CN102090019B - 自动分布式网络保护 - Google Patents
自动分布式网络保护 Download PDFInfo
- Publication number
- CN102090019B CN102090019B CN200980127126.2A CN200980127126A CN102090019B CN 102090019 B CN102090019 B CN 102090019B CN 200980127126 A CN200980127126 A CN 200980127126A CN 102090019 B CN102090019 B CN 102090019B
- Authority
- CN
- China
- Prior art keywords
- client computer
- gateway
- network
- described client
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0637—Strategic management or analysis, e.g. setting a goal or target of an organisation; Planning actions based on goals; Analysis or evaluation of effectiveness of goals
- G06Q10/06375—Prediction of business process outcome or impact based on a proposed change
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/04—Billing or invoicing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1475—Passive attacks, e.g. eavesdropping or listening without modification of the traffic monitored
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Computer Security & Cryptography (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Educational Administration (AREA)
- Theoretical Computer Science (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Game Theory and Decision Science (AREA)
- General Engineering & Computer Science (AREA)
- Finance (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Accounting & Taxation (AREA)
- Computing Systems (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims (15)
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US7892808P | 2008-07-08 | 2008-07-08 | |
US61/078,928 | 2008-07-08 | ||
US12/277,089 US20100011432A1 (en) | 2008-07-08 | 2008-11-24 | Automatically distributed network protection |
US12/277,089 | 2008-11-24 | ||
PCT/US2009/048898 WO2010005814A2 (en) | 2008-07-08 | 2009-06-26 | Automatically distributed network protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102090019A CN102090019A (zh) | 2011-06-08 |
CN102090019B true CN102090019B (zh) | 2014-10-29 |
Family
ID=41506280
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN200980127126.2A Expired - Fee Related CN102090019B (zh) | 2008-07-08 | 2009-06-26 | 自动分布式网络保护 |
Country Status (5)
Country | Link |
---|---|
US (1) | US20100011432A1 (zh) |
EP (1) | EP2297899A4 (zh) |
JP (1) | JP5492200B2 (zh) |
CN (1) | CN102090019B (zh) |
WO (1) | WO2010005814A2 (zh) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8341720B2 (en) * | 2009-01-09 | 2012-12-25 | Microsoft Corporation | Information protection applied by an intermediary device |
US8977750B2 (en) * | 2009-02-24 | 2015-03-10 | Red Hat, Inc. | Extending security platforms to cloud-based networks |
US8510838B1 (en) * | 2009-04-08 | 2013-08-13 | Trend Micro, Inc. | Malware protection using file input/output virtualization |
US9479357B1 (en) * | 2010-03-05 | 2016-10-25 | Symantec Corporation | Detecting malware on mobile devices based on mobile behavior analysis |
US9552478B2 (en) * | 2010-05-18 | 2017-01-24 | AO Kaspersky Lab | Team security for portable information devices |
US8806638B1 (en) * | 2010-12-10 | 2014-08-12 | Symantec Corporation | Systems and methods for protecting networks from infected computing devices |
US8713674B1 (en) * | 2010-12-17 | 2014-04-29 | Zscaler, Inc. | Systems and methods for excluding undesirable network transactions |
RU2453917C1 (ru) * | 2010-12-30 | 2012-06-20 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ для оптимизации выполнения антивирусных задач в локальной сети |
US8782750B2 (en) * | 2011-04-25 | 2014-07-15 | Next Level Security Systems, Inc. | Collaborative gateway |
US8621630B2 (en) | 2011-06-17 | 2013-12-31 | Microsoft Corporation | System, method and device for cloud-based content inspection for mobile devices |
TWI561535B (en) | 2011-10-06 | 2016-12-11 | Bvw Holding Ag | Copolymers of hydrophobic and hydrophilic segments that reduce protein adsorption |
US8813173B2 (en) * | 2011-12-22 | 2014-08-19 | Next Level Security Systems, Inc. | Mobile communication device surveillance system |
US9548962B2 (en) * | 2012-05-11 | 2017-01-17 | Alcatel Lucent | Apparatus and method for providing a fluid security layer |
US20130329047A1 (en) * | 2012-06-06 | 2013-12-12 | Next Level Security Systems, Inc. | Escort security surveillance system |
CN102752290B (zh) * | 2012-06-13 | 2016-06-01 | 深圳市腾讯计算机系统有限公司 | 一种云安全系统中的未知文件安全信息确定方法和装置 |
US8955092B2 (en) * | 2012-11-27 | 2015-02-10 | Symantec Corporation | Systems and methods for eliminating redundant security analyses on network data packets |
US8925076B2 (en) | 2012-12-11 | 2014-12-30 | Kaspersky Lab Zao | Application-specific re-adjustment of computer security settings |
US20140254877A1 (en) * | 2013-03-08 | 2014-09-11 | Next Level Security Systems, Inc. | System and method for identifying a vehicle license plate |
US20140254878A1 (en) * | 2013-03-08 | 2014-09-11 | Next Level Security Systems, Inc. | System and method for scanning vehicle license plates |
US20140254866A1 (en) * | 2013-03-08 | 2014-09-11 | Next Level Security Systems, Inc. | Predictive analysis using vehicle license plate recognition |
CN104283844A (zh) * | 2013-07-03 | 2015-01-14 | 北京宝利明威软件技术有限公司 | 一种分布式云安全系统及控制方法 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1798436A (zh) * | 2004-12-28 | 2006-07-05 | 华为技术有限公司 | 一种保证移动通信系统数据业务安全的方法及系统 |
CN101193432A (zh) * | 2006-11-21 | 2008-06-04 | 中兴通讯股份有限公司 | 实现移动增值安全业务的方法和系统 |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5968176A (en) * | 1997-05-29 | 1999-10-19 | 3Com Corporation | Multilayer firewall system |
CA2228687A1 (en) * | 1998-02-04 | 1999-08-04 | Brett Howard | Secured virtual private networks |
US6728886B1 (en) * | 1999-12-01 | 2004-04-27 | Trend Micro Incorporated | Distributed virus scanning arrangements and methods therefor |
AU2002245191A1 (en) * | 2000-10-26 | 2002-07-24 | Digimarc Corporation | Method and system for internet access |
US7480713B2 (en) * | 2000-12-15 | 2009-01-20 | International Business Machines Corporation | Method and system for network management with redundant monitoring and categorization of endpoints |
US7640434B2 (en) * | 2001-05-31 | 2009-12-29 | Trend Micro, Inc. | Identification of undesirable content in responses sent in reply to a user request for content |
US6981280B2 (en) * | 2001-06-29 | 2005-12-27 | Mcafee, Inc. | Intelligent network scanning system and method |
US7415723B2 (en) * | 2002-06-11 | 2008-08-19 | Pandya Ashish A | Distributed network security system and a hardware processor therefor |
US7380002B2 (en) * | 2002-06-28 | 2008-05-27 | Microsoft Corporation | Bi-directional affinity within a load-balancing multi-node network interface |
US20040073716A1 (en) * | 2002-10-14 | 2004-04-15 | Boom Douglas D. | System, device and method for media data offload processing |
US20060182083A1 (en) * | 2002-10-17 | 2006-08-17 | Junya Nakata | Secured virtual private network with mobile nodes |
US7743158B2 (en) * | 2002-12-04 | 2010-06-22 | Ntt Docomo, Inc. | Access network dynamic firewall |
JP4160004B2 (ja) * | 2004-03-03 | 2008-10-01 | 株式会社エヌ・ティ・ティ・データ | アクセス制御システム |
US7844700B2 (en) * | 2005-03-31 | 2010-11-30 | Microsoft Corporation | Latency free scanning of malware at a network transit point |
US7636938B2 (en) | 2005-06-30 | 2009-12-22 | Microsoft Corporation | Controlling network access |
US7627893B2 (en) * | 2005-10-20 | 2009-12-01 | International Business Machines Corporation | Method and system for dynamic adjustment of computer security based on network activity of users |
US7437755B2 (en) * | 2005-10-26 | 2008-10-14 | Cisco Technology, Inc. | Unified network and physical premises access control server |
US7805752B2 (en) * | 2005-11-09 | 2010-09-28 | Symantec Corporation | Dynamic endpoint compliance policy configuration |
US8381297B2 (en) * | 2005-12-13 | 2013-02-19 | Yoggie Security Systems Ltd. | System and method for providing network security to mobile devices |
US7735116B1 (en) * | 2006-03-24 | 2010-06-08 | Symantec Corporation | System and method for unified threat management with a relational rules methodology |
US8935416B2 (en) * | 2006-04-21 | 2015-01-13 | Fortinet, Inc. | Method, apparatus, signals and medium for enforcing compliance with a policy on a client computer |
US20080022401A1 (en) * | 2006-07-21 | 2008-01-24 | Sensory Networks Inc. | Apparatus and Method for Multicore Network Security Processing |
US8959568B2 (en) * | 2007-03-14 | 2015-02-17 | Microsoft Corporation | Enterprise security assessment sharing |
-
2008
- 2008-11-24 US US12/277,089 patent/US20100011432A1/en not_active Abandoned
-
2009
- 2009-06-26 EP EP09794973.9A patent/EP2297899A4/en not_active Withdrawn
- 2009-06-26 JP JP2011517473A patent/JP5492200B2/ja not_active Expired - Fee Related
- 2009-06-26 WO PCT/US2009/048898 patent/WO2010005814A2/en active Application Filing
- 2009-06-26 CN CN200980127126.2A patent/CN102090019B/zh not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1798436A (zh) * | 2004-12-28 | 2006-07-05 | 华为技术有限公司 | 一种保证移动通信系统数据业务安全的方法及系统 |
CN101193432A (zh) * | 2006-11-21 | 2008-06-04 | 中兴通讯股份有限公司 | 实现移动增值安全业务的方法和系统 |
Also Published As
Publication number | Publication date |
---|---|
EP2297899A4 (en) | 2014-08-06 |
WO2010005814A2 (en) | 2010-01-14 |
US20100011432A1 (en) | 2010-01-14 |
WO2010005814A3 (en) | 2010-04-01 |
EP2297899A2 (en) | 2011-03-23 |
CN102090019A (zh) | 2011-06-08 |
JP5492200B2 (ja) | 2014-05-14 |
JP2011527856A (ja) | 2011-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102090019B (zh) | 自动分布式网络保护 | |
US11411980B2 (en) | Insider threat management | |
US11271955B2 (en) | Platform and method for retroactive reclassification employing a cybersecurity-based global data store | |
US20190207966A1 (en) | Platform and Method for Enhanced Cyber-Attack Detection and Response Employing a Global Data Store | |
US8484726B1 (en) | Key security indicators | |
US7890627B1 (en) | Hierarchical statistical model of internet reputation | |
US8478708B1 (en) | System and method for determining risk posed by a web user | |
US9185127B2 (en) | Network protection service | |
EP2135188B1 (en) | Enterprise security assessment sharing | |
CN102741839B (zh) | 基于用户浏览器历史的url过滤 | |
US8938053B2 (en) | System and method for triggering on platform usage | |
CN103023983B (zh) | 用于分布计算机安全任务的处理的系统 | |
US8881223B2 (en) | Enterprise security assessment sharing for off-premise users using globally distributed infrastructure | |
US8413247B2 (en) | Adaptive data collection for root-cause analysis and intrusion detection | |
US7840501B1 (en) | Behavioral analysis apparatus and associated method that utilizes a system selected based on a level of data | |
US9130822B2 (en) | Method, system and computer program product for interception, quarantine and moderation of internal communications of uncontrolled systems | |
US11240275B1 (en) | Platform and method for performing cybersecurity analyses employing an intelligence hub with a modular architecture | |
US10348754B2 (en) | Data security incident correlation and dissemination system and method | |
US8955105B2 (en) | Endpoint enabled for enterprise security assessment sharing | |
US20080183603A1 (en) | Policy enforcement over heterogeneous assets | |
Haber et al. | Security administrators: A breed apart | |
US8930462B1 (en) | Techniques for enforcing data sharing policies on a collaboration platform | |
Flynn et al. | Cloud service provider methods for managing insider threats: Analysis phase ii, expanded analysis and recommendations | |
Husák et al. | Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform | |
US20230388292A1 (en) | User in Group Behavior Signature Monitor |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
ASS | Succession or assignment of patent right |
Owner name: MICROSOFT TECHNOLOGY LICENSING LLC Free format text: FORMER OWNER: MICROSOFT CORP. Effective date: 20150427 |
|
C41 | Transfer of patent application or patent right or utility model | ||
TR01 | Transfer of patent right |
Effective date of registration: 20150427 Address after: Washington State Patentee after: Micro soft technique license Co., Ltd Address before: Washington State Patentee before: Microsoft Corp. |
|
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20141029 Termination date: 20180626 |
|
CF01 | Termination of patent right due to non-payment of annual fee |