US7062782B1
(en)
*
|
1999-12-22 |
2006-06-13 |
Uunet Technologies, Inc. |
Overlay network for tracking denial-of-service floods in unreliable datagram delivery networks
|
US6804232B1
(en)
*
|
2000-03-27 |
2004-10-12 |
Bbnt Solutions Llc |
Personal area network with automatic attachment and detachment
|
US20040073617A1
(en)
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
US7043759B2
(en)
|
2000-09-07 |
2006-05-09 |
Mazu Networks, Inc. |
Architecture to thwart denial of service attacks
|
US7278159B2
(en)
*
|
2000-09-07 |
2007-10-02 |
Mazu Networks, Inc. |
Coordinated thwarting of denial of service attacks
|
US7801978B1
(en)
|
2000-10-18 |
2010-09-21 |
Citrix Systems, Inc. |
Apparatus, method and computer program product for efficiently pooling connections between clients and servers
|
US7200105B1
(en)
*
|
2001-01-12 |
2007-04-03 |
Bbn Technologies Corp. |
Systems and methods for point of ingress traceback of a network attack
|
US7444404B2
(en)
*
|
2001-02-05 |
2008-10-28 |
Arbor Networks, Inc. |
Network traffic regulation including consistency based detection and filtering of packets with spoof source addresses
|
US7307999B1
(en)
*
|
2001-02-16 |
2007-12-11 |
Bbn Technologies Corp. |
Systems and methods that identify normal traffic during network attacks
|
US20020188868A1
(en)
*
|
2001-06-12 |
2002-12-12 |
Budka Kenneth C. |
Method for protecting use of resources in a network
|
US7774492B2
(en)
*
|
2001-07-26 |
2010-08-10 |
Citrix Systems, Inc. |
System, method and computer program product to maximize server throughput while avoiding server overload by controlling the rate of establishing server-side net work connections
|
US20030074434A1
(en)
*
|
2001-10-11 |
2003-04-17 |
Jason James L. |
Determination of message source in network communications
|
US7269851B2
(en)
*
|
2002-01-07 |
2007-09-11 |
Mcafee, Inc. |
Managing malware protection upon a computer network
|
US7213264B2
(en)
*
|
2002-01-31 |
2007-05-01 |
Mazu Networks, Inc. |
Architecture to thwart denial of service attacks
|
US7254633B2
(en)
*
|
2002-02-07 |
2007-08-07 |
University Of Massachusetts Amherst |
Probabilistic packet marking
|
US7458098B2
(en)
*
|
2002-03-08 |
2008-11-25 |
Secure Computing Corporation |
Systems and methods for enhancing electronic communication security
|
US7693947B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for graphically displaying messaging traffic
|
US20060015942A1
(en)
|
2002-03-08 |
2006-01-19 |
Ciphertrust, Inc. |
Systems and methods for classification of messaging entities
|
US8578480B2
(en)
|
2002-03-08 |
2013-11-05 |
Mcafee, Inc. |
Systems and methods for identifying potentially malicious messages
|
US8561167B2
(en)
*
|
2002-03-08 |
2013-10-15 |
Mcafee, Inc. |
Web reputation scoring
|
US7903549B2
(en)
*
|
2002-03-08 |
2011-03-08 |
Secure Computing Corporation |
Content-based policy compliance systems and methods
|
US20030172291A1
(en)
|
2002-03-08 |
2003-09-11 |
Paul Judge |
Systems and methods for automated whitelisting in monitored communications
|
US7870203B2
(en)
*
|
2002-03-08 |
2011-01-11 |
Mcafee, Inc. |
Methods and systems for exposing messaging reputation to an end user
|
US6941467B2
(en)
*
|
2002-03-08 |
2005-09-06 |
Ciphertrust, Inc. |
Systems and methods for adaptive message interrogation through multiple queues
|
US7124438B2
(en)
|
2002-03-08 |
2006-10-17 |
Ciphertrust, Inc. |
Systems and methods for anomaly detection in patterns of monitored communications
|
US8132250B2
(en)
*
|
2002-03-08 |
2012-03-06 |
Mcafee, Inc. |
Message profiling systems and methods
|
US7694128B2
(en)
*
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for secure communication delivery
|
US7140041B2
(en)
*
|
2002-04-11 |
2006-11-21 |
International Business Machines Corporation |
Detecting dissemination of malicious programs
|
US7042852B2
(en)
*
|
2002-05-20 |
2006-05-09 |
Airdefense, Inc. |
System and method for wireless LAN dynamic channel change with honeypot trap
|
US7284272B2
(en)
*
|
2002-05-31 |
2007-10-16 |
Alcatel Canada Inc. |
Secret hashing for TCP SYN/FIN correspondence
|
US7886365B2
(en)
|
2002-06-11 |
2011-02-08 |
Panasonic Corporation |
Content-log analyzing system and data-communication controlling device
|
WO2004006115A1
(en)
*
|
2002-07-02 |
2004-01-15 |
Netscaler, Inc |
System, method and computer program product to avoid server overload by controlling http denial of service (dos) attacks
|
US7752665B1
(en)
*
|
2002-07-12 |
2010-07-06 |
TCS Commercial, Inc. |
Detecting probes and scans over high-bandwidth, long-term, incomplete network traffic information using limited memory
|
US20050160335A1
(en)
*
|
2002-07-15 |
2005-07-21 |
Peterson Alec H. |
System and method for monitoring state information in a network
|
US20040010584A1
(en)
*
|
2002-07-15 |
2004-01-15 |
Peterson Alec H. |
System and method for monitoring state information in a network
|
US8281400B1
(en)
*
|
2002-07-23 |
2012-10-02 |
Juniper Networks, Inc. |
Systems and methods for identifying sources of network attacks
|
US7017186B2
(en)
|
2002-07-30 |
2006-03-21 |
Steelcloud, Inc. |
Intrusion detection system using self-organizing clusters
|
US8270423B2
(en)
|
2003-07-29 |
2012-09-18 |
Citrix Systems, Inc. |
Systems and methods of using packet boundaries for reduction in timeout prevention
|
US7616638B2
(en)
|
2003-07-29 |
2009-11-10 |
Orbital Data Corporation |
Wavefront detection and disambiguation of acknowledgments
|
US8233392B2
(en)
*
|
2003-07-29 |
2012-07-31 |
Citrix Systems, Inc. |
Transaction boundary detection for reduction in timeout penalties
|
US7630305B2
(en)
*
|
2003-07-29 |
2009-12-08 |
Orbital Data Corporation |
TCP selective acknowledgements for communicating delivered and missed data packets
|
US8191136B2
(en)
*
|
2002-11-04 |
2012-05-29 |
Riverbed Technology, Inc. |
Connection based denial of service detection
|
US7461404B2
(en)
*
|
2002-11-04 |
2008-12-02 |
Mazu Networks, Inc. |
Detection of unauthorized access in a network
|
US8479057B2
(en)
*
|
2002-11-04 |
2013-07-02 |
Riverbed Technology, Inc. |
Aggregator for connection based anomaly detection
|
US7827272B2
(en)
*
|
2002-11-04 |
2010-11-02 |
Riverbed Technology, Inc. |
Connection table for intrusion detection
|
US8504879B2
(en)
*
|
2002-11-04 |
2013-08-06 |
Riverbed Technology, Inc. |
Connection based anomaly detection
|
US7363656B2
(en)
*
|
2002-11-04 |
2008-04-22 |
Mazu Networks, Inc. |
Event detection/anomaly correlation heuristics
|
US20050033989A1
(en)
*
|
2002-11-04 |
2005-02-10 |
Poletto Massimiliano Antonio |
Detection of scanning attacks
|
US7716737B2
(en)
*
|
2002-11-04 |
2010-05-11 |
Riverbed Technology, Inc. |
Connection based detection of scanning attacks
|
US7774839B2
(en)
*
|
2002-11-04 |
2010-08-10 |
Riverbed Technology, Inc. |
Feedback mechanism to minimize false assertions of a network intrusion
|
US7234161B1
(en)
*
|
2002-12-31 |
2007-06-19 |
Nvidia Corporation |
Method and apparatus for deflecting flooding attacks
|
US7269850B2
(en)
*
|
2002-12-31 |
2007-09-11 |
Intel Corporation |
Systems and methods for detecting and tracing denial of service attacks
|
US8161145B2
(en)
*
|
2003-02-27 |
2012-04-17 |
International Business Machines Corporation |
Method for managing of denial of service attacks using bandwidth allocation technology
|
US7979694B2
(en)
*
|
2003-03-03 |
2011-07-12 |
Cisco Technology, Inc. |
Using TCP to authenticate IP source addresses
|
US7281270B2
(en)
*
|
2003-04-01 |
2007-10-09 |
Lockheed Martin Corporation |
Attack impact prediction system
|
US7620070B1
(en)
|
2003-06-24 |
2009-11-17 |
Nvidia Corporation |
Packet processing with re-insertion into network interface circuitry
|
US7913294B1
(en)
|
2003-06-24 |
2011-03-22 |
Nvidia Corporation |
Network protocol processing for filtering packets
|
US8238241B2
(en)
|
2003-07-29 |
2012-08-07 |
Citrix Systems, Inc. |
Automatic detection and window virtualization for flow control
|
US8437284B2
(en)
|
2003-07-29 |
2013-05-07 |
Citrix Systems, Inc. |
Systems and methods for additional retransmissions of dropped packets
|
US8432800B2
(en)
*
|
2003-07-29 |
2013-04-30 |
Citrix Systems, Inc. |
Systems and methods for stochastic-based quality of service
|
KR100502068B1
(en)
*
|
2003-09-29 |
2005-07-25 |
한국전자통신연구원 |
Security engine management apparatus and method in network nodes
|
WO2005047862A2
(en)
|
2003-11-12 |
2005-05-26 |
The Trustees Of Columbia University In The City Of New York |
Apparatus method and medium for identifying files using n-gram distribution of data
|
KR100628296B1
(en)
*
|
2003-12-18 |
2006-09-27 |
한국전자통신연구원 |
Method for analyzing network attack situation
|
EP1736016B1
(en)
|
2004-04-14 |
2015-06-24 |
MBalance Research B.V. |
Method for preventing the delivery of short message service message spam
|
US7966661B2
(en)
*
|
2004-04-29 |
2011-06-21 |
Microsoft Corporation |
Network amplification attack mitigation
|
CA2733172C
(en)
*
|
2004-05-07 |
2011-10-25 |
Sandvine Incorporated Ulc |
A system and method for detecting sources of abnormal computer network messages
|
US7929534B2
(en)
*
|
2004-06-28 |
2011-04-19 |
Riverbed Technology, Inc. |
Flow logging for connection-based anomaly detection
|
CN100370757C
(en)
*
|
2004-07-09 |
2008-02-20 |
国际商业机器公司 |
Method and system for dentifying a distributed denial of service (DDOS) attack within a network and defending against such an attack
|
US7760653B2
(en)
*
|
2004-10-26 |
2010-07-20 |
Riverbed Technology, Inc. |
Stackable aggregation for connection based anomaly detection
|
US8635690B2
(en)
*
|
2004-11-05 |
2014-01-21 |
Mcafee, Inc. |
Reputation based message processing
|
US20070113290A1
(en)
*
|
2004-11-08 |
2007-05-17 |
Olivier Charles |
Method of detecting and preventing illicit use of certain network protocols without degrading legitimate use thereof
|
KR100628317B1
(en)
*
|
2004-12-03 |
2006-09-27 |
한국전자통신연구원 |
Apparatus for detecting attacks toward network and method thereof
|
US7581005B2
(en)
*
|
2005-01-20 |
2009-08-25 |
Citrix Systems, Inc. |
Systems and methods for preserving transport layer protocol options
|
US8077632B2
(en)
*
|
2005-01-20 |
2011-12-13 |
Citrix Systems, Inc. |
Automatic LAN/WAN port detection
|
US7808897B1
(en)
*
|
2005-03-01 |
2010-10-05 |
International Business Machines Corporation |
Fast network security utilizing intrusion prevention systems
|
US10225282B2
(en)
*
|
2005-04-14 |
2019-03-05 |
International Business Machines Corporation |
System, method and program product to identify a distributed denial of service attack
|
US7774849B2
(en)
*
|
2005-04-15 |
2010-08-10 |
Tekelec |
Methods, systems, and computer program products for detecting and mitigating denial of service attacks in a telecommunications signaling network
|
US7937480B2
(en)
*
|
2005-06-02 |
2011-05-03 |
Mcafee, Inc. |
Aggregation of reputation data
|
US7694338B1
(en)
|
2005-06-03 |
2010-04-06 |
Sprint Communications Company L.P. |
Shared tap DOS-attack protection
|
US7665135B1
(en)
*
|
2005-06-03 |
2010-02-16 |
Sprint Communications Company L.P. |
Detecting and addressing network attacks
|
US20070016767A1
(en)
*
|
2005-07-05 |
2007-01-18 |
Netdevices, Inc. |
Switching Devices Avoiding Degradation of Forwarding Throughput Performance When Downloading Signature Data Related to Security Applications
|
US8874477B2
(en)
|
2005-10-04 |
2014-10-28 |
Steven Mark Hoffberg |
Multifactorial optimization system and method
|
US8566928B2
(en)
|
2005-10-27 |
2013-10-22 |
Georgia Tech Research Corporation |
Method and system for detecting and responding to attacking networks
|
US8266696B2
(en)
*
|
2005-11-14 |
2012-09-11 |
Cisco Technology, Inc. |
Techniques for network protection based on subscriber-aware application proxies
|
US7610622B2
(en)
*
|
2006-02-06 |
2009-10-27 |
Cisco Technology, Inc. |
Supporting options in a communication session using a TCP cookie
|
US8205252B2
(en)
|
2006-07-28 |
2012-06-19 |
Microsoft Corporation |
Network accountability among autonomous systems
|
US8281392B2
(en)
|
2006-08-11 |
2012-10-02 |
Airdefense, Inc. |
Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
|
WO2008052291A2
(en)
*
|
2006-11-03 |
2008-05-08 |
Intelliguard I.T. Pty Ltd |
System and process for detecting anomalous network traffic
|
US7992192B2
(en)
*
|
2006-12-29 |
2011-08-02 |
Ebay Inc. |
Alerting as to denial of service attacks
|
US7779156B2
(en)
*
|
2007-01-24 |
2010-08-17 |
Mcafee, Inc. |
Reputation based load balancing
|
US8763114B2
(en)
|
2007-01-24 |
2014-06-24 |
Mcafee, Inc. |
Detecting image spam
|
US7949716B2
(en)
|
2007-01-24 |
2011-05-24 |
Mcafee, Inc. |
Correlation and analysis of entity attributes
|
US8214497B2
(en)
*
|
2007-01-24 |
2012-07-03 |
Mcafee, Inc. |
Multi-dimensional reputation scoring
|
US8179798B2
(en)
*
|
2007-01-24 |
2012-05-15 |
Mcafee, Inc. |
Reputation based connection throttling
|
US7664857B2
(en)
*
|
2007-01-26 |
2010-02-16 |
Citrix Systems, Inc. |
Systems and methods of using an IP ID field for automatic WAN/LAN detection
|
US8320249B2
(en)
*
|
2007-03-07 |
2012-11-27 |
Broadcom Corporation |
Method and system for controlling network access on a per-flow basis
|
US9083712B2
(en)
*
|
2007-04-04 |
2015-07-14 |
Sri International |
Method and apparatus for generating highly predictive blacklists
|
US8272044B2
(en)
*
|
2007-05-25 |
2012-09-18 |
New Jersey Institute Of Technology |
Method and system to mitigate low rate denial of service (DoS) attacks
|
US8185930B2
(en)
|
2007-11-06 |
2012-05-22 |
Mcafee, Inc. |
Adjusting filter or classification control settings
|
US8045458B2
(en)
*
|
2007-11-08 |
2011-10-25 |
Mcafee, Inc. |
Prioritizing network traffic
|
US8160975B2
(en)
*
|
2008-01-25 |
2012-04-17 |
Mcafee, Inc. |
Granular support vector machine with random granularity
|
US8589503B2
(en)
|
2008-04-04 |
2013-11-19 |
Mcafee, Inc. |
Prioritizing network traffic
|
US10027688B2
(en)
|
2008-08-11 |
2018-07-17 |
Damballa, Inc. |
Method and system for detecting malicious and/or botnet-related domain names
|
US8009559B1
(en)
*
|
2008-08-28 |
2011-08-30 |
Juniper Networks, Inc. |
Global flow tracking system
|
CN102045251B
(en)
*
|
2009-10-20 |
2012-08-22 |
国基电子(上海)有限公司 |
Router and TCP (Transmission Control Protocol) port defense method
|
US8578497B2
(en)
|
2010-01-06 |
2013-11-05 |
Damballa, Inc. |
Method and system for detecting malware
|
US8826438B2
(en)
|
2010-01-19 |
2014-09-02 |
Damballa, Inc. |
Method and system for network-based detecting of malware from behavioral clustering
|
US8621638B2
(en)
|
2010-05-14 |
2013-12-31 |
Mcafee, Inc. |
Systems and methods for classification of messaging entities
|
US8875220B2
(en)
*
|
2010-07-01 |
2014-10-28 |
Raytheom Company |
Proxy-based network access protection
|
US8631489B2
(en)
|
2011-02-01 |
2014-01-14 |
Damballa, Inc. |
Method and system for detecting malicious domain names at an upper DNS hierarchy
|
US9122877B2
(en)
|
2011-03-21 |
2015-09-01 |
Mcafee, Inc. |
System and method for malware and network reputation correlation
|
US8528088B2
(en)
*
|
2011-05-26 |
2013-09-03 |
At&T Intellectual Property I, L.P. |
Modeling and outlier detection in threat management system data
|
US9922190B2
(en)
|
2012-01-25 |
2018-03-20 |
Damballa, Inc. |
Method and system for detecting DGA-based malware
|
US8931043B2
(en)
|
2012-04-10 |
2015-01-06 |
Mcafee Inc. |
System and method for determining and using local reputations of users and hosts to protect information in a network environment
|
US10547674B2
(en)
|
2012-08-27 |
2020-01-28 |
Help/Systems, Llc |
Methods and systems for network flow analysis
|
US10084806B2
(en)
|
2012-08-31 |
2018-09-25 |
Damballa, Inc. |
Traffic simulation to identify malicious activity
|
US9894088B2
(en)
|
2012-08-31 |
2018-02-13 |
Damballa, Inc. |
Data mining to identify malicious activity
|
US9680861B2
(en)
*
|
2012-08-31 |
2017-06-13 |
Damballa, Inc. |
Historical analysis to identify malicious activity
|
US8978138B2
(en)
|
2013-03-15 |
2015-03-10 |
Mehdi Mahvi |
TCP validation via systematic transmission regulation and regeneration
|
US9197362B2
(en)
|
2013-03-15 |
2015-11-24 |
Mehdi Mahvi |
Global state synchronization for securely managed asymmetric network communication
|
US9571511B2
(en)
|
2013-06-14 |
2017-02-14 |
Damballa, Inc. |
Systems and methods for traffic classification
|
US9467369B2
(en)
|
2013-08-02 |
2016-10-11 |
Time Warner Cable Enterprises Llc |
Packetized content delivery apparatus and methods
|
US9507847B2
(en)
|
2013-09-27 |
2016-11-29 |
International Business Machines Corporation |
Automatic log sensor tuning
|
US10291506B2
(en)
*
|
2015-03-04 |
2019-05-14 |
Fisher-Rosemount Systems, Inc. |
Anomaly detection in industrial communications networks
|
US9930065B2
(en)
|
2015-03-25 |
2018-03-27 |
University Of Georgia Research Foundation, Inc. |
Measuring, categorizing, and/or mitigating malware distribution paths
|
US10834065B1
(en)
|
2015-03-31 |
2020-11-10 |
F5 Networks, Inc. |
Methods for SSL protected NTLM re-authentication and devices thereof
|
US9743151B2
(en)
|
2015-06-24 |
2017-08-22 |
Time Warner Cable Enterprises Llc |
Multicast video program switching architecture
|
US10404698B1
(en)
|
2016-01-15 |
2019-09-03 |
F5 Networks, Inc. |
Methods for adaptive organization of web application access points in webtops and devices thereof
|
US10341379B2
(en)
*
|
2016-02-12 |
2019-07-02 |
Time Warner Cable Enterprises Llc |
Apparatus and methods for mitigation of network attacks via dynamic re-routing
|
WO2017166047A1
(en)
*
|
2016-03-29 |
2017-10-05 |
华为技术有限公司 |
Method and device for transmitting network attack defense policy and method and device for defending against network attack
|
TWI640894B
(en)
*
|
2016-11-07 |
2018-11-11 |
劉國良 |
Method of detecting internet information security and its implemented system
|
US10516695B1
(en)
*
|
2017-09-26 |
2019-12-24 |
Amazon Technologies, Inc. |
Distributed denial of service attack mitigation in service provider systems
|
US11010233B1
(en)
|
2018-01-18 |
2021-05-18 |
Pure Storage, Inc |
Hardware-based system monitoring
|
CA3101926A1
(en)
|
2018-02-26 |
2019-08-29 |
Charter Communications Operating, Llc |
Apparatus and methods for packetized content routing and delivery
|
US11687418B2
(en)
|
2019-11-22 |
2023-06-27 |
Pure Storage, Inc. |
Automatic generation of recovery plans specific to individual storage elements
|
US11651075B2
(en)
|
2019-11-22 |
2023-05-16 |
Pure Storage, Inc. |
Extensible attack monitoring by a storage system
|
US11500788B2
(en)
|
2019-11-22 |
2022-11-15 |
Pure Storage, Inc. |
Logical address based authorization of operations with respect to a storage system
|
US11675898B2
(en)
|
2019-11-22 |
2023-06-13 |
Pure Storage, Inc. |
Recovery dataset management for security threat monitoring
|
US11755751B2
(en)
|
2019-11-22 |
2023-09-12 |
Pure Storage, Inc. |
Modify access restrictions in response to a possible attack against data stored by a storage system
|
US11520907B1
(en)
|
2019-11-22 |
2022-12-06 |
Pure Storage, Inc. |
Storage system snapshot retention based on encrypted data
|
US11625481B2
(en)
|
2019-11-22 |
2023-04-11 |
Pure Storage, Inc. |
Selective throttling of operations potentially related to a security threat to a storage system
|
US11720692B2
(en)
|
2019-11-22 |
2023-08-08 |
Pure Storage, Inc. |
Hardware token based management of recovery datasets for a storage system
|
US11657155B2
(en)
|
2019-11-22 |
2023-05-23 |
Pure Storage, Inc |
Snapshot delta metric based determination of a possible ransomware attack against data maintained by a storage system
|
US11615185B2
(en)
|
2019-11-22 |
2023-03-28 |
Pure Storage, Inc. |
Multi-layer security threat detection for a storage system
|
US11645162B2
(en)
|
2019-11-22 |
2023-05-09 |
Pure Storage, Inc. |
Recovery point determination for data restoration in a storage system
|
US11720714B2
(en)
|
2019-11-22 |
2023-08-08 |
Pure Storage, Inc. |
Inter-I/O relationship based detection of a security threat to a storage system
|
US11941116B2
(en)
|
2019-11-22 |
2024-03-26 |
Pure Storage, Inc. |
Ransomware-based data protection parameter modification
|
US11341236B2
(en)
|
2019-11-22 |
2022-05-24 |
Pure Storage, Inc. |
Traffic-based detection of a security threat to a storage system
|
CN117317990B
(en)
*
|
2023-11-30 |
2024-04-02 |
广东电网有限责任公司中山供电局 |
Microcomputer protection method and related device for ac power supply system of transformer substation
|