HK1249603A1 - 用於生成網絡威脅情報的系統及方法 - Google Patents

用於生成網絡威脅情報的系統及方法

Info

Publication number
HK1249603A1
HK1249603A1 HK18108921.7A HK18108921A HK1249603A1 HK 1249603 A1 HK1249603 A1 HK 1249603A1 HK 18108921 A HK18108921 A HK 18108921A HK 1249603 A1 HK1249603 A1 HK 1249603A1
Authority
HK
Hong Kong
Prior art keywords
systems
methods
threat intelligence
generating network
network threat
Prior art date
Application number
HK18108921.7A
Other languages
English (en)
Inventor
Skyler J Bingham
Mahendra K Chandrakar
Lawrence W Gowin
Ryan T Korte
Original Assignee
Level 3 Communications Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US14/683,964 external-priority patent/US20150215334A1/en
Application filed by Level 3 Communications Llc filed Critical Level 3 Communications Llc
Publication of HK1249603A1 publication Critical patent/HK1249603A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
HK18108921.7A 2015-04-10 2018-07-10 用於生成網絡威脅情報的系統及方法 HK1249603A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/683,964 US20150215334A1 (en) 2012-09-28 2015-04-10 Systems and methods for generating network threat intelligence
PCT/US2016/026131 WO2016164403A1 (en) 2015-04-10 2016-04-06 Systems and methods for generating network threat intelligence

Publications (1)

Publication Number Publication Date
HK1249603A1 true HK1249603A1 (zh) 2018-11-02

Family

ID=57072871

Family Applications (1)

Application Number Title Priority Date Filing Date
HK18108921.7A HK1249603A1 (zh) 2015-04-10 2018-07-10 用於生成網絡威脅情報的系統及方法

Country Status (4)

Country Link
EP (1) EP3281116A4 (zh)
CA (1) CA2982107A1 (zh)
HK (1) HK1249603A1 (zh)
WO (1) WO2016164403A1 (zh)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11012467B2 (en) * 2017-01-27 2021-05-18 Level 3 Communications, Llc System and method for scrubbing DNS in a telecommunications network to mitigate attacks
US10778645B2 (en) 2017-06-27 2020-09-15 Microsoft Technology Licensing, Llc Firewall configuration manager
US12118492B2 (en) 2019-09-20 2024-10-15 Privva, Inc. Methods and apparatus for data-driven vendor risk assessment
US11616796B2 (en) 2019-11-11 2023-03-28 Volterra, Inc. System and method to protect resource allocation in stateful connection managers
CN111125539B (zh) * 2019-12-31 2024-02-02 武汉市烽视威科技有限公司 一种基于人工智能的cdn有害信息阻断方法及系统
CN112153009A (zh) * 2020-08-28 2020-12-29 杭州安恒信息技术股份有限公司 Ip地址的处理方法、装置、电子装置和存储介质
CN112272179B (zh) * 2020-10-23 2022-02-22 新华三信息安全技术有限公司 一种网络安全处理方法、装置、设备及机器可读存储介质
CN113726826B (zh) * 2021-11-04 2022-06-17 北京微步在线科技有限公司 一种威胁情报生成方法及装置
US20240007490A1 (en) * 2022-06-29 2024-01-04 Microsoft Technology Licensing, Llc Malicious activity probability determinations for autonomous systems
US11968123B1 (en) 2022-12-08 2024-04-23 F5, Inc. Methods for allocating a traffic load and devices thereof
CN115865526B (zh) * 2023-02-20 2023-05-30 国家工业信息安全发展研究中心 一种基于云边协同的工业互联网安全检测方法及系统
CN118250105B (zh) * 2024-05-29 2024-08-06 北京长亭科技有限公司 网络安全防护方法、服务器、安全设备、系统及存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8806632B2 (en) * 2008-11-17 2014-08-12 Solarwinds Worldwide, Llc Systems, methods, and devices for detecting security vulnerabilities in IP networks
US8516576B2 (en) * 2010-01-13 2013-08-20 Microsoft Corporation Network intrusion detection with distributed correlation
US20130074143A1 (en) * 2011-09-15 2013-03-21 Mcafee, Inc. System and method for real-time customized threat protection
US20130254260A1 (en) * 2012-03-22 2013-09-26 Akamai Technologies Inc. Network threat assessment system with servers performing message exchange accounting
US8925082B2 (en) * 2012-08-22 2014-12-30 International Business Machines Corporation Cooperative intrusion detection ecosystem for IP reputation-based security
EP2901612A4 (en) * 2012-09-28 2016-06-15 Level 3 Communications Llc APPARATUS, SYSTEM AND METHOD FOR IDENTIFYING AND MITIGATING MALICIOUS THREATS ON A NETWORK
US8881281B1 (en) * 2014-05-29 2014-11-04 Singularity Networks, Inc. Application and network abuse detection with adaptive mitigation utilizing multi-modal intelligence data

Also Published As

Publication number Publication date
EP3281116A1 (en) 2018-02-14
EP3281116A4 (en) 2018-08-15
CA2982107A1 (en) 2016-10-13
WO2016164403A1 (en) 2016-10-13

Similar Documents

Publication Publication Date Title
HK1249603A1 (zh) 用於生成網絡威脅情報的系統及方法
ZA201608349B (en) Systems and methods for communication
EP3357249C0 (en) METHODS AND SYSTEMS FOR ENABLING COMMUNICATION BETWEEN DEVICES
GB201720065D0 (en) Systems and methods
EP3105888A4 (en) Network security systems and methods
HK1260891A1 (zh) 掩蔽系統和方法
EP3205073A4 (en) Systems and methods for protecting network devices
EP3175579A4 (en) Systems and methods for network management
GB201506119D0 (en) Systems and methods
EP3318000A4 (en) INTELLIGENCE SYSTEM AND PROCEDURE AGAINST THREATS
GB2529509B (en) Adaptive beam forming devices, methods, and systems
EP3132356A4 (en) Systems and methods for generating network intelligence through real-time analytics
ZA202007214B (en) Systems and methods for encoder-guided adaptive-quality rendering
GB2543202B (en) Well ranging apparatus, methods, and systems
PL3378213T3 (pl) Systemy i sposoby uwierzytelniania komunikatów sieciowych
GB2549200B (en) Well ranging apparatus, methods and systems
HUE041722T2 (hu) Üzemanyag-semlegesítõ összeállítások, eljárások és berendezések
HUE052631T2 (hu) Eljárás és berendezés szabályok kialakítására hálózati rendszer teljesítményének javításához
GB201508175D0 (en) Methods and systems
GB201505637D0 (en) Report generation system and method
IL268388B (en) Weapon systems and methods
GB201415688D0 (en) Method and Systems
IL257134B (en) Systems and methods for multi-layer security of a communication network
SG10201502612SA (en) Engineering method and establishing system
GB201406898D0 (en) Telecommunications system and method