc. |
Malware containment on connection
|
US8881282B1
(en)
|
2004-04-01 |
2014-11-04 |
Fireeye, Inc. |
Systems and methods for malware attack detection and identification
|
US8549638B2
(en)
|
2004-06-14 |
2013-10-01 |
Fireeye, Inc. |
System and method of containing computer worms
|
US8561177B1
(en)
|
2004-04-01 |
2013-10-15 |
Fireeye, Inc. |
Systems and methods for detecting communication channels of bots
|
US8528086B1
(en)
|
2004-04-01 |
2013-09-03 |
Fireeye, Inc. |
System and method of detecting computer worms
|
US8584239B2
(en)
|
2004-04-01 |
2013-11-12 |
Fireeye, Inc. |
Virtual machine with dynamic data flow analysis
|
US8375444B2
(en)
|
2006-04-20 |
2013-02-12 |
Fireeye, Inc. |
Dynamic signature creation and enforcement
|
US8539582B1
(en)
|
2004-04-01 |
2013-09-17 |
Fireeye, Inc. |
Malware containment and security analysis on connection
|
US8204984B1
(en)
|
2004-04-01 |
2012-06-19 |
Fireeye, Inc. |
Systems and methods for detecting encrypted bot command and control communication channels
|
US8898788B1
(en)
|
2004-04-01 |
2014-11-25 |
Fireeye, Inc. |
Systems and methods for malware attack prevention
|
US8006305B2
(en)
|
2004-06-14 |
2011-08-23 |
Fireeye, Inc. |
Computer worm defense system and method
|
US8171553B2
(en)
|
2004-04-01 |
2012-05-01 |
Fireeye, Inc. |
Heuristic based capture with replay to virtual machine
|
US8793787B2
(en)
|
2004-04-01 |
2014-07-29 |
Fireeye, Inc. |
Detecting malicious network content using virtual environment components
|
US9106694B2
(en)
|
2004-04-01 |
2015-08-11 |
Fireeye, Inc. |
Electronic message analysis for malware detection
|
US7587537B1
(en)
|
2007-11-30 |
2009-09-08 |
Altera Corporation |
Serializer-deserializer circuits formed from input-output circuit registers
|
US7389347B2
(en)
*
|
2004-04-16 |
2008-06-17 |
International Business Machines Corporation |
Active probing for real-time diagnosis
|
US8407792B2
(en)
|
2004-05-19 |
2013-03-26 |
Ca, Inc. |
Systems and methods for computer security
|
US7761919B2
(en)
|
2004-05-20 |
2010-07-20 |
Computer Associates Think, Inc. |
Intrusion detection with automatic signature generation
|
WO2005114955A1
(en)
|
2004-05-21 |
2005-12-01 |
Computer Associates Think, Inc. |
Systems and methods of computer security
|
US7562389B1
(en)
|
2004-07-30 |
2009-07-14 |
Cisco Technology, Inc. |
Method and system for network security
|
US7555774B2
(en)
*
|
2004-08-02 |
2009-06-30 |
Cisco Technology, Inc. |
Inline intrusion detection using a single physical port
|
US20060059554A1
(en)
*
|
2004-09-13 |
2006-03-16 |
Ofer Akerman |
System and method for information technology intrusion prevention
|
KR100622670B1
(ko)
*
|
2004-12-07 |
2006-09-19 |
한국전자통신연구원 |
알려지지 않은 네트워크 공격에 대한 실시간 공격 패턴 검출 시스템 및 그 방법
|
US7810158B2
(en)
*
|
2004-12-16 |
2010-10-05 |
At&T Intellectual Property I, L.P. |
Methods and systems for deceptively trapping electronic worms
|
US20080137540A1
(en)
*
|
2004-12-23 |
2008-06-12 |
Corvil Limited |
Method And Apparatus For Analysing Traffic In A Network
|
WO2006067771A1
(en)
*
|
2004-12-23 |
2006-06-29 |
Corvil Limited |
A method and system for analysing traffic in a network
|
US7725938B2
(en)
*
|
2005-01-20 |
2010-05-25 |
Cisco Technology, Inc. |
Inline intrusion detection
|
US20060167825A1
(en)
*
|
2005-01-24 |
2006-07-27 |
Mehmet Sayal |
System and method for discovering correlations among data
|
US7529790B1
(en)
*
|
2005-01-27 |
2009-05-05 |
Hewlett-Packard Development Company, L.P. |
System and method of data analysis
|
US8346960B2
(en)
|
2005-02-15 |
2013-01-01 |
At&T Intellectual Property Ii, L.P. |
Systems, methods, and devices for defending a network
|
JP4944391B2
(ja)
*
|
2005-05-11 |
2012-05-30 |
富士通株式会社 |
メッセージ異常自動判別装置、方法、及びプログラム
|
US20060294588A1
(en)
*
|
2005-06-24 |
2006-12-28 |
International Business Machines Corporation |
System, method and program for identifying and preventing malicious intrusions
|
KR100663546B1
(ko)
|
2005-07-08 |
2007-01-02 |
주식회사 케이티 |
악성 봇 대응 방법 및 그 시스템
|
US7653188B2
(en)
*
|
2005-07-20 |
2010-01-26 |
Avaya Inc. |
Telephony extension attack detection, recording, and intelligent prevention
|
US7962616B2
(en)
*
|
2005-08-11 |
2011-06-14 |
Micro Focus (Us), Inc. |
Real-time activity monitoring and reporting
|
US7908655B1
(en)
*
|
2005-08-16 |
2011-03-15 |
Sprint Communications Company L.P. |
Connectionless port scan detection on a network
|
GB0518578D0
(en)
|
2005-09-13 |
2005-10-19 |
Qinetiq Ltd |
Communications systems firewall
|
US20070071018A1
(en)
*
|
2005-09-29 |
2007-03-29 |
Laboy Jose A |
Method of filtering a plurality of data packets
|
US7712132B1
(en)
|
2005-10-06 |
2010-05-04 |
Ogilvie John W |
Detecting surreptitious spyware
|
US7665136B1
(en)
*
|
2005-11-09 |
2010-02-16 |
Symantec Corporation |
Method and apparatus for detecting hidden network communication channels of rootkit tools
|
US20070240214A1
(en)
*
|
2006-03-30 |
2007-10-11 |
Berry Andrea N |
Live routing
|
US8095967B2
(en)
|
2006-07-27 |
2012-01-10 |
White Sky, Inc. |
Secure web site authentication using web site characteristics, secure user credentials and private browser
|
US8056134B1
(en)
|
2006-09-10 |
2011-11-08 |
Ogilvie John W |
Malware detection and identification via malware spoofing
|
US20080065616A1
(en)
*
|
2006-09-13 |
2008-03-13 |
Brown Abby H |
Metadata integration tool, systems and methods for managing enterprise metadata for the runtime environment
|
US8799447B2
(en)
*
|
2006-10-18 |
2014-08-05 |
International Business Machines Corporation |
Notarizing packet traces
|
US8068986B1
(en)
|
2007-04-27 |
2011-11-29 |
Majid Shahbazi |
Methods and apparatus related to sensor signal sniffing and/or analysis
|
WO2009041686A1
(ja)
*
|
2007-09-28 |
2009-04-02 |
Nippon Telegraph And Telephone Corporation |
ネットワーク監視装置、ネットワーク監視方法およびネットワーク監視プログラム
|
US20090150513A1
(en)
*
|
2007-12-10 |
2009-06-11 |
At&T Knowledge Ventures, Lp |
Method and System for Gathering Network Data
|
US8474043B2
(en)
*
|
2008-04-17 |
2013-06-25 |
Sourcefire, Inc. |
Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing
|
US8521732B2
(en)
|
2008-05-23 |
2013-08-27 |
Solera Networks, Inc. |
Presentation of an extracted artifact based on an indexing technique
|
US8161155B2
(en)
*
|
2008-09-29 |
2012-04-17 |
At&T Intellectual Property I, L.P. |
Filtering unwanted data traffic via a per-customer blacklist
|
WO2010045089A1
(en)
|
2008-10-08 |
2010-04-22 |
Sourcefire, Inc. |
Target-based smb and dce/rpc processing for an intrusion detection system or intrusion prevention system
|
US9785662B2
(en)
|
2008-10-14 |
2017-10-10 |
Mobilegaurd Inc. |
System and method for capturing data sent by a mobile device
|
US10165089B2
(en)
|
2008-10-14 |
2018-12-25 |
Mobileguard, Llc |
System and method for automatic data security, back-up and control for mobile devices
|
US8085681B2
(en)
*
|
2008-10-21 |
2011-12-27 |
At&T Intellectual Property I, Lp |
Centralized analysis and management of network packets
|
US8997219B2
(en)
|
2008-11-03 |
2015-03-31 |
Fireeye, Inc. |
Systems and methods for detecting malicious PDF network content
|
US8850571B2
(en)
|
2008-11-03 |
2014-09-30 |
Fireeye, Inc. |
Systems and methods for detecting malicious network content
|
DE102008059487A1
(de)
*
|
2008-11-28 |
2010-06-24 |
Siemens Aktiengesellschaft |
Verfahren zur Generierung von Parametrierungsdaten für ein Kommunikations-Schutzsystem eines Kommunikationsnetzes in einer Automatisierungsanlage
|
WO2010099560A1
(en)
*
|
2009-03-03 |
2010-09-10 |
Moretonsoft Pty Ltd |
Device and method for monitoring of data packets
|
NL2002694C2
(en)
*
|
2009-04-01 |
2010-10-04 |
Univ Twente |
Method and system for alert classification in a computer network.
|
US9231964B2
(en)
|
2009-04-14 |
2016-01-05 |
Microsoft Corporation |
Vulnerability detection based on aggregated primitives
|
EP2425365A4
(de)
*
|
2009-04-30 |
2016-08-24 |
Ericsson Telefon Ab L M |
Abweichendes verhalten eines benutzerendgeräts
|
US8589698B2
(en)
*
|
2009-05-15 |
2013-11-19 |
International Business Machines Corporation |
Integrity service using regenerated trust integrity gather program
|
CN102025483B
(zh)
*
|
2009-09-17 |
2012-07-04 |
国基电子(上海)有限公司 |
无线路由器及利用该无线路由器预防恶意扫描的方法
|
TWI410080B
(zh)
*
|
2009-09-18 |
2013-09-21 |
Hon Hai Prec Ind Co Ltd |
無線路由器及利用該無線路由器預防惡意掃描的方法
|
US20110072515A1
(en)
*
|
2009-09-22 |
2011-03-24 |
Electronics And Telecommunications Research Institute |
Method and apparatus for collaboratively protecting against distributed denial of service attack
|
US8832829B2
(en)
|
2009-09-30 |
2014-09-09 |
Fireeye, Inc. |
Network-based binary file extraction and analysis for malware detection
|
US20110125748A1
(en)
*
|
2009-11-15 |
2011-05-26 |
Solera Networks, Inc. |
Method and Apparatus for Real Time Identification and Recording of Artifacts
|
KR101292887B1
(ko)
*
|
2009-12-21 |
2013-08-02 |
한국전자통신연구원 |
패킷 동일성 검사를 이용한 라우터의 패킷 스트림 모니터링 장치 및 방법
|
WO2011130510A1
(en)
|
2010-04-16 |
2011-10-20 |
Sourcefire, Inc. |
System and method for near-real time network attack detection, and system and method for unified detection via detection routing
|
US8533319B2
(en)
|
2010-06-02 |
2013-09-10 |
Lockheed Martin Corporation |
Methods and systems for prioritizing network assets
|
US8433790B2
(en)
|
2010-06-11 |
2013-04-30 |
Sourcefire, Inc. |
System and method for assigning network blocks to sensors
|
US8671182B2
(en)
|
2010-06-22 |
2014-03-11 |
Sourcefire, Inc. |
System and method for resolving operating system or service identity conflicts
|
US8756031B2
(en)
|
2010-07-13 |
2014-06-17 |
International Business Machines Corporation |
Matched filter testing of data transmission cables
|
US20120047573A1
(en)
*
|
2010-08-17 |
2012-02-23 |
Richard Jeremy Duncan |
Methods and apparatus for detecting invalid ipv6 packets
|
US8601034B2
(en)
*
|
2011-03-11 |
2013-12-03 |
Sourcefire, Inc. |
System and method for real time data awareness
|
US8666985B2
(en)
|
2011-03-16 |
2014-03-04 |
Solera Networks, Inc. |
Hardware accelerated application-based pattern matching for real time classification and recording of network traffic
|
US9665458B2
(en)
|
2011-06-01 |
2017-05-30 |
Data Security Solutions, Llc |
Method and system for providing information from third party applications to devices
|
US8656013B2
(en)
*
|
2011-06-14 |
2014-02-18 |
Sony Computer Entertainment America Llc |
Real-time data monitoring based on data push
|
US8661522B2
(en)
*
|
2011-07-28 |
2014-02-25 |
Arbor Networks, Inc. |
Method and apparatus for probabilistic matching to authenticate hosts during distributed denial of service attack
|
TWI486047B
(zh)
*
|
2012-01-13 |
2015-05-21 |
Fineart Technology Co Ltd |
一種區域網路防護系統與方法
|
US9519782B2
(en)
|
2012-02-24 |
2016-12-13 |
Fireeye, Inc. |
Detecting malicious network content
|
US10572665B2
(en)
|
2012-12-28 |
2020-02-25 |
Fireeye, Inc. |
System and method to create a number of breakpoints in a virtual machine via virtual machine trapping events
|
US8929356B2
(en)
|
2013-02-05 |
2015-01-06 |
Anue Systems, Inc. |
Mobile user identification and tracking for load balancing in packet processing systems
|
US8990944B1
(en)
|
2013-02-23 |
2015-03-24 |
Fireeye, Inc. |
Systems and methods for automatically detecting backdoors
|
US9159035B1
(en)
|
2013-02-23 |
2015-10-13 |
Fireeye, Inc. |
Framework for computer application analysis of sensitive information tracking
|
US9009823B1
(en)
|
2013-02-23 |
2015-04-14 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications installed on mobile devices
|
US9367681B1
(en)
|
2013-02-23 |
2016-06-14 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications using symbolic execution to reach regions of interest within an application
|
US9009822B1
(en)
|
2013-02-23 |
2015-04-14 |
Fireeye, Inc. |
Framework for multi-phase analysis of mobile applications
|
US9824209B1
(en)
|
2013-02-23 |
2017-11-21 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications that is usable to harden in the field code
|
US9195829B1
(en)
|
2013-02-23 |
2015-11-24 |
Fireeye, Inc. |
User interface with real-time visual playback along with synchronous textual analysis log display and event/time index for anomalous behavior detection in applications
|
US9176843B1
(en)
|
2013-02-23 |
2015-11-03 |
Fireeye, Inc. |
Framework for efficient security coverage of mobile software applications
|
US9104867B1
(en)
|
2013-03-13 |
2015-08-11 |
Fireeye, Inc. |
Malicious content analysis using simulated user interaction without user involvement
|
US9355247B1
(en)
|
2013-03-13 |
2016-05-31 |
Fireeye, Inc. |
File extraction from memory dump for malicious content analysis
|
US9565202B1
(en)
|
2013-03-13 |
2017-02-07 |
Fireeye, Inc. |
System and method for detecting exfiltration content
|
US9626509B1
(en)
|
2013-03-13 |
2017-04-18 |
Fireeye, Inc. |
Malicious content analysis with multi-version application support within single operating environment
|
US9430646B1
(en)
|
2013-03-14 |
2016-08-30 |
Fireeye, Inc. |
Distributed systems and methods for automatically detecting unknown bots and botnets
|
US9311479B1
(en)
|
2013-03-14 |
2016-04-12 |
Fireeye, Inc. |
Correlation and consolidation of analytic data for holistic view of a malware attack
|
US9251343B1
(en)
|
2013-03-15 |
2016-02-02 |
Fireeye, Inc. |
Detecting bootkits resident on compromised computers
|
WO2014145805A1
(en)
|
2013-03-15 |
2014-09-18 |
Mandiant, Llc |
System and method employing structured intelligence to verify and contain threats at endpoints
|
US10713358B2
(en)
|
2013-03-15 |
2020-07-14 |
Fireeye, Inc. |
System and method to extract and utilize disassembly features to classify software intent
|
US9495180B2
(en)
|
2013-05-10 |
2016-11-15 |
Fireeye, Inc. |
Optimized resource allocation for virtual machines within a malware content detection system
|
US9635039B1
(en)
|
2013-05-13 |
2017-04-25 |
Fireeye, Inc. |
Classifying sets of malicious indicators for detecting command and control communications associated with malware
|
US9536091B2
(en)
|
2013-06-24 |
2017-01-03 |
Fireeye, Inc. |
System and method for detecting time-bomb malware
|
US10133863B2
(en)
|
2013-06-24 |
2018-11-20 |
Fireeye, Inc. |
Zero-day discovery system
|
US9888016B1
(en)
|
2013-06-28 |
2018-02-06 |
Fireeye, Inc. |
System and method for detecting phishing using password prediction
|
US9300686B2
(en)
|
2013-06-28 |
2016-03-29 |
Fireeye, Inc. |
System and method for detecting malicious links in electronic messages
|
US9171160B2
(en)
|
2013-09-30 |
2015-10-27 |
Fireeye, Inc. |
Dynamically adaptive framework and method for classifying malware using intelligent static, emulation, and dynamic analyses
|
US10192052B1
(en)
|
2013-09-30 |
2019-01-29 |
Fireeye, Inc. |
System, apparatus and method for classifying a file as malicious using static scanning
|
US10089461B1
(en)
|
2013-09-30 |
2018-10-02 |
Fireeye, Inc. |
Page replacement code injection
|
US9628507B2
(en)
|
2013-09-30 |
2017-04-18 |
Fireeye, Inc. |
Advanced persistent threat (APT) detection center
|
US10515214B1
(en)
|
2013-09-30 |
2019-12-24 |
Fireeye, Inc. |
System and method for classifying malware within content created during analysis of a specimen
|
US9690936B1
(en)
|
2013-09-30 |
2017-06-27 |
Fireeye, Inc. |
Multistage system and method for analyzing obfuscated content for malware
|
US9294501B2
(en)
|
2013-09-30 |
2016-03-22 |
Fireeye, Inc. |
Fuzzy hash of behavioral results
|
US9736179B2
(en)
|
2013-09-30 |
2017-08-15 |
Fireeye, Inc. |
System, apparatus and method for using malware analysis results to drive adaptive instrumentation of virtual machines to improve exploit detection
|
US10367785B2
(en)
*
|
2013-10-01 |
2019-07-30 |
Perfecta Federal Llc |
Software defined traffic modification system
|
US9836516B2
(en)
*
|
2013-10-18 |
2017-12-05 |
Sap Se |
Parallel scanners for log based replication
|
US10198493B2
(en)
|
2013-10-18 |
2019-02-05 |
Sybase, Inc. |
Routing replicated data based on the content of the data
|
US9584367B2
(en)
*
|
2013-11-05 |
2017-02-28 |
Solarwinds Worldwide, Llc |
Node de-duplication in a network monitoring system
|
US9921978B1
(en)
|
2013-11-08 |
2018-03-20 |
Fireeye, Inc. |
System and method for enhanced security of storage devices
|
US9178900B1
(en)
*
|
2013-11-20 |
2015-11-03 |
Trend Micro Inc. |
Detection of advanced persistent threat having evasion technology
|
US9189627B1
(en)
|
2013-11-21 |
2015-11-17 |
Fireeye, Inc. |
System, apparatus and method for conducting on-the-fly decryption of encrypted objects for malware detection
|
AU2013101573A4
(en)
*
|
2013-11-29 |
2014-01-09 |
Macau University Of Science And Technology |
Method for predicting and detecting network intrusion into a computer network
|
US20150172096A1
(en)
*
|
2013-12-17 |
2015-06-18 |
Microsoft Corporation |
System alert correlation via deltas
|
US9747446B1
(en)
|
2013-12-26 |
2017-08-29 |
Fireeye, Inc. |
System and method for run-time object classification
|
US9756074B2
(en)
|
2013-12-26 |
2017-09-05 |
Fireeye, Inc. |
System and method for IPS and VM-based detection of suspicious objects
|
US9292686B2
(en)
|
2014-01-16 |
2016-03-22 |
Fireeye, Inc. |
Micro-virtualization architecture for threat-aware microvisor deployment in a node of a network environment
|
US9262635B2
(en)
|
2014-02-05 |
2016-02-16 |
Fireeye, Inc. |
Detection efficacy of virtual machine-based analysis with application specific events
|
US11405410B2
(en)
|
2014-02-24 |
2022-08-02 |
Cyphort Inc. |
System and method for detecting lateral movement and data exfiltration
|
US10326778B2
(en)
*
|
2014-02-24 |
2019-06-18 |
Cyphort Inc. |
System and method for detecting lateral movement and data exfiltration
|
US20150264073A1
(en)
*
|
2014-03-11 |
2015-09-17 |
Vectra Networks, Inc. |
System and method for detecting intrusions through real-time processing of traffic with extensive historical perspective
|
US9241010B1
(en)
|
2014-03-20 |
2016-01-19 |
Fireeye, Inc. |
System and method for network behavior detection
|
US10242185B1
(en)
|
2014-03-21 |
2019-03-26 |
Fireeye, Inc. |
Dynamic guest image creation and rollback
|
US9591015B1
(en)
|
2014-03-28 |
2017-03-07 |
Fireeye, Inc. |
System and method for offloading packet processing and static analysis operations
|
US9432389B1
(en)
|
2014-03-31 |
2016-08-30 |
Fireeye, Inc. |
System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
|
US9223972B1
(en)
|
2014-03-31 |
2015-12-29 |
Fireeye, Inc. |
Dynamically remote tuning of a malware content detection system
|
US9594912B1
(en)
|
2014-06-06 |
2017-03-14 |
Fireeye, Inc. |
Return-oriented programming detection
|
US9973531B1
(en)
|
2014-06-06 |
2018-05-15 |
Fireeye, Inc. |
Shellcode detection
|
US9438623B1
(en)
|
2014-06-06 |
2016-09-06 |
Fireeye, Inc. |
Computer exploit detection using heap spray pattern matching
|
US10084813B2
(en)
|
2014-06-24 |
2018-09-25 |
Fireeye, Inc. |
Intrusion prevention and remedy system
|
US9398028B1
(en)
|
2014-06-26 |
2016-07-19 |
Fireeye, Inc. |
System, device and method for detecting a malicious attack based on communcations between remotely hosted virtual machines and malicious web servers
|
US10805340B1
(en)
|
2014-06-26 |
2020-10-13 |
Fireeye, Inc. |
Infection vector and malware tracking with an interactive user display
|
US10002252B2
(en)
|
2014-07-01 |
2018-06-19 |
Fireeye, Inc. |
Verification of trusted threat-aware microvisor
|
US10313372B2
(en)
*
|
2015-03-02 |
2019-06-04 |
David Paul Heilig |
Identifying malware-infected network devices through traffic monitoring
|
US9363280B1
(en)
|
2014-08-22 |
2016-06-07 |
Fireeye, Inc. |
System and method of detecting delivery of malware using cross-customer data
|
US10671726B1
(en)
|
2014-09-22 |
2020-06-02 |
Fireeye Inc. |
System and method for malware analysis using thread-level event monitoring
|
US10027689B1
(en)
|
2014-09-29 |
2018-07-17 |
Fireeye, Inc. |
Interactive infection visualization for improved exploit detection and signature generation for malware and malware families
|
US9773112B1
(en)
|
2014-09-29 |
2017-09-26 |
Fireeye, Inc. |
Exploit detection of malware and malware families
|
US9639445B2
(en)
|
2014-10-09 |
2017-05-02 |
Insightete Corporation |
System and method for comprehensive performance and availability tracking using passive monitoring and intelligent synthetic activity generation for monitoring a system
|
US9591022B2
(en)
|
2014-12-17 |
2017-03-07 |
The Boeing Company |
Computer defenses and counterattacks
|
US9690933B1
(en)
|
2014-12-22 |
2017-06-27 |
Fireeye, Inc. |
Framework for classifying an object as malicious with machine learning for deploying updated predictive models
|
US10075455B2
(en)
|
2014-12-26 |
2018-09-11 |
Fireeye, Inc. |
Zero-day rotating guest image profile
|
US9934376B1
(en)
|
2014-12-29 |
2018-04-03 |
Fireeye, Inc. |
Malware detection appliance architecture
|
US9838417B1
(en)
|
2014-12-30 |
2017-12-05 |
Fireeye, Inc. |
Intelligent context aware user interaction for malware detection
|
US9690606B1
(en)
|
2015-03-25 |
2017-06-27 |
Fireeye, Inc. |
Selective system call monitoring
|
US10148693B2
(en)
|
2015-03-25 |
2018-12-04 |
Fireeye, Inc. |
Exploit detection system
|
US9438613B1
(en)
|
2015-03-30 |
2016-09-06 |
Fireeye, Inc. |
Dynamic content activation for automated analysis of embedded objects
|
US10474813B1
(en)
|
2015-03-31 |
2019-11-12 |
Fireeye, Inc. |
Code injection technique for remediation at an endpoint of a network
|
US10417031B2
(en)
|
2015-03-31 |
2019-09-17 |
Fireeye, Inc. |
Selective virtualization for security threat detection
|
US9483644B1
(en)
|
2015-03-31 |
2016-11-01 |
Fireeye, Inc. |
Methods for detecting file altering malware in VM based analysis
|
US9654485B1
(en)
|
2015-04-13 |
2017-05-16 |
Fireeye, Inc. |
Analytics-based security monitoring system and method
|
US9594904B1
(en)
|
2015-04-23 |
2017-03-14 |
Fireeye, Inc. |
Detecting malware based on reflection
|
CN107771320B
(zh)
*
|
2015-05-08 |
2021-08-31 |
思杰系统有限公司 |
用于改善安全套接字层(ssl)通信安全性的系统和方法
|
US11113086B1
(en)
|
2015-06-30 |
2021-09-07 |
Fireeye, Inc. |
Virtual system and method for securing external network connectivity
|
US10642753B1
(en)
|
2015-06-30 |
2020-05-05 |
Fireeye, Inc. |
System and method for protecting a software component running in virtual machine using a virtualization layer
|
US10454950B1
(en)
|
2015-06-30 |
2019-10-22 |
Fireeye, Inc. |
Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
|
US10726127B1
(en)
|
2015-06-30 |
2020-07-28 |
Fireeye, Inc. |
System and method for protecting a software component running in a virtual machine through virtual interrupts by the virtualization layer
|
CN107534587B
(zh)
*
|
2015-07-01 |
2020-11-20 |
慧与发展有限责任合伙企业 |
时延测量系统及方法
|
US10715542B1
(en)
|
2015-08-14 |
2020-07-14 |
Fireeye, Inc. |
Mobile application risk analysis
|
US10176321B2
(en)
|
2015-09-22 |
2019-01-08 |
Fireeye, Inc. |
Leveraging behavior-based rules for malware family classification
|
US10033747B1
(en)
|
2015-09-29 |
2018-07-24 |
Fireeye, Inc. |
System and method for detecting interpreter-based exploit attacks
|
US10817606B1
(en)
|
2015-09-30 |
2020-10-27 |
Fireeye, Inc. |
Detecting delayed activation malware using a run-time monitoring agent and time-dilation logic
|
US10210329B1
(en)
|
2015-09-30 |
2019-02-19 |
Fireeye, Inc. |
Method to detect application execution hijacking using memory protection
|
US10706149B1
(en)
|
2015-09-30 |
2020-07-07 |
Fireeye, Inc. |
Detecting delayed activation malware using a primary controller and plural time controllers
|
US9825976B1
(en)
|
2015-09-30 |
2017-11-21 |
Fireeye, Inc. |
Detection and classification of exploit kits
|
US9825989B1
(en)
|
2015-09-30 |
2017-11-21 |
Fireeye, Inc. |
Cyber attack early warning system
|
US10601865B1
(en)
|
2015-09-30 |
2020-03-24 |
Fireeye, Inc. |
Detection of credential spearphishing attacks using email analysis
|
US10003537B2
(en)
|
2015-10-01 |
2018-06-19 |
Keysight Technologies Singapore (Holding) Pte Ltd |
Egress port overload protection for network packet forwarding systems
|
US10284575B2
(en)
|
2015-11-10 |
2019-05-07 |
Fireeye, Inc. |
Launcher for setting analysis environment variations for malware detection
|
US10846117B1
(en)
|
2015-12-10 |
2020-11-24 |
Fireeye, Inc. |
Technique for establishing secure communication between host and guest processes of a virtualization architecture
|
US10447728B1
(en)
|
2015-12-10 |
2019-10-15 |
Fireeye, Inc. |
Technique for protecting guest processes using a layered virtualization architecture
|
US10108446B1
(en)
|
2015-12-11 |
2018-10-23 |
Fireeye, Inc. |
Late load technique for deploying a virtualization layer underneath a running operating system
|
US9967275B1
(en)
*
|
2015-12-17 |
2018-05-08 |
EMC IP Holding Company LLC |
Efficient detection of network anomalies
|
US10050998B1
(en)
|
2015-12-30 |
2018-08-14 |
Fireeye, Inc. |
Malicious message analysis system
|
US10133866B1
(en)
|
2015-12-30 |
2018-11-20 |
Fireeye, Inc. |
System and method for triggering analysis of an object for malware in response to modification of that object
|
US10621338B1
(en)
|
2015-12-30 |
2020-04-14 |
Fireeye, Inc. |
Method to detect forgery and exploits using last branch recording registers
|
US10565378B1
(en)
|
2015-12-30 |
2020-02-18 |
Fireeye, Inc. |
Exploit of privilege detection framework
|
US11552986B1
(en)
|
2015-12-31 |
2023-01-10 |
Fireeye Security Holdings Us Llc |
Cyber-security framework for application of virtual features
|
US9824216B1
(en)
|
2015-12-31 |
2017-11-21 |
Fireeye, Inc. |
Susceptible environment detection system
|
US10581874B1
(en)
|
2015-12-31 |
2020-03-03 |
Fireeye, Inc. |
Malware detection system with contextual analysis
|
GB201603118D0
(en)
|
2016-02-23 |
2016-04-06 |
Eitc Holdings Ltd |
Reactive and pre-emptive security system based on choice theory
|
US10785255B1
(en)
|
2016-03-25 |
2020-09-22 |
Fireeye, Inc. |
Cluster configuration within a scalable malware detection system
|
US10601863B1
(en)
|
2016-03-25 |
2020-03-24 |
Fireeye, Inc. |
System and method for managing sensor enrollment
|
US10476906B1
(en)
|
2016-03-25 |
2019-11-12 |
Fireeye, Inc. |
System and method for managing formation and modification of a cluster within a malware detection system
|
US10671721B1
(en)
|
2016-03-25 |
2020-06-02 |
Fireeye, Inc. |
Timeout management services
|
US10432650B2
(en)
|
2016-03-31 |
2019-10-01 |
Stuart Staniford |
System and method to protect a webserver against application exploits and attacks
|
US10893059B1
(en)
|
2016-03-31 |
2021-01-12 |
Fireeye, Inc. |
Verification and enhancement using detection systems located at the network periphery and endpoint devices
|
US10826933B1
(en)
|
2016-03-31 |
2020-11-03 |
Fireeye, Inc. |
Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
|
US10169585B1
(en)
|
2016-06-22 |
2019-01-01 |
Fireeye, Inc. |
System and methods for advanced malware detection through placement of transition events
|
US10462173B1
(en)
|
2016-06-30 |
2019-10-29 |
Fireeye, Inc. |
Malware detection verification and enhancement by coordinating endpoint and malware detection systems
|
JP6280662B2
(ja)
*
|
2016-07-05 |
2018-02-14 |
パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカPanasonic Intellectual Property Corporation of America |
不正制御抑止方法、不正制御抑止装置及び車載ネットワークシステム
|
US10291638B1
(en)
*
|
2016-09-08 |
2019-05-14 |
Skyhigh Networks, Llc |
Cloud activity threat detection for sparse and limited user behavior data
|
US10592678B1
(en)
|
2016-09-09 |
2020-03-17 |
Fireeye, Inc. |
Secure communications between peers using a verified virtual trusted platform module
|
US10491627B1
(en)
|
2016-09-29 |
2019-11-26 |
Fireeye, Inc. |
Advanced malware detection using similarity analysis
|
US10795991B1
(en)
|
2016-11-08 |
2020-10-06 |
Fireeye, Inc. |
Enterprise search
|
US10587647B1
(en)
|
2016-11-22 |
2020-03-10 |
Fireeye, Inc. |
Technique for malware detection capability comparison of network security devices
|
US10552610B1
(en)
|
2016-12-22 |
2020-02-04 |
Fireeye, Inc. |
Adaptive virtual machine snapshot update framework for malware behavioral analysis
|
US10581879B1
(en)
|
2016-12-22 |
2020-03-03 |
Fireeye, Inc. |
Enhanced malware detection for generated objects
|
US10523609B1
(en)
|
2016-12-27 |
2019-12-31 |
Fireeye, Inc. |
Multi-vector malware detection and analysis
|
US10904286B1
(en)
|
2017-03-24 |
2021-01-26 |
Fireeye, Inc. |
Detection of phishing attacks using similarity analysis
|
US10848397B1
(en)
|
2017-03-30 |
2020-11-24 |
Fireeye, Inc. |
System and method for enforcing compliance with subscription requirements for cyber-attack detection service
|
US10791138B1
(en)
|
2017-03-30 |
2020-09-29 |
Fireeye, Inc. |
Subscription-based malware detection
|
US10798112B2
(en)
|
2017-03-30 |
2020-10-06 |
Fireeye, Inc. |
Attribute-controlled malware detection
|
US10902119B1
(en)
|
2017-03-30 |
2021-01-26 |
Fireeye, Inc. |
Data extraction system for malware analysis
|
US10503904B1
(en)
|
2017-06-29 |
2019-12-10 |
Fireeye, Inc. |
Ransomware detection and mitigation
|
US10855700B1
(en)
|
2017-06-29 |
2020-12-01 |
Fireeye, Inc. |
Post-intrusion detection of cyber-attacks during lateral movement within networks
|
US10601848B1
(en)
|
2017-06-29 |
2020-03-24 |
Fireeye, Inc. |
Cyber-security system and method for weak indicator detection and correlation to generate strong indicators
|
US10893068B1
(en)
|
2017-06-30 |
2021-01-12 |
Fireeye, Inc. |
Ransomware file modification prevention technique
|
CN114666205B
(zh)
*
|
2017-07-10 |
2024-09-10 |
比吉斯合伙人有限公司 |
用于分组监视和重放的网络
|
CN111542811B
(zh)
*
|
2017-09-26 |
2023-12-12 |
摩根大通国家银行 |
增强网络安全的监视
|
US10747872B1
(en)
|
2017-09-27 |
2020-08-18 |
Fireeye, Inc. |
System and method for preventing malware evasion
|
US10805346B2
(en)
|
2017-10-01 |
2020-10-13 |
Fireeye, Inc. |
Phishing attack detection
|
US11108809B2
(en)
|
2017-10-27 |
2021-08-31 |
Fireeye, Inc. |
System and method for analyzing binary code for malware classification using artificial neural network techniques
|
US11271955B2
(en)
|
2017-12-28 |
2022-03-08 |
Fireeye Security Holdings Us Llc |
Platform and method for retroactive reclassification employing a cybersecurity-based global data store
|
US11240275B1
(en)
|
2017-12-28 |
2022-02-01 |
Fireeye Security Holdings Us Llc |
Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture
|
US11005860B1
(en)
|
2017-12-28 |
2021-05-11 |
Fireeye, Inc. |
Method and system for efficient cybersecurity analysis of endpoint events
|
TWI657681B
(zh)
*
|
2018-02-13 |
2019-04-21 |
愛迪爾資訊有限公司 |
網路流分析方法及其相關系統
|
US10826931B1
(en)
|
2018-03-29 |
2020-11-03 |
Fireeye, Inc. |
System and method for predicting and mitigating cybersecurity system misconfigurations
|
US11558401B1
(en)
|
2018-03-30 |
2023-01-17 |
Fireeye Security Holdings Us Llc |
Multi-vector malware detection data sharing system for improved detection
|
US10956477B1
(en)
|
2018-03-30 |
2021-03-23 |
Fireeye, Inc. |
System and method for detecting malicious scripts through natural language processing modeling
|
US11003773B1
(en)
|
2018-03-30 |
2021-05-11 |
Fireeye, Inc. |
System and method for automatically generating malware detection rule recommendations
|
US11075930B1
(en)
|
2018-06-27 |
2021-07-27 |
Fireeye, Inc. |
System and method for detecting repetitive cybersecurity attacks constituting an email campaign
|
US11314859B1
(en)
|
2018-06-27 |
2022-04-26 |
FireEye Security Holdings, Inc. |
Cyber-security system and method for detecting escalation of privileges within an access token
|
US11228491B1
(en)
|
2018-06-28 |
2022-01-18 |
Fireeye Security Holdings Us Llc |
System and method for distributed cluster configuration monitoring and management
|
CN110661671A
(zh)
*
|
2018-06-28 |
2020-01-07 |
中兴通讯股份有限公司 |
业务检测方法、装置及设备、存储介质
|
US11316900B1
(en)
|
2018-06-29 |
2022-04-26 |
FireEye Security Holdings Inc. |
System and method for automatically prioritizing rules for cyber-threat detection and mitigation
|
US11182473B1
(en)
|
2018-09-13 |
2021-11-23 |
Fireeye Security Holdings Us Llc |
System and method for mitigating cyberattacks against processor operability by a guest process
|
US11763004B1
(en)
|
2018-09-27 |
2023-09-19 |
Fireeye Security Holdings Us Llc |
System and method for bootkit detection
|
US12074887B1
(en)
|
2018-12-21 |
2024-08-27 |
Musarubra Us Llc |
System and method for selectively processing content after identification and removal of malicious content
|
US11176251B1
(en)
|
2018-12-21 |
2021-11-16 |
Fireeye, Inc. |
Determining malware via symbolic function hash analysis
|
US11368475B1
(en)
|
2018-12-21 |
2022-06-21 |
Fireeye Security Holdings Us Llc |
System and method for scanning remote services to locate stored objects with malware
|
US11743290B2
(en)
|
2018-12-21 |
2023-08-29 |
Fireeye Security Holdings Us Llc |
System and method for detecting cyberattacks impersonating legitimate sources
|
US11601444B1
(en)
|
2018-12-31 |
2023-03-07 |
Fireeye Security Holdings Us Llc |
Automated system for triage of customer issues
|
US10986121B2
(en)
|
2019-01-24 |
2021-04-20 |
Darktrace Limited |
Multivariate network structure anomaly detector
|
US11310238B1
(en)
|
2019-03-26 |
2022-04-19 |
FireEye Security Holdings, Inc. |
System and method for retrieval and analysis of operational data from customer, cloud-hosted virtual resources
|
US11677786B1
(en)
|
2019-03-29 |
2023-06-13 |
Fireeye Security Holdings Us Llc |
System and method for detecting and protecting against cybersecurity attacks on servers
|
US11636198B1
(en)
|
2019-03-30 |
2023-04-25 |
Fireeye Security Holdings Us Llc |
System and method for cybersecurity analyzer update and concurrent management system
|
CN110362475A
(zh)
*
|
2019-06-17 |
2019-10-22 |
北京奇艺世纪科技有限公司 |
一种信息获取方法、装置、终端设备及存储介质
|
US11258806B1
(en)
|
2019-06-24 |
2022-02-22 |
Mandiant, Inc. |
System and method for automatically associating cybersecurity intelligence to cyberthreat actors
|
US11556640B1
(en)
|
2019-06-27 |
2023-01-17 |
Mandiant, Inc. |
Systems and methods for automated cybersecurity analysis of extracted binary string sets
|
US11392700B1
(en)
|
2019-06-28 |
2022-07-19 |
Fireeye Security Holdings Us Llc |
System and method for supporting cross-platform data verification
|
US11886585B1
(en)
|
2019-09-27 |
2024-01-30 |
Musarubra Us Llc |
System and method for identifying and mitigating cyberattacks through malicious position-independent code execution
|
US11637862B1
(en)
|
2019-09-30 |
2023-04-25 |
Mandiant, Inc. |
System and method for surfacing cyber-security threats with a self-learning recommendation engine
|
US11436327B1
(en)
|
2019-12-24 |
2022-09-06 |
Fireeye Security Holdings Us Llc |
System and method for circumventing evasive code for cyberthreat detection
|
US11838300B1
(en)
|
2019-12-24 |
2023-12-05 |
Musarubra Us Llc |
Run-time configurable cybersecurity system
|
US11522884B1
(en)
|
2019-12-24 |
2022-12-06 |
Fireeye Security Holdings Us Llc |
Subscription and key management system
|
CN112291246B
(zh)
*
|
2020-10-30 |
2022-01-28 |
四川长虹电器股份有限公司 |
一种在蜜罐场景下扩展攻击流量牵引能力的方法
|
WO2022100866A1
(en)
*
|
2020-11-16 |
2022-05-19 |
Huawei Technologies Co., Ltd. |
Method and apparatus for network security
|
CN113095433B
(zh)
*
|
2021-04-27 |
2023-06-23 |
北京石油化工学院 |
入侵检测网络结构模型的训练方法
|
US12034557B2
(en)
|
2021-12-17 |
2024-07-09 |
Bank Of America Corporation |
Systems for capturing messaging volume and utilization metrics within a multicast messaging service
|
CN116015755A
(zh)
*
|
2022-12-08 |
2023-04-25 |
西安热工研究院有限公司 |
子母式便携工控蜜网系统及部署方法
|
CN117354057B
(zh)
*
|
2023-12-01 |
2024-03-05 |
杭州海康威视数字技术股份有限公司 |
恶意流量检测方法、装置及设备
|