CN103975331A - 并入了被管理基础设施设备的安全的数据中心基础设施管理系统 - Google Patents
并入了被管理基础设施设备的安全的数据中心基础设施管理系统 Download PDFInfo
- Publication number
- CN103975331A CN103975331A CN201280059885.1A CN201280059885A CN103975331A CN 103975331 A CN103975331 A CN 103975331A CN 201280059885 A CN201280059885 A CN 201280059885A CN 103975331 A CN103975331 A CN 103975331A
- Authority
- CN
- China
- Prior art keywords
- managed
- engine
- infrastructure equipment
- security
- cep
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3058—Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
- G06F11/3062—Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations where the monitored property is the power consumption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
- G06F11/3072—Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Alarm Systems (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (23)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161567400P | 2011-12-06 | 2011-12-06 | |
US61/567,400 | 2011-12-06 | ||
PCT/US2012/066072 WO2013085717A1 (en) | 2011-12-06 | 2012-11-20 | Data center infrastructure management system incorporating security for managed infrastructure devices |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103975331A true CN103975331A (zh) | 2014-08-06 |
CN103975331B CN103975331B (zh) | 2017-06-13 |
Family
ID=48574777
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201280059885.1A Active CN103975331B (zh) | 2011-12-06 | 2012-11-20 | 并入了被管理基础设施设备的安全的数据中心基础设施管理系统 |
Country Status (4)
Country | Link |
---|---|
US (1) | US9661016B2 (zh) |
EP (1) | EP2788913B1 (zh) |
CN (1) | CN103975331B (zh) |
WO (1) | WO2013085717A1 (zh) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2350770A4 (en) | 2008-10-21 | 2012-09-05 | Raritan Americas Inc | PROCESS FOR CONSCIOUS PERFORMANCE MANAGEMENT |
US20160012231A1 (en) * | 2014-07-08 | 2016-01-14 | International Business Machines Corporation | Computer security responsive to an operating environment |
US9938019B2 (en) * | 2015-05-21 | 2018-04-10 | The Boeing Company | Systems and methods for detecting a security breach in an aircraft network |
US9912192B2 (en) | 2015-06-22 | 2018-03-06 | Iron Mountain Incorporated | Power distribution visibility in data center environments |
US11075804B2 (en) | 2018-10-22 | 2021-07-27 | International Business Machines Corporation | Network modeling and device configuration based on observed network behavior |
CN109582534B (zh) * | 2018-11-01 | 2022-05-17 | 创新先进技术有限公司 | 系统的操作入口的确定方法、装置和服务器 |
US11695787B2 (en) | 2020-07-01 | 2023-07-04 | Hawk Network Defense, Inc. | Apparatus and methods for determining event information and intrusion detection at a host device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007016478A2 (en) * | 2005-07-29 | 2007-02-08 | Bit9, Inc. | Network security systems and methods |
US20090297043A1 (en) * | 2008-05-28 | 2009-12-03 | International Business Machines Corporation | Pattern scanner and editor for security audit systems |
US20090307705A1 (en) * | 2008-06-05 | 2009-12-10 | Neocleus Israel Ltd | Secure multi-purpose computing client |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7127743B1 (en) * | 2000-06-23 | 2006-10-24 | Netforensics, Inc. | Comprehensive security structure platform for network managers |
KR100794136B1 (ko) | 2000-06-30 | 2008-01-10 | 주식회사 케이티 | 원격 바이러스 검색 서비스 방법 |
US7761923B2 (en) | 2004-03-01 | 2010-07-20 | Invensys Systems, Inc. | Process control methods and apparatus for intrusion detection, protection and network hardening |
JP5038887B2 (ja) * | 2004-04-15 | 2012-10-03 | クリアパス・ネットワークス・インコーポレーテッド | ネットワークを管理するシステムおよび方法 |
US7665133B2 (en) * | 2004-06-12 | 2010-02-16 | Toshbia Tec Kabushiki Kaisha | System and method for monitoring processing in a document processing peripheral |
US20060031934A1 (en) | 2004-08-04 | 2006-02-09 | Stonewater Control Systems, Inc. | Monitoring system |
US20070058657A1 (en) | 2005-08-22 | 2007-03-15 | Graham Holt | System for consolidating and securing access to all out-of-band interfaces in computer, telecommunication, and networking equipment, regardless of the interface type |
US7852873B2 (en) | 2006-03-01 | 2010-12-14 | Lantronix, Inc. | Universal computer management interface |
US7890612B2 (en) * | 2006-05-08 | 2011-02-15 | Electro Guard Corp. | Method and apparatus for regulating data flow between a communications device and a network |
US20080295173A1 (en) * | 2007-05-21 | 2008-11-27 | Tsvetomir Iliev Tsvetanov | Pattern-based network defense mechanism |
US20100268818A1 (en) * | 2007-12-20 | 2010-10-21 | Richmond Alfred R | Systems and methods for forensic analysis of network behavior |
US20090260074A1 (en) | 2008-04-10 | 2009-10-15 | Qlayer Nv | System and method for application level access to virtual server environments |
US8955107B2 (en) * | 2008-09-12 | 2015-02-10 | Juniper Networks, Inc. | Hierarchical application of security services within a computer network |
US8712596B2 (en) * | 2010-05-20 | 2014-04-29 | Accenture Global Services Limited | Malicious attack detection and analysis |
US9047441B2 (en) * | 2011-05-24 | 2015-06-02 | Palo Alto Networks, Inc. | Malware analysis system |
-
2012
- 2012-11-20 WO PCT/US2012/066072 patent/WO2013085717A1/en active Application Filing
- 2012-11-20 US US14/363,197 patent/US9661016B2/en active Active
- 2012-11-20 CN CN201280059885.1A patent/CN103975331B/zh active Active
- 2012-11-20 EP EP12856500.9A patent/EP2788913B1/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007016478A2 (en) * | 2005-07-29 | 2007-02-08 | Bit9, Inc. | Network security systems and methods |
US20090297043A1 (en) * | 2008-05-28 | 2009-12-03 | International Business Machines Corporation | Pattern scanner and editor for security audit systems |
US20090307705A1 (en) * | 2008-06-05 | 2009-12-10 | Neocleus Israel Ltd | Secure multi-purpose computing client |
Also Published As
Publication number | Publication date |
---|---|
US20140366139A1 (en) | 2014-12-11 |
US9661016B2 (en) | 2017-05-23 |
EP2788913B1 (en) | 2019-10-23 |
EP2788913A1 (en) | 2014-10-15 |
EP2788913A4 (en) | 2015-07-29 |
CN103975331B (zh) | 2017-06-13 |
WO2013085717A1 (en) | 2013-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10601844B2 (en) | Non-rule based security risk detection | |
US9537879B2 (en) | Cyber security monitoring system and method for data center components | |
CN103975331A (zh) | 并入了被管理基础设施设备的安全的数据中心基础设施管理系统 | |
CN109617813B (zh) | 增强的智能过程控制交换机端口锁定 | |
US20170289191A1 (en) | Infiltration Detection and Network Rerouting | |
US20130219500A1 (en) | Network intrusion detection in a network that includes a distributed virtual switch fabric | |
US20170093910A1 (en) | Dynamic security mechanisms | |
CN115486105A (zh) | Iot设备发现和标识 | |
US20070050777A1 (en) | Duration of alerts and scanning of large data stores | |
EP2835948B1 (en) | Method for processing a signature rule, server and intrusion prevention system | |
CN104509034A (zh) | 模式合并以识别恶意行为 | |
WO2010005545A1 (en) | Techniques for agent configuration | |
US9245147B1 (en) | State machine reference monitor for information system security | |
EP1894443A2 (en) | Duration of alerts and scanning of large data stores | |
EP2593896A1 (en) | Supervision of the security in a computer system | |
WO2023076127A1 (en) | Iot device identification with packet flow behavior machine learning model | |
CN115917513A (zh) | 使用统计有效载荷指纹自动化iot设备标识 | |
EP3767913B1 (en) | Systems and methods for correlating events to detect an information security incident | |
US11399036B2 (en) | Systems and methods for correlating events to detect an information security incident | |
CN116662112A (zh) | 一种使用全自动扫描和系统状态评估的数字监控平台 | |
Debar et al. | Security information management as an outsourced service | |
CA3122328A1 (en) | A system for, and a method of creating cybersecurity situational awareness, threat detection and risk detection within the internet-of-things space | |
Whyte | Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems | |
KR102229613B1 (ko) | 머신러닝 자가점검 기능을 이용하는 비대면 인증 기반 웹방화벽 유지보수 방법 및 장치 | |
JP2019083478A (ja) | 通信システム、制御装置、ゲートウェイ、通信制御方法、及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: alabama Applicant after: AVOCENT HUNTSVILLE Corp. Address before: alabama Applicant before: Avocent |
|
COR | Change of bibliographic data | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: Delaware Patentee after: Weidi Information Technology System Co.,Ltd. Address before: Delaware Patentee before: Avocent Corp. |
|
CP01 | Change in the name or title of a patent holder | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190417 Address after: Delaware Patentee after: AVOCENT Corp. Address before: alabama Patentee before: AVOCENT HUNTSVILLE Corp. |
|
TR01 | Transfer of patent right |