DE602004031206D1 - Angriffsdatenbankstruktur - Google Patents
AngriffsdatenbankstrukturInfo
- Publication number
- DE602004031206D1 DE602004031206D1 DE602004031206T DE602004031206T DE602004031206D1 DE 602004031206 D1 DE602004031206 D1 DE 602004031206D1 DE 602004031206 T DE602004031206 T DE 602004031206T DE 602004031206 T DE602004031206 T DE 602004031206T DE 602004031206 D1 DE602004031206 D1 DE 602004031206D1
- Authority
- DE
- Germany
- Prior art keywords
- data value
- log record
- key
- log
- database structure
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Lifetime
Links
- 238000000034 method Methods 0.000 abstract 2
- 238000004590 computer program Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99943—Generating database or data structure, e.g. via user interface
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Storage Device Security (AREA)
- Transition And Organic Metals Composition Catalysts For Addition Polymerization (AREA)
- Medicines Containing Material From Animals Or Micro-Organisms (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/407,823 US7325002B2 (en) | 2003-04-04 | 2003-04-04 | Detection of network security breaches based on analysis of network record logs |
PCT/US2004/010389 WO2004091171A1 (en) | 2003-04-04 | 2004-04-02 | Attack database structure |
Publications (1)
Publication Number | Publication Date |
---|---|
DE602004031206D1 true DE602004031206D1 (de) | 2011-03-10 |
Family
ID=33097634
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DE602004031206T Expired - Lifetime DE602004031206D1 (de) | 2003-04-04 | 2004-04-02 | Angriffsdatenbankstruktur |
Country Status (7)
Country | Link |
---|---|
US (4) | US7325002B2 (de) |
EP (1) | EP1618725B1 (de) |
JP (1) | JP4364901B2 (de) |
CN (1) | CN1778087B (de) |
AT (1) | ATE497303T1 (de) |
DE (1) | DE602004031206D1 (de) |
WO (1) | WO2004091171A1 (de) |
Families Citing this family (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3951464B2 (ja) * | 1998-07-28 | 2007-08-01 | 株式会社日立製作所 | ディジタル信号処理装置 |
US7325002B2 (en) * | 2003-04-04 | 2008-01-29 | Juniper Networks, Inc. | Detection of network security breaches based on analysis of network record logs |
US9946779B2 (en) * | 2003-05-28 | 2018-04-17 | Oracle International Corporation | Pipleline merge operations using source data and multiple destination data structures |
US7222123B2 (en) * | 2003-05-28 | 2007-05-22 | Oracle International Corporation | Technique for using a current lookup for performing multiple merge operations using source data that is modified in between the merge operations |
US7206784B2 (en) * | 2003-05-28 | 2007-04-17 | Oracle International Corporation | Method and apparatus for performing multiple merge operations using source data that is modified in between the merge operations |
US7899784B2 (en) * | 2003-05-28 | 2011-03-01 | Oracle International Corporation | Method and apparatus for performing multi-table merge operations in a database environment |
US7568229B1 (en) | 2003-07-01 | 2009-07-28 | Symantec Corporation | Real-time training for a computer code intrusion detection system |
US7406714B1 (en) | 2003-07-01 | 2008-07-29 | Symantec Corporation | Computer code intrusion detection system based on acceptable retrievals |
JP4355188B2 (ja) * | 2003-10-03 | 2009-10-28 | 株式会社日立製作所 | パケット転送装置 |
US20050132031A1 (en) * | 2003-12-12 | 2005-06-16 | Reiner Sailer | Method and system for measuring status and state of remotely executing programs |
US7634655B2 (en) * | 2004-02-13 | 2009-12-15 | Microsoft Corporation | Efficient hash table protection for data transport protocols |
US7263520B2 (en) * | 2004-02-27 | 2007-08-28 | Sap Ag | Fast aggregation of compressed data using full table scans |
US8266177B1 (en) | 2004-03-16 | 2012-09-11 | Symantec Corporation | Empirical database access adjustment |
US7669240B2 (en) * | 2004-07-22 | 2010-02-23 | International Business Machines Corporation | Apparatus, method and program to detect and control deleterious code (virus) in computer network |
JP4561980B2 (ja) * | 2004-11-08 | 2010-10-13 | 日本電気株式会社 | セッション中継装置およびセッション中継方法 |
FR2881312A1 (fr) * | 2005-01-26 | 2006-07-28 | France Telecom | Procede, dispositif et programme de detection d'usurpation d'adresse dans un reseau sans fil |
US20060259950A1 (en) | 2005-02-18 | 2006-11-16 | Ulf Mattsson | Multi-layer system for privacy enforcement and monitoring of suspicious data access behavior |
US7444331B1 (en) | 2005-03-02 | 2008-10-28 | Symantec Corporation | Detecting code injection attacks against databases |
CN100361454C (zh) * | 2005-04-27 | 2008-01-09 | 华为技术有限公司 | 一种网络管理服务器从网元设备获取日志信息的方法 |
US8046374B1 (en) | 2005-05-06 | 2011-10-25 | Symantec Corporation | Automatic training of a database intrusion detection system |
US7558796B1 (en) | 2005-05-19 | 2009-07-07 | Symantec Corporation | Determining origins of queries for a database intrusion detection system |
US7774361B1 (en) * | 2005-07-08 | 2010-08-10 | Symantec Corporation | Effective aggregation and presentation of database intrusion incidents |
US7690037B1 (en) | 2005-07-13 | 2010-03-30 | Symantec Corporation | Filtering training data for machine learning |
CN100355245C (zh) * | 2005-11-08 | 2007-12-12 | 东南大学 | 入侵检测系统用增强多哈希的源串还原方法 |
US7661136B1 (en) * | 2005-12-13 | 2010-02-09 | At&T Intellectual Property Ii, L.P. | Detecting anomalous web proxy activity |
US8516573B1 (en) * | 2005-12-22 | 2013-08-20 | At&T Intellectual Property Ii, L.P. | Method and apparatus for port scan detection in a network |
JP4687978B2 (ja) * | 2006-02-15 | 2011-05-25 | 横河電機株式会社 | パケット解析システム |
US7540766B2 (en) * | 2006-06-14 | 2009-06-02 | Itron, Inc. | Printed circuit board connector for utility meters |
US8185559B2 (en) * | 2006-10-27 | 2012-05-22 | Telecom Italia S.P.A | Method and system for operating a telecommunication device using a hash table in particular for protecting such device from attacks |
JP4963426B2 (ja) * | 2007-02-27 | 2012-06-27 | 楽天株式会社 | 連続メール対策システム |
JP2009027400A (ja) * | 2007-07-19 | 2009-02-05 | Alaxala Networks Corp | 過大フロー検出装置、過大フロー検出回路、端末装置及びネットワークノード |
US7991794B2 (en) * | 2007-12-18 | 2011-08-02 | Oracle International Corporation | Pipelining operations involving DML and query |
US8495384B1 (en) * | 2009-03-10 | 2013-07-23 | James DeLuccia | Data comparison system |
CN101854340B (zh) | 2009-04-03 | 2015-04-01 | 瞻博网络公司 | 基于访问控制信息进行的基于行为的通信剖析 |
US8665879B2 (en) * | 2009-07-14 | 2014-03-04 | Broadcom Corporation | Flow based path selection randomization using parallel hash functions |
US8565239B2 (en) * | 2009-07-14 | 2013-10-22 | Broadcom Corporation | Node based path selection randomization |
US8438270B2 (en) | 2010-01-26 | 2013-05-07 | Tenable Network Security, Inc. | System and method for correlating network identities and addresses |
US8302198B2 (en) | 2010-01-28 | 2012-10-30 | Tenable Network Security, Inc. | System and method for enabling remote registry service security audits |
US8707440B2 (en) * | 2010-03-22 | 2014-04-22 | Tenable Network Security, Inc. | System and method for passively identifying encrypted and interactive network sessions |
US8549650B2 (en) | 2010-05-06 | 2013-10-01 | Tenable Network Security, Inc. | System and method for three-dimensional visualization of vulnerability and asset data |
US9521154B2 (en) * | 2011-08-03 | 2016-12-13 | Hewlett Packard Enterprise Development Lp | Detecting suspicious network activity using flow sampling |
US20130094515A1 (en) * | 2011-08-31 | 2013-04-18 | Nils Gura | Systems, apparatus, and methods for removing duplicate data packets from a traffic flow of captured data packets transmitted via a communication network |
US8880871B2 (en) * | 2012-01-03 | 2014-11-04 | Broadcom Corporation | Hash table organization |
US9367707B2 (en) | 2012-02-23 | 2016-06-14 | Tenable Network Security, Inc. | System and method for using file hashes to track data leakage and document propagation in a network |
US9043920B2 (en) | 2012-06-27 | 2015-05-26 | Tenable Network Security, Inc. | System and method for identifying exploitable weak points in a network |
US9088606B2 (en) | 2012-07-05 | 2015-07-21 | Tenable Network Security, Inc. | System and method for strategic anti-malware monitoring |
MX2015009172A (es) * | 2013-01-15 | 2016-02-18 | Beyondtrust Software Inc | Sistemas y metodos para identificar y reportar vulnerabilidades de aplicaciones y archivos. |
US9467465B2 (en) | 2013-02-25 | 2016-10-11 | Beyondtrust Software, Inc. | Systems and methods of risk based rules for application control |
US9467464B2 (en) | 2013-03-15 | 2016-10-11 | Tenable Network Security, Inc. | System and method for correlating log data to discover network vulnerabilities and assets |
CN103678583B (zh) * | 2013-12-11 | 2017-07-21 | 北京华胜天成科技股份有限公司 | 结构化数据比较的方法及系统 |
US10356109B2 (en) * | 2014-07-21 | 2019-07-16 | Entit Software Llc | Security indicator linkage determination |
US11151611B2 (en) | 2015-01-23 | 2021-10-19 | Bluezoo, Inc. | Mobile device detection and tracking |
US11727443B2 (en) | 2015-01-23 | 2023-08-15 | Bluezoo, Inc. | Mobile device detection and tracking |
US20190028849A1 (en) * | 2017-07-22 | 2019-01-24 | Bluefox, Inc. | Mobile device detection and tracking |
JP6547577B2 (ja) * | 2015-10-15 | 2019-07-24 | 富士通株式会社 | 検査装置、検査プログラムおよび検査方法 |
EP3414695B1 (de) * | 2016-02-12 | 2021-08-11 | Shape Security, Inc. | Reverse-proxy-computer: einsatz von gegenmassnahmen als reaktion auf die erkennung der ausführung eines autonomen browsers auf einem client-computer |
US10164990B2 (en) * | 2016-03-11 | 2018-12-25 | Bank Of America Corporation | Security test tool |
US10237295B2 (en) * | 2016-03-22 | 2019-03-19 | Nec Corporation | Automated event ID field analysis on heterogeneous logs |
US10462170B1 (en) * | 2016-11-21 | 2019-10-29 | Alert Logic, Inc. | Systems and methods for log and snort synchronized threat detection |
US10977361B2 (en) | 2017-05-16 | 2021-04-13 | Beyondtrust Software, Inc. | Systems and methods for controlling privileged operations |
US10594725B2 (en) * | 2017-07-27 | 2020-03-17 | Cypress Semiconductor Corporation | Generating and analyzing network profile data |
WO2019113326A1 (en) * | 2017-12-07 | 2019-06-13 | Ridgeback Network Defense, Inc. | Tagging network data |
WO2020190294A1 (en) * | 2019-03-21 | 2020-09-24 | Xinova, LLC | Security personnel training using automatic log creation resulting from white hacking |
WO2020190296A1 (en) * | 2019-03-21 | 2020-09-24 | Xinova, LLC | Modified security logs for security personnel training |
US11245711B2 (en) * | 2019-04-05 | 2022-02-08 | Anomali Inc. | Network data timeline |
US11528149B2 (en) | 2019-04-26 | 2022-12-13 | Beyondtrust Software, Inc. | Root-level application selective configuration |
CN111983962B (zh) * | 2019-05-22 | 2024-05-07 | 华晨宝马汽车有限公司 | 一种用于生成业务流的映射关系的系统及方法 |
US10783054B2 (en) | 2019-07-29 | 2020-09-22 | Alibaba Group Holding Limited | Method, apparatus, and device for storing operation record based on trusted execution environment |
CN110457898B (zh) * | 2019-07-29 | 2020-10-30 | 创新先进技术有限公司 | 基于可信执行环境的操作记录存储方法、装置及设备 |
CN112800006B (zh) * | 2021-01-27 | 2023-05-26 | 杭州迪普科技股份有限公司 | 用于网络设备的日志存储方法及装置 |
US12052283B1 (en) * | 2023-01-21 | 2024-07-30 | Tanla Digital Labs Private Limited | Method and system for securing access to user data during phishing detection |
Family Cites Families (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5430871A (en) * | 1992-10-27 | 1995-07-04 | Bmc Software, Inc. | Method of dynamically adding and removing DB2 active logs |
US5418947A (en) * | 1992-12-23 | 1995-05-23 | At&T Corp. | Locating information in an unsorted database utilizing a B-tree |
US5781550A (en) | 1996-02-02 | 1998-07-14 | Digital Equipment Corporation | Transparent and secure network gateway |
US5842196A (en) * | 1996-04-03 | 1998-11-24 | Sybase, Inc. | Database system with improved methods for updating records |
US5842040A (en) | 1996-06-18 | 1998-11-24 | Storage Technology Corporation | Policy caching method and apparatus for use in a communication device based on contents of one data unit in a subset of related data units |
US5892903A (en) * | 1996-09-12 | 1999-04-06 | Internet Security Systems, Inc. | Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system |
US6119236A (en) * | 1996-10-07 | 2000-09-12 | Shipley; Peter M. | Intelligent network security device and method |
US5805801A (en) * | 1997-01-09 | 1998-09-08 | International Business Machines Corporation | System and method for detecting and preventing security |
US6233686B1 (en) * | 1997-01-17 | 2001-05-15 | At & T Corp. | System and method for providing peer level access control on a network |
US6591303B1 (en) | 1997-03-07 | 2003-07-08 | Sun Microsystems, Inc. | Method and apparatus for parallel trunking of interfaces to increase transfer bandwidth |
US5907848A (en) * | 1997-03-14 | 1999-05-25 | Lakeview Technology, Inc. | Method and system for defining transactions from a database log |
US5909686A (en) | 1997-06-30 | 1999-06-01 | Sun Microsystems, Inc. | Hardware-assisted central processing unit access to a forwarding database |
US6088356A (en) | 1997-06-30 | 2000-07-11 | Sun Microsystems, Inc. | System and method for a multi-layer network element |
US6049528A (en) | 1997-06-30 | 2000-04-11 | Sun Microsystems, Inc. | Trunking ethernet-compatible networks |
US6775692B1 (en) | 1997-07-31 | 2004-08-10 | Cisco Technology, Inc. | Proxying and unproxying a connection using a forwarding agent |
US6170012B1 (en) | 1997-09-12 | 2001-01-02 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with cache query processing |
US6098172A (en) | 1997-09-12 | 2000-08-01 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with proxy reflection |
US6141749A (en) | 1997-09-12 | 2000-10-31 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with stateful packet filtering |
US6154775A (en) | 1997-09-12 | 2000-11-28 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules |
US7143438B1 (en) | 1997-09-12 | 2006-11-28 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with multiple domain support |
US6061692A (en) * | 1997-11-04 | 2000-05-09 | Microsoft Corporation | System and method for administering a meta database as an integral component of an information server |
US6651243B1 (en) * | 1997-12-12 | 2003-11-18 | International Business Machines Corporation | Method and system for periodic trace sampling for real-time generation of segments of call stack trees |
US6341130B1 (en) * | 1998-02-09 | 2002-01-22 | Lucent Technologies, Inc. | Packet classification method and apparatus employing two fields |
US6157955A (en) * | 1998-06-15 | 2000-12-05 | Intel Corporation | Packet processing system including a policy engine having a classification unit |
US6449623B1 (en) * | 1998-09-04 | 2002-09-10 | Lucent Technologies Inc, | Method and apparatus for detecting and recovering from data corruption of a database via read logging |
US6952401B1 (en) | 1999-03-17 | 2005-10-04 | Broadcom Corporation | Method for load balancing in a network switch |
US7643481B2 (en) | 1999-03-17 | 2010-01-05 | Broadcom Corporation | Network switch having a programmable counter |
US6633560B1 (en) | 1999-07-02 | 2003-10-14 | Cisco Technology, Inc. | Distribution of network services among multiple service managers without client involvement |
US7051066B1 (en) | 1999-07-02 | 2006-05-23 | Cisco Technology, Inc. | Integrating service managers into a routing infrastructure using forwarding agents |
US6650641B1 (en) | 1999-07-02 | 2003-11-18 | Cisco Technology, Inc. | Network address translation using a forwarding agent |
US6704278B1 (en) | 1999-07-02 | 2004-03-09 | Cisco Technology, Inc. | Stateful failover of service managers |
US6735169B1 (en) | 1999-07-02 | 2004-05-11 | Cisco Technology, Inc. | Cascading multiple services on a forwarding agent |
US6549516B1 (en) | 1999-07-02 | 2003-04-15 | Cisco Technology, Inc. | Sending instructions from a service manager to forwarding agents on a need to know basis |
US6606315B1 (en) | 1999-07-02 | 2003-08-12 | Cisco Technology, Inc. | Synchronizing service instructions among forwarding agents using a service manager |
US6742045B1 (en) | 1999-07-02 | 2004-05-25 | Cisco Technology, Inc. | Handling packet fragments in a distributed network service environment |
US6970913B1 (en) | 1999-07-02 | 2005-11-29 | Cisco Technology, Inc. | Load balancing using distributed forwarding agents with application based feedback for different virtual machines |
FR2802666B1 (fr) * | 1999-12-17 | 2002-04-05 | Activcard | Systeme informatique pour application a acces par accreditation |
US6546388B1 (en) * | 2000-01-14 | 2003-04-08 | International Business Machines Corporation | Metadata search results ranking system |
US6775831B1 (en) * | 2000-02-11 | 2004-08-10 | Overture Services, Inc. | System and method for rapid completion of data processing tasks distributed on a network |
US6496935B1 (en) * | 2000-03-02 | 2002-12-17 | Check Point Software Technologies Ltd | System, device and method for rapid packet filtering and processing |
US7436830B2 (en) * | 2000-04-03 | 2008-10-14 | P-Cube Ltd. | Method and apparatus for wire-speed application layer classification of upstream and downstream data packets |
US6769074B2 (en) * | 2000-05-25 | 2004-07-27 | Lumigent Technologies, Inc. | System and method for transaction-selective rollback reconstruction of database objects |
JP3851493B2 (ja) * | 2000-06-12 | 2006-11-29 | 株式会社日立製作所 | データベース検索方法及びデータベース検索システム並びにデータベース検索プログラムを記録したコンピュータ読み取り可能な記録媒体 |
US7328349B2 (en) * | 2001-12-14 | 2008-02-05 | Bbn Technologies Corp. | Hash-based systems and methods for detecting, preventing, and tracing network worms and viruses |
JP2004500872A (ja) * | 2000-06-22 | 2004-01-15 | バイオジェン インコーポレイテッド | Gp354核酸およびポリペプチド |
AU2001288222A1 (en) | 2000-09-25 | 2002-04-08 | Itt Manufacturing Enterprises, Inc. | Global computer network intrusion detection system |
JP2002124996A (ja) | 2000-10-13 | 2002-04-26 | Yoshimi Baba | 高速パケット取得エンジン・セキュリティ |
CA2327211A1 (en) * | 2000-12-01 | 2002-06-01 | Nortel Networks Limited | Management of log archival and reporting for data network security systems |
US6744462B2 (en) * | 2000-12-12 | 2004-06-01 | Koninklijke Philips Electronics N.V. | Apparatus and methods for resolution of entry/exit conflicts for security monitoring systems |
US7296070B2 (en) * | 2000-12-22 | 2007-11-13 | Tier-3 Pty. Ltd. | Integrated monitoring system |
US20020165902A1 (en) * | 2001-05-03 | 2002-11-07 | Robb Mary Thomas | Independent log manager |
US6816455B2 (en) * | 2001-05-09 | 2004-11-09 | Telecom Italia S.P.A. | Dynamic packet filter utilizing session tracking |
US7684317B2 (en) * | 2001-06-14 | 2010-03-23 | Nortel Networks Limited | Protecting a network from unauthorized access |
US7107464B2 (en) * | 2001-07-10 | 2006-09-12 | Telecom Italia S.P.A. | Virtual private network mechanism incorporating security association processor |
US7366910B2 (en) | 2001-07-17 | 2008-04-29 | The Boeing Company | System and method for string filtering |
US7239636B2 (en) | 2001-07-23 | 2007-07-03 | Broadcom Corporation | Multiple virtual channels for use in network devices |
US20030033463A1 (en) | 2001-08-10 | 2003-02-13 | Garnett Paul J. | Computer system storage |
US20030041125A1 (en) * | 2001-08-16 | 2003-02-27 | Salomon Kirk C. | Internet-deployed wireless system |
US7222361B2 (en) * | 2001-11-15 | 2007-05-22 | Hewlett-Packard Development Company, L.P. | Computer security with local and remote authentication |
US8370936B2 (en) | 2002-02-08 | 2013-02-05 | Juniper Networks, Inc. | Multi-method gateway-based network security systems and methods |
US7073074B2 (en) * | 2002-02-13 | 2006-07-04 | Microsoft Corporation | System and method for storing events to enhance intrusion detection |
ATE459048T1 (de) * | 2002-03-26 | 2010-03-15 | Nokia Siemens Networks Oy | Verfahren und vorrichtung zum komprimieren von protokollierungsaufzeichnungsinformationen |
US20030206100A1 (en) * | 2002-05-04 | 2003-11-06 | Lawrence Richman | Method and protocol for real time security system |
US7512810B1 (en) * | 2002-09-11 | 2009-03-31 | Guardian Data Storage Llc | Method and system for protecting encrypted files transmitted over a network |
US20040054925A1 (en) * | 2002-09-13 | 2004-03-18 | Cyber Operations, Llc | System and method for detecting and countering a network attack |
US7143288B2 (en) * | 2002-10-16 | 2006-11-28 | Vormetric, Inc. | Secure file system server architecture and methods |
US7774839B2 (en) * | 2002-11-04 | 2010-08-10 | Riverbed Technology, Inc. | Feedback mechanism to minimize false assertions of a network intrusion |
US7234166B2 (en) * | 2002-11-07 | 2007-06-19 | Stonesoft Corporation | Event sequence detection |
US7386889B2 (en) * | 2002-11-18 | 2008-06-10 | Trusted Network Technologies, Inc. | System and method for intrusion prevention in a communications network |
US7325002B2 (en) | 2003-04-04 | 2008-01-29 | Juniper Networks, Inc. | Detection of network security breaches based on analysis of network record logs |
US7779021B1 (en) * | 2004-03-09 | 2010-08-17 | Versata Development Group, Inc. | Session-based processing method and system |
US7895431B2 (en) | 2004-09-10 | 2011-02-22 | Cavium Networks, Inc. | Packet queuing, scheduling and ordering |
US7933927B2 (en) * | 2004-11-17 | 2011-04-26 | Bmc Software, Inc. | Method and apparatus for building index of source data |
US7535907B2 (en) | 2005-04-08 | 2009-05-19 | Oavium Networks, Inc. | TCP engine |
-
2003
- 2003-04-04 US US10/407,823 patent/US7325002B2/en not_active Expired - Lifetime
-
2004
- 2004-04-02 JP JP2006509691A patent/JP4364901B2/ja not_active Expired - Lifetime
- 2004-04-02 DE DE602004031206T patent/DE602004031206D1/de not_active Expired - Lifetime
- 2004-04-02 CN CN2004800086276A patent/CN1778087B/zh not_active Expired - Lifetime
- 2004-04-02 WO PCT/US2004/010389 patent/WO2004091171A1/en active Application Filing
- 2004-04-02 EP EP04758864A patent/EP1618725B1/de not_active Expired - Lifetime
- 2004-04-02 AT AT04758864T patent/ATE497303T1/de not_active IP Right Cessation
-
2007
- 2007-12-06 US US11/951,518 patent/US7904479B2/en active Active
-
2011
- 2011-01-26 US US13/014,339 patent/US8326881B2/en not_active Expired - Lifetime
-
2012
- 2012-09-14 US US13/615,903 patent/US9413777B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US8326881B2 (en) | 2012-12-04 |
US7904479B2 (en) | 2011-03-08 |
EP1618725B1 (de) | 2011-01-26 |
US20130067575A1 (en) | 2013-03-14 |
US7325002B2 (en) | 2008-01-29 |
WO2004091171A1 (en) | 2004-10-21 |
US20040199535A1 (en) | 2004-10-07 |
JP4364901B2 (ja) | 2009-11-18 |
CN1778087B (zh) | 2010-04-28 |
ATE497303T1 (de) | 2011-02-15 |
US20110185426A1 (en) | 2011-07-28 |
EP1618725A1 (de) | 2006-01-25 |
CN1778087A (zh) | 2006-05-24 |
US9413777B2 (en) | 2016-08-09 |
JP2006523427A (ja) | 2006-10-12 |
US20080155697A1 (en) | 2008-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE497303T1 (de) | Angriffsdatenbankstruktur | |
CN105827594B (zh) | 一种基于域名可读性及域名解析行为的可疑性检测方法 | |
US8438174B2 (en) | Automated forensic document signatures | |
V. Vähätalo et al. | Spring arrival of birds depends on the North Atlantic Oscillation | |
WO2017107965A1 (zh) | 一种web异常检测方法和装置 | |
JP5558997B2 (ja) | 相互検索およびアラートのための方法、情報処理システム、およびコンピュータ・プログラム(構造化データ・ソースと非構造化データ・ソースとの間の相互検索およびアラート) | |
JP2006523427A5 (de) | ||
Shapira et al. | Content-based data leakage detection using extended fingerprinting | |
US9756063B1 (en) | Identification of host names generated by a domain generation algorithm | |
Hall et al. | Bot detection in wikidata using behavioral and other informal cues | |
CN103067387B (zh) | 一种反钓鱼监测系统和方法 | |
CN109347808B (zh) | 一种基于用户群行为活动的安全分析方法 | |
Rossi et al. | Detecting political bots on Twitter during the 2019 Finnish parliamentary election | |
CN107196942B (zh) | 一种基于用户语言特征的内部威胁检测方法 | |
Gessiou et al. | Irild: An information retrieval based method for information leak detection | |
JP2007148946A (ja) | 不正アクセス検知方法 | |
CN115114676A (zh) | 一种远程网页篡改监测方法、系统、设备及存储介质 | |
US20090055365A1 (en) | Auditing of curation information | |
Rauber et al. | Ethical issues in web archive creation and usage–towards a research agenda | |
JP5953851B2 (ja) | 文書管理装置及びプログラム | |
Zhu et al. | Bs-net: A behavior sequence network for insider threat detection | |
CN111353174B (zh) | 一种医疗机构的私密客户信息管理系统及方法 | |
Jóri | Protection of fundamental rights and the internet: a comparative appraisal of German and Central European constitutional case law | |
Chung et al. | Characteristics of the similarity index in a Korean medical journal | |
CN108573156A (zh) | 一种基于sql序列的数据库风险检测的方法 |