DE602005009720D1 - Verfahren, systeme und computerprogrammprodukte zur bewertung der sicherheit einer netzwerkumgebung - Google Patents

Verfahren, systeme und computerprogrammprodukte zur bewertung der sicherheit einer netzwerkumgebung

Info

Publication number
DE602005009720D1
DE602005009720D1 DE602005009720T DE602005009720T DE602005009720D1 DE 602005009720 D1 DE602005009720 D1 DE 602005009720D1 DE 602005009720 T DE602005009720 T DE 602005009720T DE 602005009720 T DE602005009720 T DE 602005009720T DE 602005009720 D1 DE602005009720 D1 DE 602005009720D1
Authority
DE
Germany
Prior art keywords
security
network environment
evaluating
systems
methods
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
DE602005009720T
Other languages
English (en)
Inventor
Pinkesh Shah
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NetIQ Corp
Original Assignee
NetIQ Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NetIQ Corp filed Critical NetIQ Corp
Publication of DE602005009720D1 publication Critical patent/DE602005009720D1/de
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)
DE602005009720T 2004-08-02 2005-07-25 Verfahren, systeme und computerprogrammprodukte zur bewertung der sicherheit einer netzwerkumgebung Active DE602005009720D1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/909,655 US7523504B2 (en) 2004-08-02 2004-08-02 Methods, systems and computer program products for evaluating security of a network environment
PCT/US2005/026245 WO2006020360A1 (en) 2004-08-02 2005-07-25 Methods, systems and computer program products for evaluating security of a network environment

Publications (1)

Publication Number Publication Date
DE602005009720D1 true DE602005009720D1 (de) 2008-10-23

Family

ID=35238058

Family Applications (1)

Application Number Title Priority Date Filing Date
DE602005009720T Active DE602005009720D1 (de) 2004-08-02 2005-07-25 Verfahren, systeme und computerprogrammprodukte zur bewertung der sicherheit einer netzwerkumgebung

Country Status (5)

Country Link
US (1) US7523504B2 (de)
EP (1) EP1784703B1 (de)
AT (1) ATE408179T1 (de)
DE (1) DE602005009720D1 (de)
WO (1) WO2006020360A1 (de)

Families Citing this family (45)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7680920B2 (en) * 2003-03-24 2010-03-16 Netiq Corporation Methods, systems and computer program products for evaluating network performance using diagnostic rules identifying performance data to be collected
JP4398777B2 (ja) * 2004-04-28 2010-01-13 株式会社東芝 時系列データ分析装置および方法
US7523504B2 (en) * 2004-08-02 2009-04-21 Netiq Corporation Methods, systems and computer program products for evaluating security of a network environment
US20060075503A1 (en) * 2004-09-13 2006-04-06 Achilles Guard, Inc. Dba Critical Watch Method and system for applying security vulnerability management process to an organization
US20070006315A1 (en) * 2005-07-01 2007-01-04 Firas Bushnaq Network asset security risk surface assessment apparatus and method
US8559921B2 (en) * 2005-08-17 2013-10-15 Freescale Semiconductor, Inc. Management of security features in a communication network
US8095984B2 (en) * 2005-09-22 2012-01-10 Alcatel Lucent Systems and methods of associating security vulnerabilities and assets
US8438643B2 (en) * 2005-09-22 2013-05-07 Alcatel Lucent Information system service-level security risk analysis
US8544098B2 (en) * 2005-09-22 2013-09-24 Alcatel Lucent Security vulnerability information aggregation
US8527756B2 (en) * 2005-10-06 2013-09-03 Cisco Technology, Inc. Security device and building block functions
US7961633B2 (en) * 2005-12-08 2011-06-14 Sanjeev Shankar Method and system for real time detection of threats in high volume data streams
US8108923B1 (en) * 2005-12-29 2012-01-31 Symantec Corporation Assessing risk based on offline activity history
US8307444B1 (en) 2006-06-12 2012-11-06 Redseal Networks, Inc. Methods and apparatus for determining network risk based upon incomplete network configuration data
US7975286B1 (en) * 2006-12-27 2011-07-05 At&T Intellectual Property Ii, L.P. Method and apparatus for evaluating assets for compliance to a security policy
US7900259B2 (en) * 2007-03-16 2011-03-01 Prevari Predictive assessment of network risks
US8341739B2 (en) * 2007-05-24 2012-12-25 Foundry Networks, Llc Managing network security
US20090024663A1 (en) * 2007-07-19 2009-01-22 Mcgovern Mark D Techniques for Information Security Assessment
KR100966073B1 (ko) * 2007-10-15 2010-06-28 한국전자통신연구원 단말 사용자 관리 장치 및 방법
US8065714B2 (en) * 2008-09-12 2011-11-22 Hytrust, Inc. Methods and systems for securely managing virtualization platform
US8166552B2 (en) * 2008-09-12 2012-04-24 Hytrust, Inc. Adaptive configuration management system
US8806632B2 (en) * 2008-11-17 2014-08-12 Solarwinds Worldwide, Llc Systems, methods, and devices for detecting security vulnerabilities in IP networks
US20100205014A1 (en) * 2009-02-06 2010-08-12 Cary Sholer Method and system for providing response services
US8549628B2 (en) * 2009-04-07 2013-10-01 Alcatel Lucent Method and apparatus to measure the security of a system, network, or application
CN102812431A (zh) 2010-03-22 2012-12-05 Lrdc系统有限公司 用于识别与保护一组源数据的完整性的方法
US8887279B2 (en) * 2011-03-31 2014-11-11 International Business Machines Corporation Distributed real-time network protection for authentication systems
CN103765820B (zh) * 2011-09-09 2016-10-26 惠普发展公司,有限责任合伙企业 基于依照事件序列中时间位置的参考基线评估事件的系统和方法
US20130074143A1 (en) * 2011-09-15 2013-03-21 Mcafee, Inc. System and method for real-time customized threat protection
US8683598B1 (en) * 2012-02-02 2014-03-25 Symantec Corporation Mechanism to evaluate the security posture of a computer system
US8832832B1 (en) * 2014-01-03 2014-09-09 Palantir Technologies Inc. IP reputation
US10110536B2 (en) * 2014-04-21 2018-10-23 Dropbox, Inc. System for managing event notifications to client devices
US9043894B1 (en) 2014-11-06 2015-05-26 Palantir Technologies Inc. Malicious software detection in a computing system
US9811562B2 (en) 2015-02-25 2017-11-07 FactorChain Inc. Event context management system
US9456000B1 (en) 2015-08-06 2016-09-27 Palantir Technologies Inc. Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications
WO2017136695A1 (en) * 2016-02-05 2017-08-10 Defensestorm, Inc. Enterprise policy tracking with security incident integration
US20170230419A1 (en) 2016-02-08 2017-08-10 Hytrust, Inc. Harmonized governance system for heterogeneous agile information technology environments
US10628590B2 (en) * 2017-01-24 2020-04-21 Salesforce.Com, Inc. Application security assessment
US10735468B1 (en) * 2017-02-14 2020-08-04 Ca, Inc. Systems and methods for evaluating security services
US11165807B2 (en) * 2017-06-26 2021-11-02 Fluency Corp. System and method for assigning threat valuations to network events and security events
CN110896386B (zh) * 2018-09-12 2022-05-10 西门子(中国)有限公司 识别安全威胁的方法、装置、存储介质、处理器和终端
US11409844B2 (en) * 2019-02-11 2022-08-09 Servicenow, Inc. Systems and methods for license management in a domain-separated architecture
CN110380896B (zh) * 2019-07-04 2022-04-01 湖北央中巨石信息技术有限公司 基于攻击图的网络安全态势感知系统和方法
CN114006706A (zh) * 2020-07-13 2022-02-01 深信服科技股份有限公司 网络安全检测方法、系统、计算机装置及可读存储介质
US20220303300A1 (en) * 2021-03-18 2022-09-22 International Business Machines Corporation Computationally assessing and remediating security threats
CN113079148B (zh) * 2021-03-25 2023-01-10 恒安嘉新(北京)科技股份公司 一种工业互联网安全监测方法、装置、设备及储存介质
US11397808B1 (en) * 2021-09-02 2022-07-26 Confluera, Inc. Attack detection based on graph edge context

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6321338B1 (en) * 1998-11-09 2001-11-20 Sri International Network surveillance
US20020066034A1 (en) * 2000-10-24 2002-05-30 Schlossberg Barry J. Distributed network security deception system
CA2430571C (en) * 2000-11-30 2011-07-12 Lancope, Inc. Flow-based detection of network intrusions
US7075894B2 (en) * 2001-03-14 2006-07-11 Fair Isaac Corporation Algorithm for prioritization of event datum in generic asynchronous telemetric streams
US20030084349A1 (en) * 2001-10-12 2003-05-01 Oliver Friedrichs Early warning system for network attacks
US7257630B2 (en) * 2002-01-15 2007-08-14 Mcafee, Inc. System and method for network vulnerability detection and reporting
ATE374493T1 (de) 2002-03-29 2007-10-15 Global Dataguard Inc Adaptive verhaltensbezogene eindringdetektion
CA2496779C (en) * 2002-08-26 2011-02-15 Guardednet, Inc. Determining threat level associated with network activity
US6742128B1 (en) * 2002-08-28 2004-05-25 Networks Associates Technology Threat assessment orchestrator system and method
US7603711B2 (en) * 2002-10-31 2009-10-13 Secnap Networks Security, LLC Intrusion detection system
US7409721B2 (en) * 2003-01-21 2008-08-05 Symantac Corporation Network risk analysis
US8201249B2 (en) * 2003-05-14 2012-06-12 Northrop Grumman Systems Corporation Steady state computer intrusion and misuse detection
US7523504B2 (en) * 2004-08-02 2009-04-21 Netiq Corporation Methods, systems and computer program products for evaluating security of a network environment

Also Published As

Publication number Publication date
US7523504B2 (en) 2009-04-21
EP1784703A1 (de) 2007-05-16
WO2006020360A1 (en) 2006-02-23
ATE408179T1 (de) 2008-09-15
EP1784703B1 (de) 2008-09-10
US20060026688A1 (en) 2006-02-02

Similar Documents

Publication Publication Date Title
DE602005009720D1 (de) Verfahren, systeme und computerprogrammprodukte zur bewertung der sicherheit einer netzwerkumgebung
WO2007124417A3 (en) Backwards researching time stamped events to find an origin of pestware
WO2007005440A3 (en) Change event correlation
GB2434670A (en) Monitoring and management of distributed information systems
GB2487027A (en) Analyzing consumer behavior using electronically-captured consumer location data
WO2007120954A3 (en) File origin determination
WO2007124416A3 (en) Backwards researching activity indicative of pestware
WO2009132148A3 (en) Systems and methods for security management based on cursor events
WO2007022364A3 (en) Change audit method, apparatus and system
GB0614334D0 (en) Network monitoring
WO2008070501A3 (en) Determining advertisement effectiveness
EP2350933A4 (de) Analyse der leistungsfähigkeit von anwendungen
HK1114229A1 (en) Line monitoring system and method
ATE532289T1 (de) System und verfahren für computersicherheit unter verwendung mehrerer käfige
SG141467A1 (en) Method to chain events in a system event log
WO2005081110A3 (en) System and method for instrumenting a software application
MX2015009172A (es) Sistemas y metodos para identificar y reportar vulnerabilidades de aplicaciones y archivos.
WO2011159434A3 (en) Distributing a task to multiple workers over a network for completion while providing quality control
WO2013040496A3 (en) System and method for real-time customized threat protection
WO2008045387A3 (en) Computerized management of grouping access rights
GB2511978A (en) Determining social sentiment using physiological data
WO2007060664A3 (en) System and method of managing data protection resources
WO2008147874A3 (en) Event capture, cross device event correlation, and responsive actions
TW200604889A (en) An item monitoring system and methods of using an item monitoring system
WO2009042582A3 (en) Predicted variable analysis based on evaluation variables relating to site selection

Legal Events

Date Code Title Description
8364 No opposition during term of opposition