CN103975331B - 并入了被管理基础设施设备的安全的数据中心基础设施管理系统 - Google Patents
并入了被管理基础设施设备的安全的数据中心基础设施管理系统 Download PDFInfo
- Publication number
- CN103975331B CN103975331B CN201280059885.1A CN201280059885A CN103975331B CN 103975331 B CN103975331 B CN 103975331B CN 201280059885 A CN201280059885 A CN 201280059885A CN 103975331 B CN103975331 B CN 103975331B
- Authority
- CN
- China
- Prior art keywords
- managed
- infrastructure equipment
- engine
- infrastructure
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3006—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3058—Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
- G06F11/3062—Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations where the monitored property is the power consumption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
- G06F11/3072—Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting
Abstract
Description
Claims (22)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201161567400P | 2011-12-06 | 2011-12-06 | |
US61/567,400 | 2011-12-06 | ||
PCT/US2012/066072 WO2013085717A1 (en) | 2011-12-06 | 2012-11-20 | Data center infrastructure management system incorporating security for managed infrastructure devices |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103975331A CN103975331A (zh) | 2014-08-06 |
CN103975331B true CN103975331B (zh) | 2017-06-13 |
Family
ID=48574777
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201280059885.1A Active CN103975331B (zh) | 2011-12-06 | 2012-11-20 | 并入了被管理基础设施设备的安全的数据中心基础设施管理系统 |
Country Status (4)
Country | Link |
---|---|
US (1) | US9661016B2 (zh) |
EP (1) | EP2788913B1 (zh) |
CN (1) | CN103975331B (zh) |
WO (1) | WO2013085717A1 (zh) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2741088C (en) | 2008-10-21 | 2017-07-11 | Raritan Americas, Inc. | Methods of achieving cognizant power management |
US20160012231A1 (en) * | 2014-07-08 | 2016-01-14 | International Business Machines Corporation | Computer security responsive to an operating environment |
US9938019B2 (en) * | 2015-05-21 | 2018-04-10 | The Boeing Company | Systems and methods for detecting a security breach in an aircraft network |
US9912192B2 (en) | 2015-06-22 | 2018-03-06 | Iron Mountain Incorporated | Power distribution visibility in data center environments |
US11075804B2 (en) | 2018-10-22 | 2021-07-27 | International Business Machines Corporation | Network modeling and device configuration based on observed network behavior |
CN109582534B (zh) * | 2018-11-01 | 2022-05-17 | 创新先进技术有限公司 | 系统的操作入口的确定方法、装置和服务器 |
US11695787B2 (en) | 2020-07-01 | 2023-07-04 | Hawk Network Defense, Inc. | Apparatus and methods for determining event information and intrusion detection at a host device |
Family Cites Families (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7127743B1 (en) * | 2000-06-23 | 2006-10-24 | Netforensics, Inc. | Comprehensive security structure platform for network managers |
KR100794136B1 (ko) | 2000-06-30 | 2008-01-10 | 주식회사 케이티 | 원격 바이러스 검색 서비스 방법 |
US7761923B2 (en) * | 2004-03-01 | 2010-07-20 | Invensys Systems, Inc. | Process control methods and apparatus for intrusion detection, protection and network hardening |
JP5038887B2 (ja) * | 2004-04-15 | 2012-10-03 | クリアパス・ネットワークス・インコーポレーテッド | ネットワークを管理するシステムおよび方法 |
US7665133B2 (en) * | 2004-06-12 | 2010-02-16 | Toshbia Tec Kabushiki Kaisha | System and method for monitoring processing in a document processing peripheral |
US20060031934A1 (en) | 2004-08-04 | 2006-02-09 | Stonewater Control Systems, Inc. | Monitoring system |
EP1920338B1 (en) * | 2005-07-29 | 2013-05-15 | Bit9, Inc. | Network security systems and methods |
US20070058657A1 (en) | 2005-08-22 | 2007-03-15 | Graham Holt | System for consolidating and securing access to all out-of-band interfaces in computer, telecommunication, and networking equipment, regardless of the interface type |
US7852873B2 (en) | 2006-03-01 | 2010-12-14 | Lantronix, Inc. | Universal computer management interface |
US7890612B2 (en) * | 2006-05-08 | 2011-02-15 | Electro Guard Corp. | Method and apparatus for regulating data flow between a communications device and a network |
US20080295173A1 (en) * | 2007-05-21 | 2008-11-27 | Tsvetomir Iliev Tsvetanov | Pattern-based network defense mechanism |
US20100268818A1 (en) * | 2007-12-20 | 2010-10-21 | Richmond Alfred R | Systems and methods for forensic analysis of network behavior |
US20090260074A1 (en) * | 2008-04-10 | 2009-10-15 | Qlayer Nv | System and method for application level access to virtual server environments |
US20090297043A1 (en) * | 2008-05-28 | 2009-12-03 | International Business Machines Corporation | Pattern scanner and editor for security audit systems |
WO2009147631A1 (en) * | 2008-06-05 | 2009-12-10 | Neocleus Israel Ltd | Secure multi-purpose computing client |
US8955107B2 (en) * | 2008-09-12 | 2015-02-10 | Juniper Networks, Inc. | Hierarchical application of security services within a computer network |
US8712596B2 (en) | 2010-05-20 | 2014-04-29 | Accenture Global Services Limited | Malicious attack detection and analysis |
US9047441B2 (en) * | 2011-05-24 | 2015-06-02 | Palo Alto Networks, Inc. | Malware analysis system |
-
2012
- 2012-11-20 EP EP12856500.9A patent/EP2788913B1/en active Active
- 2012-11-20 WO PCT/US2012/066072 patent/WO2013085717A1/en active Application Filing
- 2012-11-20 CN CN201280059885.1A patent/CN103975331B/zh active Active
- 2012-11-20 US US14/363,197 patent/US9661016B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
EP2788913B1 (en) | 2019-10-23 |
WO2013085717A1 (en) | 2013-06-13 |
CN103975331A (zh) | 2014-08-06 |
US20140366139A1 (en) | 2014-12-11 |
EP2788913A1 (en) | 2014-10-15 |
US9661016B2 (en) | 2017-05-23 |
EP2788913A4 (en) | 2015-07-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103975331B (zh) | 并入了被管理基础设施设备的安全的数据中心基础设施管理系统 | |
US11783035B2 (en) | Multi-representational learning models for static analysis of source code | |
US11799900B2 (en) | Detecting and mitigating golden ticket attacks within a domain | |
US9537879B2 (en) | Cyber security monitoring system and method for data center components | |
US11615184B2 (en) | Building multi-representational learning models for static analysis of source code | |
CN103491060B (zh) | 一种防御Web攻击的方法、装置、及系统 | |
US20220239630A1 (en) | Graphical representation of security threats in a network | |
CN106716953A (zh) | 控制系统中的网络安全风险的动态量化 | |
CN104509034A (zh) | 模式合并以识别恶意行为 | |
Valdes et al. | Intrusion monitoring in process control systems | |
US20160373447A1 (en) | Unauthorized access detecting system and unauthorized access detecting method | |
US20220210202A1 (en) | Advanced cybersecurity threat mitigation using software supply chain analysis | |
EP1971102B1 (en) | Method and system for monitoring communication devices to detect malicious software | |
US10073980B1 (en) | System for assuring security of sensitive data on a host | |
CN108369542A (zh) | 用于检测横向运动和数据泄漏的系统和方法 | |
US20230362142A1 (en) | Network action classification and analysis using widely distributed and selectively attributed sensor nodes and cloud-based processing | |
US20230319019A1 (en) | Detecting and mitigating forged authentication attacks using an advanced cyber decision platform | |
KR102156379B1 (ko) | 정보수집 프로세스를 통한 에이전트리스 방식 취약점 진단시스템 및 그 방법 | |
CN108345795A (zh) | 用于检测和分类恶意软件的系统和方法 | |
CN110099041A (zh) | 一种物联网防护方法及设备、系统 | |
KR100772177B1 (ko) | 보안 기능 시험을 위한 침입 탐지 이벤트 생성 방법 및장치 | |
Mishima et al. | Secure Campus Network System with Automatic Isolation of High Security Risk Device | |
CA3122328A1 (en) | A system for, and a method of creating cybersecurity situational awareness, threat detection and risk detection within the internet-of-things space | |
Whyte | Using a systems-theoretic approach to analyze cyber attacks on cyber-physical systems | |
JP7150425B2 (ja) | 通信システム、制御装置、通信制御方法、及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: alabama Applicant after: AVOCENT HUNTSVILLE Corp. Address before: alabama Applicant before: Avocent |
|
COR | Change of bibliographic data | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: Delaware Patentee after: Weidi Information Technology System Co.,Ltd. Address before: Delaware Patentee before: Avocent Corp. |
|
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20190417 Address after: Delaware Patentee after: AVOCENT Corp. Address before: alabama Patentee before: AVOCENT HUNTSVILLE Corp. |