US7073198B1
(en)
|
1999-08-26 |
2006-07-04 |
Ncircle Network Security, Inc. |
Method and system for detecting a vulnerability in a network
|
US6957348B1
(en)
|
2000-01-10 |
2005-10-18 |
Ncircle Network Security, Inc. |
Interoperability of vulnerability and intrusion detection systems
|
US20040073617A1
(en)
|
2000-06-19 |
2004-04-15 |
Milliken Walter Clark |
Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
|
US7181769B1
(en)
|
2000-08-25 |
2007-02-20 |
Ncircle Network Security, Inc. |
Network security system having a device profiler communicatively coupled to a traffic monitor
|
US9280667B1
(en)
|
2000-08-25 |
2016-03-08 |
Tripwire, Inc. |
Persistent host determination
|
US20020032793A1
(en)
*
|
2000-09-08 |
2002-03-14 |
The Regents Of The University Of Michigan |
Method and system for reconstructing a path taken by undesirable network traffic through a computer network from a source of the traffic
|
US6988148B1
(en)
*
|
2001-01-19 |
2006-01-17 |
Cisco Technology, Inc. |
IP pool management utilizing an IP pool MIB
|
GB2372673B
(en)
*
|
2001-02-27 |
2003-05-28 |
3Com Corp |
Apparatus and method for processing data relating to events on a network
|
US7788345B1
(en)
|
2001-06-04 |
2010-08-31 |
Cisco Technology, Inc. |
Resource allocation and reclamation for on-demand address pools
|
US7409714B2
(en)
|
2001-06-13 |
2008-08-05 |
Mcafee, Inc. |
Virtual intrusion detection system and method of using same
|
US20040187032A1
(en)
*
|
2001-08-07 |
2004-09-23 |
Christoph Gels |
Method, data carrier, computer system and computer progamme for the identification and defence of attacks in server of network service providers and operators
|
US7062553B2
(en)
*
|
2001-12-04 |
2006-06-13 |
Trend Micro, Inc. |
Virus epidemic damage control system and method for network environment
|
US20030105973A1
(en)
*
|
2001-12-04 |
2003-06-05 |
Trend Micro Incorporated |
Virus epidemic outbreak command system and method using early warning monitors in a network environment
|
EP1330095B1
(de)
*
|
2002-01-18 |
2006-04-05 |
Stonesoft Corporation |
Ueberwachung des Datenflusses zur Verbesserung des Netzwerksicherheitsschutzes
|
US7225343B1
(en)
*
|
2002-01-25 |
2007-05-29 |
The Trustees Of Columbia University In The City Of New York |
System and methods for adaptive model generation for detecting intrusions in computer systems
|
US7650634B2
(en)
|
2002-02-08 |
2010-01-19 |
Juniper Networks, Inc. |
Intelligent integrated network security device
|
US7734752B2
(en)
*
|
2002-02-08 |
2010-06-08 |
Juniper Networks, Inc. |
Intelligent integrated network security device for high-availability applications
|
US8370936B2
(en)
*
|
2002-02-08 |
2013-02-05 |
Juniper Networks, Inc. |
Multi-method gateway-based network security systems and methods
|
US8209756B1
(en)
|
2002-02-08 |
2012-06-26 |
Juniper Networks, Inc. |
Compound attack detection in a computer network
|
US6941467B2
(en)
*
|
2002-03-08 |
2005-09-06 |
Ciphertrust, Inc. |
Systems and methods for adaptive message interrogation through multiple queues
|
US7124438B2
(en)
|
2002-03-08 |
2006-10-17 |
Ciphertrust, Inc. |
Systems and methods for anomaly detection in patterns of monitored communications
|
US7903549B2
(en)
|
2002-03-08 |
2011-03-08 |
Secure Computing Corporation |
Content-based policy compliance systems and methods
|
US8561167B2
(en)
|
2002-03-08 |
2013-10-15 |
Mcafee, Inc. |
Web reputation scoring
|
US20060015942A1
(en)
|
2002-03-08 |
2006-01-19 |
Ciphertrust, Inc. |
Systems and methods for classification of messaging entities
|
US8132250B2
(en)
|
2002-03-08 |
2012-03-06 |
Mcafee, Inc. |
Message profiling systems and methods
|
US7694128B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for secure communication delivery
|
US7693947B2
(en)
|
2002-03-08 |
2010-04-06 |
Mcafee, Inc. |
Systems and methods for graphically displaying messaging traffic
|
US7870203B2
(en)
|
2002-03-08 |
2011-01-11 |
Mcafee, Inc. |
Methods and systems for exposing messaging reputation to an end user
|
US8578480B2
(en)
|
2002-03-08 |
2013-11-05 |
Mcafee, Inc. |
Systems and methods for identifying potentially malicious messages
|
US7096498B2
(en)
|
2002-03-08 |
2006-08-22 |
Cipher Trust, Inc. |
Systems and methods for message threat management
|
US7042852B2
(en)
*
|
2002-05-20 |
2006-05-09 |
Airdefense, Inc. |
System and method for wireless LAN dynamic channel change with honeypot trap
|
US7058796B2
(en)
*
|
2002-05-20 |
2006-06-06 |
Airdefense, Inc. |
Method and system for actively defending a wireless LAN against attacks
|
ES2558302T3
(es)
*
|
2002-05-20 |
2016-02-03 |
Airdefense, Inc. |
Sistema para manejar la actividad de una red inalámbrica
|
US7322044B2
(en)
*
|
2002-06-03 |
2008-01-22 |
Airdefense, Inc. |
Systems and methods for automated network policy exception detection and correction
|
GB2391419A
(en)
|
2002-06-07 |
2004-02-04 |
Hewlett Packard Co |
Restricting the propagation of a virus within a network
|
GB2401280B
(en)
|
2003-04-29 |
2006-02-08 |
Hewlett Packard Development Co |
Propagation of viruses through an information technology network
|
GB2394382A
(en)
|
2002-10-19 |
2004-04-21 |
Hewlett Packard Co |
Monitoring the propagation of viruses through an Information Technology network
|
TWI244297B
(en)
|
2002-06-12 |
2005-11-21 |
Thomson Licensing Sa |
Apparatus and method adapted to communicate via a network
|
US7420929B1
(en)
|
2002-07-02 |
2008-09-02 |
Juniper Networks, Inc. |
Adaptive network flow analysis
|
US7752665B1
(en)
*
|
2002-07-12 |
2010-07-06 |
TCS Commercial, Inc. |
Detecting probes and scans over high-bandwidth, long-term, incomplete network traffic information using limited memory
|
US7752324B2
(en)
|
2002-07-12 |
2010-07-06 |
Penn State Research Foundation |
Real-time packet traceback and associated packet marking strategies
|
US7519990B1
(en)
*
|
2002-07-19 |
2009-04-14 |
Fortinet, Inc. |
Managing network traffic flow
|
JP3996010B2
(ja)
*
|
2002-08-01 |
2007-10-24 |
株式会社日立製作所 |
ストレージネットワークシステム、管理装置、管理方法及びプログラム
|
US7251215B1
(en)
*
|
2002-08-26 |
2007-07-31 |
Juniper Networks, Inc. |
Adaptive network router
|
US7313100B1
(en)
|
2002-08-26 |
2007-12-25 |
Juniper Networks, Inc. |
Network device having accounting service card
|
JP3773194B2
(ja)
*
|
2002-09-30 |
2006-05-10 |
インターナショナル・ビジネス・マシーンズ・コーポレーション |
通信監視システム及びその方法、情報処理方法並びにプログラム
|
US8117639B2
(en)
|
2002-10-10 |
2012-02-14 |
Rocksteady Technologies, Llc |
System and method for providing access control
|
US8479057B2
(en)
*
|
2002-11-04 |
2013-07-02 |
Riverbed Technology, Inc. |
Aggregator for connection based anomaly detection
|
US8191136B2
(en)
*
|
2002-11-04 |
2012-05-29 |
Riverbed Technology, Inc. |
Connection based denial of service detection
|
US8504879B2
(en)
*
|
2002-11-04 |
2013-08-06 |
Riverbed Technology, Inc. |
Connection based anomaly detection
|
US7454499B2
(en)
*
|
2002-11-07 |
2008-11-18 |
Tippingpoint Technologies, Inc. |
Active network defense system and method
|
US7359930B2
(en)
*
|
2002-11-21 |
2008-04-15 |
Arbor Networks |
System and method for managing computer networks
|
US7500266B1
(en)
*
|
2002-12-03 |
2009-03-03 |
Bbn Technologies Corp. |
Systems and methods for detecting network intrusions
|
US8327442B2
(en)
|
2002-12-24 |
2012-12-04 |
Herz Frederick S M |
System and method for a distributed application and network security system (SDI-SCAM)
|
US9503470B2
(en)
|
2002-12-24 |
2016-11-22 |
Fred Herz Patents, LLC |
Distributed agent based model for security monitoring and response
|
US20040193943A1
(en)
*
|
2003-02-13 |
2004-09-30 |
Robert Angelino |
Multiparameter network fault detection system using probabilistic and aggregation analysis
|
US7895649B1
(en)
|
2003-04-04 |
2011-02-22 |
Raytheon Company |
Dynamic rule generation for an enterprise intrusion detection system
|
US7293238B1
(en)
|
2003-04-04 |
2007-11-06 |
Raytheon Company |
Graphical user interface for an enterprise intrusion detection system
|
US7356585B1
(en)
*
|
2003-04-04 |
2008-04-08 |
Raytheon Company |
Vertically extensible intrusion detection system and method
|
US8027841B2
(en)
*
|
2003-04-09 |
2011-09-27 |
Holloway J Michael |
Centralized server obtaining security intelligence knowledge by analyzing VoIP bit-stream
|
US7359676B2
(en)
*
|
2003-04-21 |
2008-04-15 |
Airdefense, Inc. |
Systems and methods for adaptively scanning for wireless communications
|
US7324804B2
(en)
*
|
2003-04-21 |
2008-01-29 |
Airdefense, Inc. |
Systems and methods for dynamic sensor discovery and selection
|
US7522908B2
(en)
*
|
2003-04-21 |
2009-04-21 |
Airdefense, Inc. |
Systems and methods for wireless network site survey
|
GB2401281B
(en)
|
2003-04-29 |
2006-02-08 |
Hewlett Packard Development Co |
Propagation of viruses through an information technology network
|
US7796515B2
(en)
|
2003-04-29 |
2010-09-14 |
Hewlett-Packard Development Company, L.P. |
Propagation of viruses through an information technology network
|
US7308716B2
(en)
*
|
2003-05-20 |
2007-12-11 |
International Business Machines Corporation |
Applying blocking measures progressively to malicious network traffic
|
US7710867B1
(en)
*
|
2003-05-23 |
2010-05-04 |
F5 Networks, Inc. |
System and method for managing traffic to a probe
|
US7248353B2
(en)
*
|
2003-05-30 |
2007-07-24 |
Ebara Corporation |
Method and apparatus for inspecting samples, and method for manufacturing devices using method and apparatus for inspecting samples
|
DE60321972D1
(de)
|
2003-08-11 |
2008-08-14 |
Telecom Italia Spa |
Verfahren und system zur erkennung einer unbefugten benutzung eines kommunikationsnetzes
|
US7624438B2
(en)
|
2003-08-20 |
2009-11-24 |
Eric White |
System and method for providing a secure connection between networked computers
|
US7725936B2
(en)
*
|
2003-10-31 |
2010-05-25 |
International Business Machines Corporation |
Host-based network intrusion detection systems
|
JP4516306B2
(ja)
|
2003-11-28 |
2010-08-04 |
株式会社日立製作所 |
ストレージネットワークの性能情報を収集する方法
|
DE60315047D1
(de)
*
|
2003-12-19 |
2007-08-30 |
Sgs Thomson Microelectronics |
Halbleiterschaltung zur Begrenzung von Datenzugang
|
US9032095B1
(en)
|
2004-01-06 |
2015-05-12 |
Juniper Networks, Inc. |
Routing device having multiple logical routers
|
US7895448B1
(en)
*
|
2004-02-18 |
2011-02-22 |
Symantec Corporation |
Risk profiling
|
US7610621B2
(en)
*
|
2004-03-10 |
2009-10-27 |
Eric White |
System and method for behavior-based firewall modeling
|
US20050204022A1
(en)
*
|
2004-03-10 |
2005-09-15 |
Keith Johnston |
System and method for network management XML architectural abstraction
|
US7509625B2
(en)
|
2004-03-10 |
2009-03-24 |
Eric White |
System and method for comprehensive code generation for system management
|
US7665130B2
(en)
|
2004-03-10 |
2010-02-16 |
Eric White |
System and method for double-capture/double-redirect to a different location
|
US7590728B2
(en)
*
|
2004-03-10 |
2009-09-15 |
Eric White |
System and method for detection of aberrant network behavior by clients of a network access gateway
|
US8543710B2
(en)
*
|
2004-03-10 |
2013-09-24 |
Rpx Corporation |
Method and system for controlling network access
|
WO2005093576A1
(en)
*
|
2004-03-28 |
2005-10-06 |
Robert Iakobashvili |
Visualization of packet network performance, analysis and optimization for design
|
US7966658B2
(en)
*
|
2004-04-08 |
2011-06-21 |
The Regents Of The University Of California |
Detecting public network attacks using signatures and fast content analysis
|
US7673049B2
(en)
*
|
2004-04-19 |
2010-03-02 |
Brian Dinello |
Network security system
|
US7225468B2
(en)
*
|
2004-05-07 |
2007-05-29 |
Digital Security Networks, Llc |
Methods and apparatus for computer network security using intrusion detection and prevention
|
CA2733172C
(en)
*
|
2004-05-07 |
2011-10-25 |
Sandvine Incorporated Ulc |
A system and method for detecting sources of abnormal computer network messages
|
US8074277B2
(en)
*
|
2004-06-07 |
2011-12-06 |
Check Point Software Technologies, Inc. |
System and methodology for intrusion detection and prevention
|
GB2415578B
(en)
*
|
2004-06-23 |
2007-07-04 |
Hewlett Packard Development Co |
Restricting virus access to a network
|
US7523504B2
(en)
*
|
2004-08-02 |
2009-04-21 |
Netiq Corporation |
Methods, systems and computer program products for evaluating security of a network environment
|
US7546635B1
(en)
|
2004-08-11 |
2009-06-09 |
Juniper Networks, Inc. |
Stateful firewall protection for control plane traffic within a network device
|
US8176126B2
(en)
|
2004-08-26 |
2012-05-08 |
International Business Machines Corporation |
System, method and program to limit rate of transferring messages from suspected spammers
|
US7706273B2
(en)
*
|
2004-09-30 |
2010-04-27 |
Riverbed Technology, Inc. |
Port tracking on dynamically negotiated ports
|
US20060101516A1
(en)
*
|
2004-10-12 |
2006-05-11 |
Sushanthan Sudaharan |
Honeynet farms as an early warning system for production networks
|
US7600257B2
(en)
*
|
2004-10-13 |
2009-10-06 |
Sonicwall, Inc. |
Method and an apparatus to perform multiple packet payloads analysis
|
US7835361B1
(en)
|
2004-10-13 |
2010-11-16 |
Sonicwall, Inc. |
Method and apparatus for identifying data patterns in a file
|
US8196199B2
(en)
*
|
2004-10-19 |
2012-06-05 |
Airdefense, Inc. |
Personal wireless monitoring agent
|
US8635690B2
(en)
*
|
2004-11-05 |
2014-01-21 |
Mcafee, Inc. |
Reputation based message processing
|
US7607170B2
(en)
|
2004-12-22 |
2009-10-20 |
Radware Ltd. |
Stateful attack protection
|
US7577992B2
(en)
*
|
2005-01-14 |
2009-08-18 |
Microsoft Corporation |
Software security based on control flow integrity
|
US7769851B1
(en)
|
2005-01-27 |
2010-08-03 |
Juniper Networks, Inc. |
Application-layer monitoring and profiling network traffic
|
US7810151B1
(en)
|
2005-01-27 |
2010-10-05 |
Juniper Networks, Inc. |
Automated change detection within a network environment
|
US7937755B1
(en)
*
|
2005-01-27 |
2011-05-03 |
Juniper Networks, Inc. |
Identification of network policy violations
|
US7809826B1
(en)
|
2005-01-27 |
2010-10-05 |
Juniper Networks, Inc. |
Remote aggregation of network traffic profiling data
|
JP4170299B2
(ja)
*
|
2005-01-31 |
2008-10-22 |
独立行政法人 宇宙航空研究開発機構 |
通信状態遷移モニタ方法及びこれを利用した通信状態遷移モニタ装置
|
US7797411B1
(en)
|
2005-02-02 |
2010-09-14 |
Juniper Networks, Inc. |
Detection and prevention of encapsulated network attacks using an intermediate device
|
US7937480B2
(en)
|
2005-06-02 |
2011-05-03 |
Mcafee, Inc. |
Aggregation of reputation data
|
WO2006130840A2
(en)
*
|
2005-06-02 |
2006-12-07 |
Georgia Tech Research Corporation |
System and method for data streaming
|
US7877803B2
(en)
*
|
2005-06-27 |
2011-01-25 |
Hewlett-Packard Development Company, L.P. |
Automated immune response for a computer
|
US8572733B1
(en)
|
2005-07-06 |
2013-10-29 |
Raytheon Company |
System and method for active data collection in a network security system
|
US7746862B1
(en)
|
2005-08-02 |
2010-06-29 |
Juniper Networks, Inc. |
Packet processing in a multiple processor system
|
US7908655B1
(en)
*
|
2005-08-16 |
2011-03-15 |
Sprint Communications Company L.P. |
Connectionless port scan detection on a network
|
US8224761B1
(en)
|
2005-09-01 |
2012-07-17 |
Raytheon Company |
System and method for interactive correlation rule design in a network security system
|
US7352280B1
(en)
|
2005-09-01 |
2008-04-01 |
Raytheon Company |
System and method for intruder tracking using advanced correlation in a network security system
|
US7950058B1
(en)
|
2005-09-01 |
2011-05-24 |
Raytheon Company |
System and method for collaborative information security correlation in low bandwidth environments
|
US8079083B1
(en)
*
|
2005-09-02 |
2011-12-13 |
Symantec Corporation |
Method and system for recording network traffic and predicting potential security events
|
US7716340B2
(en)
*
|
2005-09-30 |
2010-05-11 |
Lycos, Inc. |
Restricting access to a shared resource
|
US20070078589A1
(en)
*
|
2005-10-05 |
2007-04-05 |
Antonio Magnaghi |
Detecting anomalies internal to a network from traffic external to the network
|
US20070076611A1
(en)
*
|
2005-10-05 |
2007-04-05 |
Fujitsu Limited |
Detecting anomalies from acceptable traffic affected by anomalous traffic
|
US8566928B2
(en)
|
2005-10-27 |
2013-10-22 |
Georgia Tech Research Corporation |
Method and system for detecting and responding to attacking networks
|
US7653670B2
(en)
*
|
2005-11-28 |
2010-01-26 |
Nec Laboratories America, Inc. |
Storage-efficient and collision-free hash-based packet processing architecture and method
|
US7849185B1
(en)
|
2006-01-10 |
2010-12-07 |
Raytheon Company |
System and method for attacker attribution in a network security system
|
US7715800B2
(en)
|
2006-01-13 |
2010-05-11 |
Airdefense, Inc. |
Systems and methods for wireless intrusion detection using spectral analysis
|
US7787390B1
(en)
|
2006-01-30 |
2010-08-31 |
Marvell International Ltd. |
Custom automatic remote monitoring for network devices
|
US9392009B2
(en)
|
2006-03-02 |
2016-07-12 |
International Business Machines Corporation |
Operating a network monitoring entity
|
US7971251B2
(en)
*
|
2006-03-17 |
2011-06-28 |
Airdefense, Inc. |
Systems and methods for wireless security using distributed collaboration of wireless clients
|
US20070218874A1
(en)
*
|
2006-03-17 |
2007-09-20 |
Airdefense, Inc. |
Systems and Methods For Wireless Network Forensics
|
US20090021343A1
(en)
*
|
2006-05-10 |
2009-01-22 |
Airdefense, Inc. |
RFID Intrusion Protection System and Methods
|
US8001597B2
(en)
|
2006-05-15 |
2011-08-16 |
Fair Isaac Corporation |
Comprehensive online fraud detection system and method
|
US7697418B2
(en)
*
|
2006-06-12 |
2010-04-13 |
Alcatel Lucent |
Method for estimating the fan-in and/or fan-out of a node
|
US7970013B2
(en)
|
2006-06-16 |
2011-06-28 |
Airdefense, Inc. |
Systems and methods for wireless network content filtering
|
US7873833B2
(en)
*
|
2006-06-29 |
2011-01-18 |
Cisco Technology, Inc. |
Detection of frequent and dispersed invariants
|
EP1879350A1
(de)
*
|
2006-07-10 |
2008-01-16 |
Abb Research Ltd. |
Verteiltes Computersystem mit LAN
|
US20080034424A1
(en)
*
|
2006-07-20 |
2008-02-07 |
Kevin Overcash |
System and method of preventing web applications threats
|
US7934253B2
(en)
*
|
2006-07-20 |
2011-04-26 |
Trustwave Holdings, Inc. |
System and method of securing web applications across an enterprise
|
US20080047009A1
(en)
*
|
2006-07-20 |
2008-02-21 |
Kevin Overcash |
System and method of securing networks against applications threats
|
US8281392B2
(en)
*
|
2006-08-11 |
2012-10-02 |
Airdefense, Inc. |
Methods and systems for wired equivalent privacy and Wi-Fi protected access protection
|
US8145560B2
(en)
|
2006-11-14 |
2012-03-27 |
Fmr Llc |
Detecting fraudulent activity on a network
|
AU2007351385B2
(en)
*
|
2006-11-14 |
2013-05-16 |
Fmr Llc |
Detecting and interdicting fraudulent activity on a network
|
US7856494B2
(en)
|
2006-11-14 |
2010-12-21 |
Fmr Llc |
Detecting and interdicting fraudulent activity on a network
|
US8811156B1
(en)
|
2006-11-14 |
2014-08-19 |
Raytheon Company |
Compressing n-dimensional data
|
US8180873B2
(en)
|
2006-11-14 |
2012-05-15 |
Fmr Llc |
Detecting fraudulent activity
|
US7779156B2
(en)
|
2007-01-24 |
2010-08-17 |
Mcafee, Inc. |
Reputation based load balancing
|
US8763114B2
(en)
|
2007-01-24 |
2014-06-24 |
Mcafee, Inc. |
Detecting image spam
|
US7949716B2
(en)
|
2007-01-24 |
2011-05-24 |
Mcafee, Inc. |
Correlation and analysis of entity attributes
|
US8214497B2
(en)
|
2007-01-24 |
2012-07-03 |
Mcafee, Inc. |
Multi-dimensional reputation scoring
|
US8179798B2
(en)
|
2007-01-24 |
2012-05-15 |
Mcafee, Inc. |
Reputation based connection throttling
|
US8391288B2
(en)
*
|
2007-01-31 |
2013-03-05 |
Hewlett-Packard Development Company, L.P. |
Security system for protecting networks from vulnerability exploits
|
US20080196104A1
(en)
*
|
2007-02-09 |
2008-08-14 |
George Tuvell |
Off-line mms malware scanning system and method
|
US7885976B2
(en)
*
|
2007-02-23 |
2011-02-08 |
International Business Machines Corporation |
Identification, notification, and control of data access quantity and patterns
|
US8863286B1
(en)
|
2007-06-05 |
2014-10-14 |
Sonicwall, Inc. |
Notification for reassembly-free file scanning
|
US7991723B1
(en)
|
2007-07-16 |
2011-08-02 |
Sonicwall, Inc. |
Data pattern analysis using optimized deterministic finite automaton
|
US8291495B1
(en)
*
|
2007-08-08 |
2012-10-16 |
Juniper Networks, Inc. |
Identifying applications for intrusion detection systems
|
US20090070880A1
(en)
*
|
2007-09-11 |
2009-03-12 |
Harris David E |
Methods and apparatus for validating network alarms
|
WO2009039434A2
(en)
*
|
2007-09-21 |
2009-03-26 |
Breach Security, Inc. |
System and method for detecting security defects in applications
|
US8185930B2
(en)
|
2007-11-06 |
2012-05-22 |
Mcafee, Inc. |
Adjusting filter or classification control settings
|
US8112800B1
(en)
|
2007-11-08 |
2012-02-07 |
Juniper Networks, Inc. |
Multi-layered application classification and decoding
|
US8045458B2
(en)
|
2007-11-08 |
2011-10-25 |
Mcafee, Inc. |
Prioritizing network traffic
|
US8180886B2
(en)
*
|
2007-11-15 |
2012-05-15 |
Trustwave Holdings, Inc. |
Method and apparatus for detection of information transmission abnormalities
|
US8160975B2
(en)
|
2008-01-25 |
2012-04-17 |
Mcafee, Inc. |
Granular support vector machine with random granularity
|
US7792922B2
(en)
*
|
2008-03-05 |
2010-09-07 |
Caterpillar Inc. |
Systems and methods for managing health of a client system
|
US8589503B2
(en)
|
2008-04-04 |
2013-11-19 |
Mcafee, Inc. |
Prioritizing network traffic
|
US8339959B1
(en)
|
2008-05-20 |
2012-12-25 |
Juniper Networks, Inc. |
Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane
|
US20090327971A1
(en)
*
|
2008-06-26 |
2009-12-31 |
Microsoft Corporation |
Informational elements in threat models
|
US8856926B2
(en)
|
2008-06-27 |
2014-10-07 |
Juniper Networks, Inc. |
Dynamic policy provisioning within network security devices
|
US10027688B2
(en)
|
2008-08-11 |
2018-07-17 |
Damballa, Inc. |
Method and system for detecting malicious and/or botnet-related domain names
|
US7995496B2
(en)
*
|
2008-08-20 |
2011-08-09 |
The Boeing Company |
Methods and systems for internet protocol (IP) traffic conversation detection and storage
|
US8762515B2
(en)
*
|
2008-08-20 |
2014-06-24 |
The Boeing Company |
Methods and systems for collection, tracking, and display of near real time multicast data
|
US7903566B2
(en)
*
|
2008-08-20 |
2011-03-08 |
The Boeing Company |
Methods and systems for anomaly detection using internet protocol (IP) traffic conversation data
|
US8726382B2
(en)
*
|
2008-08-20 |
2014-05-13 |
The Boeing Company |
Methods and systems for automated detection and tracking of network attacks
|
US8813220B2
(en)
*
|
2008-08-20 |
2014-08-19 |
The Boeing Company |
Methods and systems for internet protocol (IP) packet header collection and storage
|
US8009559B1
(en)
*
|
2008-08-28 |
2011-08-30 |
Juniper Networks, Inc. |
Global flow tracking system
|
US8793398B2
(en)
*
|
2008-08-29 |
2014-07-29 |
Red Hat, Inc. |
Facilitating client server interaction
|
US8793339B2
(en)
*
|
2008-08-29 |
2014-07-29 |
Red Hat, Inc. |
Facilitating client server interaction
|
US8325749B2
(en)
*
|
2008-12-24 |
2012-12-04 |
Juniper Networks, Inc. |
Methods and apparatus for transmission of groups of cells via a switch fabric
|
US8154996B2
(en)
|
2008-09-11 |
2012-04-10 |
Juniper Networks, Inc. |
Methods and apparatus for flow control associated with multi-staged queues
|
US8213308B2
(en)
|
2008-09-11 |
2012-07-03 |
Juniper Networks, Inc. |
Methods and apparatus for defining a flow control signal related to a transmit queue
|
US8955107B2
(en)
*
|
2008-09-12 |
2015-02-10 |
Juniper Networks, Inc. |
Hierarchical application of security services within a computer network
|
US8220056B2
(en)
*
|
2008-09-23 |
2012-07-10 |
Savvis, Inc. |
Threat management system and method
|
US20110238587A1
(en)
*
|
2008-09-23 |
2011-09-29 |
Savvis, Inc. |
Policy management system and method
|
US8813221B1
(en)
|
2008-09-25 |
2014-08-19 |
Sonicwall, Inc. |
Reassembly-free deep packet inspection on multi-core hardware
|
US7855967B1
(en)
*
|
2008-09-26 |
2010-12-21 |
Tellabs San Jose, Inc. |
Method and apparatus for providing line rate netflow statistics gathering
|
US8607347B2
(en)
*
|
2008-09-29 |
2013-12-10 |
Sophos Limited |
Network stream scanning facility
|
US8572717B2
(en)
|
2008-10-09 |
2013-10-29 |
Juniper Networks, Inc. |
Dynamic access control policy with port restrictions for a network security appliance
|
US8254255B2
(en)
|
2008-12-29 |
2012-08-28 |
Juniper Networks, Inc. |
Flow-control in a switch fabric
|
US8531978B2
(en)
|
2009-02-02 |
2013-09-10 |
Level 3 Communications, Llc |
Network cost analysis
|
EP2392103B1
(de)
|
2009-02-02 |
2017-03-22 |
Level 3 Communications, LLC |
Netzwerkverkehrsanalyse
|
US9398043B1
(en)
|
2009-03-24 |
2016-07-19 |
Juniper Networks, Inc. |
Applying fine-grain policy action to encapsulated network attacks
|
NL2002694C2
(en)
*
|
2009-04-01 |
2010-10-04 |
Univ Twente |
Method and system for alert classification in a computer network.
|
US20100293618A1
(en)
*
|
2009-05-12 |
2010-11-18 |
Microsoft Corporation |
Runtime analysis of software privacy issues
|
US20110131652A1
(en)
*
|
2009-05-29 |
2011-06-02 |
Autotrader.Com, Inc. |
Trained predictive services to interdict undesired website accesses
|
US9769149B1
(en)
|
2009-07-02 |
2017-09-19 |
Sonicwall Inc. |
Proxy-less secure sockets layer (SSL) data inspection
|
US20110023088A1
(en)
*
|
2009-07-23 |
2011-01-27 |
Electronics And Telecommunications Research Institute |
Flow-based dynamic access control system and method
|
US8369345B1
(en)
|
2009-11-13 |
2013-02-05 |
Juniper Networks, Inc. |
Multi-router system having shared network interfaces
|
US9264321B2
(en)
|
2009-12-23 |
2016-02-16 |
Juniper Networks, Inc. |
Methods and apparatus for tracking data flow based on flow state values
|
US8949987B2
(en)
*
|
2010-01-06 |
2015-02-03 |
Alcatel Lucent |
Computer security process monitor
|
US8578497B2
(en)
|
2010-01-06 |
2013-11-05 |
Damballa, Inc. |
Method and system for detecting malware
|
US8826438B2
(en)
|
2010-01-19 |
2014-09-02 |
Damballa, Inc. |
Method and system for network-based detecting of malware from behavioral clustering
|
US9602439B2
(en)
|
2010-04-30 |
2017-03-21 |
Juniper Networks, Inc. |
Methods and apparatus for flow control associated with a switch fabric
|
US8621638B2
(en)
|
2010-05-14 |
2013-12-31 |
Mcafee, Inc. |
Systems and methods for classification of messaging entities
|
US10187353B2
(en)
*
|
2010-06-02 |
2019-01-22 |
Symantec Corporation |
Behavioral classification of network data flows
|
US9065773B2
(en)
|
2010-06-22 |
2015-06-23 |
Juniper Networks, Inc. |
Methods and apparatus for virtual channel flow control associated with a switch fabric
|
US8553710B1
(en)
|
2010-08-18 |
2013-10-08 |
Juniper Networks, Inc. |
Fibre channel credit-based link flow control overlay onto fibre channel over ethernet
|
US8509071B1
(en)
|
2010-10-06 |
2013-08-13 |
Juniper Networks, Inc. |
Multi-dimensional traffic management
|
US9660940B2
(en)
|
2010-12-01 |
2017-05-23 |
Juniper Networks, Inc. |
Methods and apparatus for flow control associated with a switch fabric
|
US9032089B2
(en)
|
2011-03-09 |
2015-05-12 |
Juniper Networks, Inc. |
Methods and apparatus for path selection within a network based on flow duration
|
CN102761517B
(zh)
*
|
2011-04-25 |
2015-06-24 |
工业和信息化部电信传输研究所 |
一种高速网络的内容还原方法
|
KR20130030086A
(ko)
*
|
2011-09-16 |
2013-03-26 |
한국전자통신연구원 |
비정상 세션 연결 종료 행위를 통한 분산 서비스 거부 공격 방어 방법 및 장치
|
US8811183B1
(en)
|
2011-10-04 |
2014-08-19 |
Juniper Networks, Inc. |
Methods and apparatus for multi-path flow control within a multi-stage switch fabric
|
US9251535B1
(en)
|
2012-01-05 |
2016-02-02 |
Juniper Networks, Inc. |
Offload of data transfer statistics from a mobile access gateway
|
US8976661B2
(en)
*
|
2012-01-11 |
2015-03-10 |
Nec Laboratories America, Inc. |
Network self-protection
|
US9922190B2
(en)
|
2012-01-25 |
2018-03-20 |
Damballa, Inc. |
Method and system for detecting DGA-based malware
|
US10432587B2
(en)
|
2012-02-21 |
2019-10-01 |
Aventail Llc |
VPN deep packet inspection
|
RU2475836C1
(ru)
*
|
2012-03-12 |
2013-02-20 |
Федеральное государственное военное образовательное учреждение высшего профессионального образования "Военная академия связи имени маршала Советского Союза С.М. Буденного" Министерства обороны Российской Федерации |
Способ защиты вычислительных сетей
|
US10169575B1
(en)
*
|
2012-03-14 |
2019-01-01 |
Symantec Corporation |
Systems and methods for preventing internal network attacks
|
JP6139656B2
(ja)
|
2012-03-22 |
2017-05-31 |
ロス アラモス ナショナル セキュリティー,リミテッド ライアビリティー カンパニーLos Alamos National Security,Llc |
異常部分グラフの検出のための道探査及び異常/変更検出及び網状況認知のためのdns要求及びホストエージェントの使用
|
US8995271B2
(en)
*
|
2012-04-30 |
2015-03-31 |
Hewlett-Packard Development Company, L.P. |
Communications flow analysis
|
US9154461B2
(en)
|
2012-05-16 |
2015-10-06 |
The Keyw Corporation |
Packet capture deep packet inspection sensor
|
FI20125761A
(fi)
*
|
2012-06-29 |
2013-12-30 |
Tellabs Oy |
Menetelmä ja laite datakehysmyrskyjen lähteiden ilmaisemiseksi
|
US9686169B2
(en)
|
2012-07-02 |
2017-06-20 |
Ixia |
Real-time highly accurate network latency measurement with low generated traffic or data requirements
|
US9392003B2
(en)
|
2012-08-23 |
2016-07-12 |
Raytheon Foreground Security, Inc. |
Internet security cyber threat reporting system and method
|
US10547674B2
(en)
|
2012-08-27 |
2020-01-28 |
Help/Systems, Llc |
Methods and systems for network flow analysis
|
US9894088B2
(en)
|
2012-08-31 |
2018-02-13 |
Damballa, Inc. |
Data mining to identify malicious activity
|
US10084806B2
(en)
|
2012-08-31 |
2018-09-25 |
Damballa, Inc. |
Traffic simulation to identify malicious activity
|
US9565213B2
(en)
|
2012-10-22 |
2017-02-07 |
Centripetal Networks, Inc. |
Methods and systems for protecting a secured network
|
US9137205B2
(en)
|
2012-10-22 |
2015-09-15 |
Centripetal Networks, Inc. |
Methods and systems for protecting a secured network
|
US8943600B2
(en)
*
|
2012-10-26 |
2015-01-27 |
International Business Machines Corporation |
Weighted security analysis
|
US9203806B2
(en)
|
2013-01-11 |
2015-12-01 |
Centripetal Networks, Inc. |
Rule swapping in a packet network
|
US9124552B2
(en)
|
2013-03-12 |
2015-09-01 |
Centripetal Networks, Inc. |
Filtering network data transfers
|
US9094445B2
(en)
|
2013-03-15 |
2015-07-28 |
Centripetal Networks, Inc. |
Protecting networks from cyber attacks and overloading
|
US9571511B2
(en)
|
2013-06-14 |
2017-02-14 |
Damballa, Inc. |
Systems and methods for traffic classification
|
DE102013216847B4
(de)
*
|
2013-08-23 |
2023-06-01 |
Siemens Mobility GmbH |
Verfahren, Vorrichtung und System zur Überwachung einer Sicherheits-Netzübergangseinheit
|
US9288221B2
(en)
|
2014-01-14 |
2016-03-15 |
Pfu Limited |
Information processing apparatus, method for determining unauthorized activity and computer-readable medium
|
CN103780610A
(zh)
*
|
2014-01-16 |
2014-05-07 |
绵阳师范学院 |
基于协议特征的网络数据恢复方法
|
US9652464B2
(en)
*
|
2014-01-30 |
2017-05-16 |
Nasdaq, Inc. |
Systems and methods for continuous active data security
|
US9565114B1
(en)
*
|
2014-03-08 |
2017-02-07 |
Google Inc. |
Weighted load balancing using scaled parallel hashing
|
KR101761737B1
(ko)
*
|
2014-05-20 |
2017-07-26 |
한국전자통신연구원 |
제어 시스템의 이상행위 탐지 시스템 및 방법
|
US9264370B1
(en)
|
2015-02-10 |
2016-02-16 |
Centripetal Networks, Inc. |
Correlating packets in communications networks
|
US9930065B2
(en)
|
2015-03-25 |
2018-03-27 |
University Of Georgia Research Foundation, Inc. |
Measuring, categorizing, and/or mitigating malware distribution paths
|
RO131470A2
(ro)
|
2015-04-10 |
2016-10-28 |
Ixia, A California Corporation |
Metode, sisteme şi suport citibil pe calculator pentru măsurarea întârzierii unei linii de comunicaţii unidirecţionale
|
US10019333B2
(en)
|
2015-04-16 |
2018-07-10 |
Keysight Technologies Singapore (Holdings) Pte. Ltd. |
Methods, systems, and computer readable media for emulating network devices with different clocks
|
US9736804B2
(en)
|
2015-04-16 |
2017-08-15 |
Ixia |
Methods, systems, and computer readable media for synchronizing timing among network interface cards (NICS) in a network equipment test device
|
US9866576B2
(en)
|
2015-04-17 |
2018-01-09 |
Centripetal Networks, Inc. |
Rule-based network-threat detection
|
RO131471A2
(ro)
|
2015-04-21 |
2016-10-28 |
Ixia, A California Corporation |
Metode, sisteme şi suport citibil pe calculator pentru testarea calităţii tactului recuperat
|
US10536357B2
(en)
|
2015-06-05 |
2020-01-14 |
Cisco Technology, Inc. |
Late data detection in data center
|
US10142353B2
(en)
|
2015-06-05 |
2018-11-27 |
Cisco Technology, Inc. |
System for monitoring and managing datacenters
|
US9917753B2
(en)
*
|
2015-06-12 |
2018-03-13 |
Level 3 Communications, Llc |
Network operational flaw detection using metrics
|
US9813226B2
(en)
|
2015-08-05 |
2017-11-07 |
Ixia |
Modeling a clock
|
US9800595B2
(en)
*
|
2015-09-21 |
2017-10-24 |
Ixia |
Methods, systems, and computer readable media for detecting physical link intrusions
|
US9917856B2
(en)
|
2015-12-23 |
2018-03-13 |
Centripetal Networks, Inc. |
Rule-based network-threat detection for encrypted communications
|
US10075416B2
(en)
|
2015-12-30 |
2018-09-11 |
Juniper Networks, Inc. |
Network session data sharing
|
US11729144B2
(en)
|
2016-01-04 |
2023-08-15 |
Centripetal Networks, Llc |
Efficient packet capture for cyber threat analysis
|
US10430442B2
(en)
*
|
2016-03-09 |
2019-10-01 |
Symantec Corporation |
Systems and methods for automated classification of application network activity
|
RU2634211C1
(ru)
|
2016-07-06 |
2017-10-24 |
Общество с ограниченной ответственностью "Траст" |
Способ и система анализа протоколов взаимодействия вредоносных программ с центрами управления и выявления компьютерных атак
|
RU2649793C2
(ru)
|
2016-08-03 |
2018-04-04 |
ООО "Группа АйБи" |
Способ и система выявления удаленного подключения при работе на страницах веб-ресурса
|
US10263835B2
(en)
*
|
2016-08-12 |
2019-04-16 |
Microsoft Technology Licensing, Llc |
Localizing network faults through differential analysis of TCP telemetry
|
RU2634209C1
(ru)
*
|
2016-09-19 |
2017-10-24 |
Общество с ограниченной ответственностью "Группа АйБи ТДС" |
Система и способ автогенерации решающих правил для систем обнаружения вторжений с обратной связью
|
US10666675B1
(en)
|
2016-09-27 |
2020-05-26 |
Ca, Inc. |
Systems and methods for creating automatic computer-generated classifications
|
RU2637477C1
(ru)
|
2016-12-29 |
2017-12-04 |
Общество с ограниченной ответственностью "Траст" |
Система и способ обнаружения фишинговых веб-страниц
|
RU2671991C2
(ru)
|
2016-12-29 |
2018-11-08 |
Общество с ограниченной ответственностью "Траст" |
Система и способ сбора информации для обнаружения фишинга
|
CN108322354B
(zh)
*
|
2017-01-18 |
2020-10-23 |
中国移动通信集团河南有限公司 |
一种偷跑流量账户识别方法及装置
|
US10230690B2
(en)
*
|
2017-03-23 |
2019-03-12 |
International Business Machines Corporation |
Digital media content distribution blocking
|
US10609054B2
(en)
|
2017-04-07 |
2020-03-31 |
Keysight Technologies Singapore (Sales) Pte. Ltd. |
Methods, systems, and computer readable media for monitoring, adjusting, and utilizing latency associated with accessing distributed computing resources
|
US10425321B2
(en)
|
2017-04-25 |
2019-09-24 |
Keysight Technologies Singapore (Sales) Pte. Ltd. |
Methods, systems, and computer readable media for testing time sensitive network (TSN) elements
|
US10503899B2
(en)
|
2017-07-10 |
2019-12-10 |
Centripetal Networks, Inc. |
Cyberanalysis workflow acceleration
|
US11233777B2
(en)
|
2017-07-24 |
2022-01-25 |
Centripetal Networks, Inc. |
Efficient SSL/TLS proxy
|
US10284526B2
(en)
|
2017-07-24 |
2019-05-07 |
Centripetal Networks, Inc. |
Efficient SSL/TLS proxy
|
US10855705B2
(en)
|
2017-09-29 |
2020-12-01 |
Cisco Technology, Inc. |
Enhanced flow-based computer network threat detection
|
RU2689816C2
(ru)
|
2017-11-21 |
2019-05-29 |
ООО "Группа АйБи" |
Способ для классифицирования последовательности действий пользователя (варианты)
|
RU2677361C1
(ru)
|
2018-01-17 |
2019-01-16 |
Общество с ограниченной ответственностью "Траст" |
Способ и система децентрализованной идентификации вредоносных программ
|
RU2668710C1
(ru)
|
2018-01-17 |
2018-10-02 |
Общество с ограниченной ответственностью "Группа АйБи ТДС" |
Вычислительное устройство и способ для обнаружения вредоносных доменных имен в сетевом трафике
|
RU2677368C1
(ru)
|
2018-01-17 |
2019-01-16 |
Общество С Ограниченной Ответственностью "Группа Айби" |
Способ и система для автоматического определения нечетких дубликатов видеоконтента
|
RU2676247C1
(ru)
|
2018-01-17 |
2018-12-26 |
Общество С Ограниченной Ответственностью "Группа Айби" |
Способ и компьютерное устройство для кластеризации веб-ресурсов
|
RU2680736C1
(ru)
|
2018-01-17 |
2019-02-26 |
Общество с ограниченной ответственностью "Группа АйБи ТДС" |
Сервер и способ для определения вредоносных файлов в сетевом трафике
|
RU2681699C1
(ru)
|
2018-02-13 |
2019-03-12 |
Общество с ограниченной ответственностью "Траст" |
Способ и сервер для поиска связанных сетевых ресурсов
|
US10333898B1
(en)
|
2018-07-09 |
2019-06-25 |
Centripetal Networks, Inc. |
Methods and systems for efficient network protection
|
WO2020087039A1
(en)
|
2018-10-26 |
2020-04-30 |
Netography, Inc. |
Distributed network and security operations platform
|
RU2708508C1
(ru)
|
2018-12-17 |
2019-12-09 |
Общество с ограниченной ответственностью "Траст" |
Способ и вычислительное устройство для выявления подозрительных пользователей в системах обмена сообщениями
|
RU2701040C1
(ru)
|
2018-12-28 |
2019-09-24 |
Общество с ограниченной ответственностью "Траст" |
Способ и вычислительное устройство для информирования о вредоносных веб-ресурсах
|
US10965392B2
(en)
|
2019-01-25 |
2021-03-30 |
Keysight Technologies, Inc. |
Active network tap supporting time sensitive network (TSN) standards
|
US11563768B2
(en)
|
2019-01-31 |
2023-01-24 |
Keysight Technologies, Inc. |
Methods, systems, and computer readable media for detecting and mitigating effects of timing attacks in time sensitive networks
|
WO2020176005A1
(ru)
|
2019-02-27 |
2020-09-03 |
Общество С Ограниченной Ответственностью "Группа Айби" |
Способ и система идентификации пользователя по клавиатурному почерку
|
US11381459B2
(en)
*
|
2019-08-05 |
2022-07-05 |
Sk Planet Co., Ltd. |
Service providing system and method for preventing hidden camera, service providing apparatus therefor, and non-transitory computer readable medium having computer program recorded thereon
|
US11546354B2
(en)
*
|
2019-11-26 |
2023-01-03 |
Kyndryl, Inc. |
Network shutdown for cyber security
|
RU2728498C1
(ru)
|
2019-12-05 |
2020-07-29 |
Общество с ограниченной ответственностью "Группа АйБи ТДС" |
Способ и система определения принадлежности программного обеспечения по его исходному коду
|
RU2728497C1
(ru)
|
2019-12-05 |
2020-07-29 |
Общество с ограниченной ответственностью "Группа АйБи ТДС" |
Способ и система определения принадлежности программного обеспечения по его машинному коду
|
RU2743974C1
(ru)
|
2019-12-19 |
2021-03-01 |
Общество с ограниченной ответственностью "Группа АйБи ТДС" |
Система и способ сканирования защищенности элементов сетевой архитектуры
|
SG10202001963TA
(en)
|
2020-03-04 |
2021-10-28 |
Group Ib Global Private Ltd |
System and method for brand protection based on the search results
|
FR3111442B1
(fr)
*
|
2020-06-10 |
2023-07-28 |
Serenicity |
Dispositif d’analyse du risque informatique d’un ensemble de périphériques connectés sur un réseau
|
US11475090B2
(en)
|
2020-07-15 |
2022-10-18 |
Group-Ib Global Private Limited |
Method and system for identifying clusters of affiliated web resources
|
RU2743619C1
(ru)
|
2020-08-06 |
2021-02-20 |
Общество с ограниченной ответственностью "Группа АйБи ТДС" |
Способ и система генерации списка индикаторов компрометации
|
US11316823B2
(en)
|
2020-08-27 |
2022-04-26 |
Centripetal Networks, Inc. |
Methods and systems for efficient virtualization of inline transparent computer networking devices
|
US11362996B2
(en)
|
2020-10-27 |
2022-06-14 |
Centripetal Networks, Inc. |
Methods and systems for efficient adaptive logging of cyber threat incidents
|
CN112929362B
(zh)
*
|
2021-02-04 |
2023-01-20 |
广东电网有限责任公司广州供电局 |
一种探针装置、前端报文处理方法及无线通信管理系统
|
US11947572B2
(en)
|
2021-03-29 |
2024-04-02 |
Group IB TDS, Ltd |
Method and system for clustering executable files
|
US11159546B1
(en)
|
2021-04-20 |
2021-10-26 |
Centripetal Networks, Inc. |
Methods and systems for efficient threat context-aware packet filtering for network protection
|
NL2030861B1
(en)
|
2021-06-01 |
2023-03-14 |
Trust Ltd |
System and method for external monitoring a cyberattack surface
|
RU2769075C1
(ru)
|
2021-06-10 |
2022-03-28 |
Общество с ограниченной ответственностью "Группа АйБи ТДС" |
Система и способ активного обнаружения вредоносных сетевых ресурсов
|
CN115103000B
(zh)
*
|
2022-06-20 |
2023-09-26 |
北京鼎兴达信息科技股份有限公司 |
基于NetStream对铁路数据网进行业务会话还原和分析方法
|