CN105210042B - 互联网协议威胁防护 - Google Patents
互联网协议威胁防护 Download PDFInfo
- Publication number
- CN105210042B CN105210042B CN201480027018.9A CN201480027018A CN105210042B CN 105210042 B CN105210042 B CN 105210042B CN 201480027018 A CN201480027018 A CN 201480027018A CN 105210042 B CN105210042 B CN 105210042B
- Authority
- CN
- China
- Prior art keywords
- risk
- address
- value
- characteristic
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 claims description 45
- 238000003860 storage Methods 0.000 claims description 32
- RUTXIHLAWFEWGM-UHFFFAOYSA-H iron(3+) sulfate Chemical compound [Fe+3].[Fe+3].[O-]S([O-])(=O)=O.[O-]S([O-])(=O)=O.[O-]S([O-])(=O)=O RUTXIHLAWFEWGM-UHFFFAOYSA-H 0.000 claims description 19
- 229910000360 iron(III) sulfate Inorganic materials 0.000 claims description 19
- 230000015654 memory Effects 0.000 claims description 15
- 238000004891 communication Methods 0.000 claims description 10
- 230000009471 action Effects 0.000 claims description 8
- 230000006870 function Effects 0.000 claims description 4
- 238000012545 processing Methods 0.000 description 5
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 5
- 230000000875 corresponding effect Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000009466 transformation Effects 0.000 description 4
- 238000013459 approach Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000001914 filtration Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000004044 response Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 238000006116 polymerization reaction Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000012502 risk assessment Methods 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013479 data entry Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000002431 foraging effect Effects 0.000 description 1
- 125000000524 functional group Chemical group 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 230000002045 lasting effect Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006386 neutralization reaction Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000009897 systematic effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2119—Authenticating web pages, e.g. with suspicious links
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Business, Economics & Management (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (13)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201361782669P | 2013-03-14 | 2013-03-14 | |
US61/782,669 | 2013-03-14 | ||
PCT/US2014/025741 WO2014160062A1 (en) | 2013-03-14 | 2014-03-13 | Internet protocol threat prevention |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105210042A CN105210042A (zh) | 2015-12-30 |
CN105210042B true CN105210042B (zh) | 2019-07-12 |
Family
ID=51535131
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201480027018.9A Active CN105210042B (zh) | 2013-03-14 | 2014-03-13 | 互联网协议威胁防护 |
Country Status (8)
Country | Link |
---|---|
US (2) | US9342691B2 (zh) |
EP (1) | EP2972867A4 (zh) |
CN (1) | CN105210042B (zh) |
AU (1) | AU2014244137B2 (zh) |
BR (1) | BR112015023341A2 (zh) |
CA (1) | CA2909161A1 (zh) |
TW (1) | TW201445962A (zh) |
WO (1) | WO2014160062A1 (zh) |
Families Citing this family (59)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10356106B2 (en) | 2011-07-26 | 2019-07-16 | Palo Alto Networks (Israel Analytics) Ltd. | Detecting anomaly action within a computer network |
EP2946332B1 (en) | 2013-01-16 | 2018-06-13 | Palo Alto Networks (Israel Analytics) Ltd | Automated forensics of computer systems using behavioral intelligence |
US9942250B2 (en) * | 2014-08-06 | 2018-04-10 | Norse Networks, Inc. | Network appliance for dynamic protection from risky network activities |
US9264370B1 (en) | 2015-02-10 | 2016-02-16 | Centripetal Networks, Inc. | Correlating packets in communications networks |
US9866576B2 (en) | 2015-04-17 | 2018-01-09 | Centripetal Networks, Inc. | Rule-based network-threat detection |
US9736019B2 (en) * | 2015-05-14 | 2017-08-15 | Eero Inc. | Methods for dynamic router configuration in a mesh network |
US10075461B2 (en) | 2015-05-31 | 2018-09-11 | Palo Alto Networks (Israel Analytics) Ltd. | Detection of anomalous administrative actions |
US9923914B2 (en) | 2015-06-30 | 2018-03-20 | Norse Networks, Inc. | Systems and platforms for intelligently monitoring risky network activities |
WO2017048250A1 (en) * | 2015-09-16 | 2017-03-23 | Hewlett Packard Enterprise Development Lp | Confidence levels in reputable entities |
US11729144B2 (en) | 2016-01-04 | 2023-08-15 | Centripetal Networks, Llc | Efficient packet capture for cyber threat analysis |
US10715544B2 (en) * | 2016-02-05 | 2020-07-14 | Sony Corporation | Method, apparatus and system for calculating a risk score of a user request by a user on a web application |
US10320750B1 (en) | 2016-03-30 | 2019-06-11 | Amazon Technologies, Inc. | Source specific network scanning in a distributed environment |
US10333962B1 (en) | 2016-03-30 | 2019-06-25 | Amazon Technologies, Inc. | Correlating threat information across sources of distributed computing systems |
US10178119B1 (en) | 2016-03-30 | 2019-01-08 | Amazon Technologies, Inc. | Correlating threat information across multiple levels of distributed computing systems |
US10148675B1 (en) | 2016-03-30 | 2018-12-04 | Amazon Technologies, Inc. | Block-level forensics for distributed computing systems |
US10142290B1 (en) * | 2016-03-30 | 2018-11-27 | Amazon Technologies, Inc. | Host-based firewall for distributed computer systems |
US10079842B1 (en) | 2016-03-30 | 2018-09-18 | Amazon Technologies, Inc. | Transparent volume based intrusion detection |
US20180063170A1 (en) * | 2016-04-05 | 2018-03-01 | Staffan Truvé | Network security scoring |
US10366229B2 (en) | 2016-06-20 | 2019-07-30 | Jask Labs Inc. | Method for detecting a cyber attack |
US10425436B2 (en) | 2016-09-04 | 2019-09-24 | Palo Alto Networks (Israel Analytics) Ltd. | Identifying bulletproof autonomous systems |
US10574681B2 (en) | 2016-09-04 | 2020-02-25 | Palo Alto Networks (Israel Analytics) Ltd. | Detection of known and unknown malicious domains |
US10686829B2 (en) | 2016-09-05 | 2020-06-16 | Palo Alto Networks (Israel Analytics) Ltd. | Identifying changes in use of user credentials |
US10484429B1 (en) * | 2016-10-26 | 2019-11-19 | Amazon Technologies, Inc. | Automated sensitive information and data storage compliance verification |
TWI617939B (zh) | 2016-12-01 | 2018-03-11 | 財團法人資訊工業策進會 | 攻擊節點偵測裝置、方法及其電腦程式產品 |
TWI610196B (zh) | 2016-12-05 | 2018-01-01 | 財團法人資訊工業策進會 | 網路攻擊模式之判斷裝置、判斷方法及其電腦程式產品 |
US10467632B1 (en) | 2016-12-13 | 2019-11-05 | Massachusetts Mutual Life Insurance Company | Systems and methods for a multi-tiered fraud alert review |
KR101781450B1 (ko) * | 2017-01-03 | 2017-09-25 | 한국인터넷진흥원 | 사이버 공격에 대한 위험도 산출 방법 및 장치 |
US10595215B2 (en) * | 2017-05-08 | 2020-03-17 | Fortinet, Inc. | Reducing redundant operations performed by members of a cooperative security fabric |
CN108881123A (zh) * | 2017-05-12 | 2018-11-23 | 上海赛特斯信息科技股份有限公司 | 恶意流量识别系统及方法 |
US10778645B2 (en) * | 2017-06-27 | 2020-09-15 | Microsoft Technology Licensing, Llc | Firewall configuration manager |
CN107528859B (zh) * | 2017-09-29 | 2020-07-10 | 北京神州绿盟信息安全科技股份有限公司 | 一种DDoS攻击的防御方法及设备 |
US10536427B2 (en) * | 2017-12-22 | 2020-01-14 | 6Sense Insights, Inc. | De-anonymizing an anonymous IP address by aggregating events into mappings where each of the mappings associates an IP address shared by the events with an account |
JP6977625B2 (ja) * | 2018-03-07 | 2021-12-08 | 富士通株式会社 | 評価プログラム、評価方法および評価装置 |
US10999304B2 (en) | 2018-04-11 | 2021-05-04 | Palo Alto Networks (Israel Analytics) Ltd. | Bind shell attack detection |
US11184377B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Malicious port scan detection using source profiles |
US11316872B2 (en) | 2019-01-30 | 2022-04-26 | Palo Alto Networks (Israel Analytics) Ltd. | Malicious port scan detection using port profiles |
US11184376B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Port scan detection using destination profiles |
US11184378B2 (en) | 2019-01-30 | 2021-11-23 | Palo Alto Networks (Israel Analytics) Ltd. | Scanner probe detection |
US11070569B2 (en) | 2019-01-30 | 2021-07-20 | Palo Alto Networks (Israel Analytics) Ltd. | Detecting outlier pairs of scanned ports |
CN110011977B (zh) * | 2019-03-07 | 2021-07-27 | 北京华安普特网络科技有限公司 | 一种网站安全防御方法 |
KR20200129776A (ko) * | 2019-05-10 | 2020-11-18 | 삼성전자주식회사 | 재전송 공격에 대한 방어책을 포함하는 메모리 시스템의 구동 방법 및 이를 수행하는 메모리 시스템 |
US11356472B1 (en) * | 2019-12-16 | 2022-06-07 | Wells Fargo Bank, N.A. | Systems and methods for using machine learning for geographic analysis of access attempts |
US11012492B1 (en) | 2019-12-26 | 2021-05-18 | Palo Alto Networks (Israel Analytics) Ltd. | Human activity detection in computing device transmissions |
US11606385B2 (en) | 2020-02-13 | 2023-03-14 | Palo Alto Networks (Israel Analytics) Ltd. | Behavioral DNS tunneling identification |
US11811820B2 (en) | 2020-02-24 | 2023-11-07 | Palo Alto Networks (Israel Analytics) Ltd. | Malicious C and C channel to fixed IP detection |
US11425162B2 (en) | 2020-07-01 | 2022-08-23 | Palo Alto Networks (Israel Analytics) Ltd. | Detection of malicious C2 channels abusing social media sites |
US11316823B2 (en) | 2020-08-27 | 2022-04-26 | Centripetal Networks, Inc. | Methods and systems for efficient virtualization of inline transparent computer networking devices |
US11368473B2 (en) | 2020-09-21 | 2022-06-21 | Microsoft Technology Licensing, Llc | Interface threat assessment in multi-cluster system |
US11509680B2 (en) | 2020-09-30 | 2022-11-22 | Palo Alto Networks (Israel Analytics) Ltd. | Classification of cyber-alerts into security incidents |
US11362996B2 (en) | 2020-10-27 | 2022-06-14 | Centripetal Networks, Inc. | Methods and systems for efficient adaptive logging of cyber threat incidents |
US20220159029A1 (en) * | 2020-11-13 | 2022-05-19 | Cyberark Software Ltd. | Detection of security risks based on secretless connection data |
US11394686B1 (en) * | 2021-02-25 | 2022-07-19 | Nvidia Corporation | Dynamic network address translation using prediction |
US11831688B2 (en) | 2021-06-18 | 2023-11-28 | Capital One Services, Llc | Systems and methods for network security |
WO2023079319A1 (en) * | 2021-11-05 | 2023-05-11 | Citrix Systems, Inc. | System and method for deriving network address spaces affected by security threats to apply mitigations |
US11799880B2 (en) | 2022-01-10 | 2023-10-24 | Palo Alto Networks (Israel Analytics) Ltd. | Network adaptive alert prioritization system |
US20230224275A1 (en) * | 2022-01-12 | 2023-07-13 | Bank Of America Corporation | Preemptive threat detection for an information system |
US11880496B2 (en) * | 2022-04-06 | 2024-01-23 | Whitestar Communications, Inc. | Mitigating against a persistent consistent threat in a network device based on reducing temporal surface area |
US11968222B2 (en) | 2022-07-05 | 2024-04-23 | Palo Alto Networks (Israel Analytics) Ltd. | Supply chain attack detection |
US11750643B1 (en) * | 2022-10-11 | 2023-09-05 | Second Sight Data Discovery, Inc. | Apparatus and method for determining a recommended cyber-attack risk remediation action |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1423782A (zh) * | 2000-02-14 | 2003-06-11 | 奥弗图尔服务公司 | 确定网络上交互有效性的系统和方法 |
CN1761208A (zh) * | 2005-11-17 | 2006-04-19 | 郭世泽 | 网络信息系统的安全性及生存性评估的系统和方法 |
CN101005510A (zh) * | 2007-01-19 | 2007-07-25 | 南京大学 | 一种综合漏洞的网络实时风险评估方法 |
CN102281163A (zh) * | 2011-09-19 | 2011-12-14 | 南京大学 | 一种网络入侵检测报警的方法 |
KR20120090104A (ko) * | 2010-12-23 | 2012-08-17 | 한국인터넷진흥원 | 악성코드 경유-유포지 평가 장치 |
Family Cites Families (27)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020099691A1 (en) | 1998-06-24 | 2002-07-25 | Michael Dean Lore | Method and apparatus for aggregation of data in a database management system |
US6754662B1 (en) | 2000-08-01 | 2004-06-22 | Nortel Networks Limited | Method and apparatus for fast and consistent packet classification via efficient hash-caching |
US7168093B2 (en) * | 2001-01-25 | 2007-01-23 | Solutionary, Inc. | Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures |
US7134012B2 (en) * | 2001-08-15 | 2006-11-07 | International Business Machines Corporation | Methods, systems and computer program products for detecting a spoofed source address in IP datagrams |
US20030163445A1 (en) | 2002-02-26 | 2003-08-28 | Oza Alpesh B. | Method and apparatus for high-speed address learning in sorted address tables |
US6996562B2 (en) | 2002-07-29 | 2006-02-07 | Microsoft Corporation | Method and data structure for performing regular expression searches in a fixed length word language |
US20040128355A1 (en) | 2002-12-25 | 2004-07-01 | Kuo-Jen Chao | Community-based message classification and self-amending system for a messaging system |
US7325059B2 (en) | 2003-05-15 | 2008-01-29 | Cisco Technology, Inc. | Bounded index extensible hash-based IPv6 address lookup method |
US7602785B2 (en) | 2004-02-09 | 2009-10-13 | Washington University | Method and system for performing longest prefix matching for network address lookup using bloom filters |
US7369557B1 (en) | 2004-06-03 | 2008-05-06 | Cisco Technology, Inc. | Distribution of flows in a flow-based multi-processor system |
US20080010678A1 (en) * | 2004-09-17 | 2008-01-10 | Jeff Burdette | Authentication Proxy |
US7657756B2 (en) * | 2004-10-08 | 2010-02-02 | International Business Machines Corporaiton | Secure memory caching structures for data, integrity and version values |
US7590733B2 (en) | 2005-09-14 | 2009-09-15 | Infoexpress, Inc. | Dynamic address assignment for access control on DHCP networks |
US8739278B2 (en) * | 2006-04-28 | 2014-05-27 | Oracle International Corporation | Techniques for fraud monitoring and detection using application fingerprinting |
US7996348B2 (en) | 2006-12-08 | 2011-08-09 | Pandya Ashish A | 100GBPS security and search architecture using programmable intelligent search memory (PRISM) that comprises one or more bit interval counters |
GB2458094A (en) | 2007-01-09 | 2009-09-09 | Surfcontrol On Demand Ltd | URL interception and categorization in firewalls |
US7904642B1 (en) | 2007-02-08 | 2011-03-08 | Netlogic Microsystems, Inc. | Method for combining and storing access control lists |
US8272044B2 (en) | 2007-05-25 | 2012-09-18 | New Jersey Institute Of Technology | Method and system to mitigate low rate denial of service (DoS) attacks |
US7779143B2 (en) | 2007-06-28 | 2010-08-17 | Alcatel-Lucent Usa Inc. | Scalable methods for detecting significant traffic patterns in a data network |
US7849146B2 (en) | 2008-02-21 | 2010-12-07 | Yahoo! Inc. | Identifying IP addresses for spammers |
US8589503B2 (en) | 2008-04-04 | 2013-11-19 | Mcafee, Inc. | Prioritizing network traffic |
US8018940B2 (en) | 2008-08-13 | 2011-09-13 | Alcatel Lucent | Network address lookup based on bloom filters |
WO2010022767A1 (en) | 2008-08-26 | 2010-03-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Packet forwarding in a network |
US8438386B2 (en) * | 2009-04-21 | 2013-05-07 | Webroot Inc. | System and method for developing a risk profile for an internet service |
US8516595B2 (en) * | 2010-12-28 | 2013-08-20 | Caixa d'Estalvis I Pensions de Barcelona “La Caixa” | Method and system for estimating the reliability of blacklists of botnet-infected computers |
US8726376B2 (en) * | 2011-03-11 | 2014-05-13 | Openet Telecom Ltd. | Methods, systems and devices for the detection and prevention of malware within a network |
US8782157B1 (en) * | 2013-01-11 | 2014-07-15 | Robert Hansen | Distributed comment moderation |
-
2014
- 2014-03-13 AU AU2014244137A patent/AU2014244137B2/en active Active
- 2014-03-13 US US14/208,998 patent/US9342691B2/en active Active
- 2014-03-13 EP EP14775712.4A patent/EP2972867A4/en not_active Withdrawn
- 2014-03-13 CN CN201480027018.9A patent/CN105210042B/zh active Active
- 2014-03-13 WO PCT/US2014/025741 patent/WO2014160062A1/en active Application Filing
- 2014-03-13 BR BR112015023341A patent/BR112015023341A2/pt not_active Application Discontinuation
- 2014-03-13 CA CA2909161A patent/CA2909161A1/en not_active Abandoned
- 2014-03-14 TW TW103109605A patent/TW201445962A/zh unknown
-
2016
- 2016-05-16 US US15/155,853 patent/US20160337315A1/en not_active Abandoned
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1423782A (zh) * | 2000-02-14 | 2003-06-11 | 奥弗图尔服务公司 | 确定网络上交互有效性的系统和方法 |
CN1761208A (zh) * | 2005-11-17 | 2006-04-19 | 郭世泽 | 网络信息系统的安全性及生存性评估的系统和方法 |
CN101005510A (zh) * | 2007-01-19 | 2007-07-25 | 南京大学 | 一种综合漏洞的网络实时风险评估方法 |
KR20120090104A (ko) * | 2010-12-23 | 2012-08-17 | 한국인터넷진흥원 | 악성코드 경유-유포지 평가 장치 |
CN102281163A (zh) * | 2011-09-19 | 2011-12-14 | 南京大学 | 一种网络入侵检测报警的方法 |
Also Published As
Publication number | Publication date |
---|---|
US20160337315A1 (en) | 2016-11-17 |
CA2909161A1 (en) | 2014-10-02 |
US9342691B2 (en) | 2016-05-17 |
AU2014244137A1 (en) | 2015-11-05 |
CN105210042A (zh) | 2015-12-30 |
US20140283085A1 (en) | 2014-09-18 |
EP2972867A1 (en) | 2016-01-20 |
WO2014160062A1 (en) | 2014-10-02 |
EP2972867A4 (en) | 2017-03-01 |
TW201445962A (zh) | 2014-12-01 |
BR112015023341A2 (pt) | 2017-07-18 |
AU2014244137B2 (en) | 2018-12-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105210042B (zh) | 互联网协议威胁防护 | |
US11637867B2 (en) | Cyber security sharing and identification system | |
US11068605B2 (en) | Systems and methods for controlling data exposure using artificial-intelligence-based periodic modeling | |
Bossetta | The weaponization of social media: Spear phishing and cyberattacks on democracy | |
Kremling et al. | Cyberspace, cybersecurity, and cybercrime | |
Sommer et al. | Reducing systemic cybersecurity risk | |
Tonge et al. | Cyber security: challenges for society-literature review | |
Kim et al. | Cyber-attack scoring model based on the offensive cybersecurity framework | |
Ussath et al. | Identifying suspicious user behavior with neural networks | |
Alshaibi et al. | The comparison of cybersecurity datasets | |
Stytz et al. | Toward attaining cyber dominance | |
Pogrebna et al. | Navigating New Cyber Risks | |
Gómez Hernández et al. | Crypto-Ransomware: A Revision of the State of the Art, Advances and Challenges | |
Kotak et al. | Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions | |
Mohamed | State-of-the-Art in Chinese APT Attack and Using Threat Intelligence for Detection. A Survey | |
Kim et al. | Secure model against APT in m-connected SCADA network | |
Van Haaster et al. | Cyber guerilla | |
Zamir | Cybersecurity and social media | |
Vaseashta et al. | Cyber security and resiliency policy framework | |
Kshetri | The Global Rise of Online Devices, Cyber Crime and Cyber Defense: Enhancing Ethical Actions, Counter Measures, Cyber Strategy, and Approaches | |
Alghenaim et al. | Phishing attack types and mitigation: A survey | |
Blau et al. | Cybersecurity: The Insights You Need from Harvard Business Review | |
Atta Ul Haq | Cyber crime and their restriction through laws and techniques for protecting security issues and privacy threats | |
Ferrag et al. | Hybrid Threats, Cyberterrorism and Cyberwarfare | |
Lee et al. | Cyber warfare: weapon of mass disruption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder |
Address after: Maryland, USA Patentee after: smart block Co.,Ltd. Address before: Maryland, USA Patentee before: bandura network Co.,Ltd. Address after: Maryland, USA Patentee after: bandura network Co.,Ltd. Address before: Maryland, USA Patentee before: bandura systems Ltd. Address after: Maryland, USA Patentee after: bandura systems Ltd. Address before: Maryland, USA Patentee before: Bandura, LLC |
|
CP01 | Change in the name or title of a patent holder | ||
CP03 | Change of name, title or address |
Address after: Virginia Patentee after: SRT Co.,Ltd. Address before: Maryland, USA Patentee before: smart block Co.,Ltd. |
|
CP03 | Change of name, title or address |