IN2014MU04068A - - Google Patents

Download PDF

Info

Publication number
IN2014MU04068A
IN2014MU04068A IN4068MU2014A IN2014MU04068A IN 2014MU04068 A IN2014MU04068 A IN 2014MU04068A IN 4068MU2014 A IN4068MU2014 A IN 4068MU2014A IN 2014MU04068 A IN2014MU04068 A IN 2014MU04068A
Authority
IN
India
Prior art keywords
information
network
blocking
host
established
Prior art date
Application number
Other languages
English (en)
Inventor
Jimit H MAHADEVIA
Shalvi D DAVE
Bhushan H TRIVEDI
Original Assignee
Cyberoam Technologies Pvt Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Publication of IN2014MU04068A publication Critical patent/IN2014MU04068A/en
Application filed by Cyberoam Technologies Pvt Ltd filed Critical Cyberoam Technologies Pvt Ltd
Priority to US15/527,783 priority Critical patent/US10630698B2/en
Priority to GB201915196A priority patent/GB201915196D0/en
Priority to IN4068MU2014 priority patent/IN2014MU04068A/en
Priority to GB1708089.6A priority patent/GB2548270B/en
Priority to PCT/GB2015/054072 priority patent/WO2016097757A1/en
Priority to US16/445,067 priority patent/US10979441B2/en
Priority to US17/215,294 priority patent/US11616791B2/en
Priority to US18/112,630 priority patent/US11882136B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition
IN4068MU2014 2014-12-18 2015-12-18 IN2014MU04068A (de)

Priority Applications (8)

Application Number Priority Date Filing Date Title
US15/527,783 US10630698B2 (en) 2014-12-18 2015-12-18 Method and system for network access control based on traffic monitoring and vulnerability detection using process related information
GB201915196A GB201915196D0 (en) 2014-12-18 2015-12-18 A method and system for network access control based on traffic monitoring and vulnerability detection using process related information
IN4068MU2014 IN2014MU04068A (de) 2014-12-18 2015-12-18
GB1708089.6A GB2548270B (en) 2014-12-18 2015-12-18 A method and system for network access control based on traffic monitoring and vulnerability detection using process related information
PCT/GB2015/054072 WO2016097757A1 (en) 2014-12-18 2015-12-18 A method and system for network access control based on traffic monitoring and vulnerability detection using process related information
US16/445,067 US10979441B2 (en) 2014-12-18 2019-06-18 Method and system for network access control based on traffic monitoring and vulnerability detection using process related information
US17/215,294 US11616791B2 (en) 2014-12-18 2021-03-29 Process-specific network access control based on traffic monitoring
US18/112,630 US11882136B2 (en) 2014-12-18 2023-02-22 Process-specific network access control based on traffic monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN4068MU2014 IN2014MU04068A (de) 2014-12-18 2015-12-18

Publications (1)

Publication Number Publication Date
IN2014MU04068A true IN2014MU04068A (de) 2015-06-05

Family

ID=54199377

Family Applications (1)

Application Number Title Priority Date Filing Date
IN4068MU2014 IN2014MU04068A (de) 2014-12-18 2015-12-18

Country Status (4)

Country Link
US (4) US10630698B2 (de)
GB (2) GB201915196D0 (de)
IN (1) IN2014MU04068A (de)
WO (1) WO2016097757A1 (de)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9917851B2 (en) 2014-04-28 2018-03-13 Sophos Limited Intrusion detection using a heartbeat
US10122753B2 (en) 2014-04-28 2018-11-06 Sophos Limited Using reputation to avoid false malware detections
WO2016097757A1 (en) 2014-12-18 2016-06-23 Sophos Limited A method and system for network access control based on traffic monitoring and vulnerability detection using process related information
CN106936793B (zh) * 2015-12-30 2020-03-17 腾讯科技(深圳)有限公司 一种信息拦截处理方法及终端
US10623376B2 (en) * 2016-01-29 2020-04-14 Zenedge, Inc. Qualifying client behavior to mitigate attacks on a host
US10397256B2 (en) * 2016-06-13 2019-08-27 Microsoft Technology Licensing, Llc Spam classification system based on network flow data
US20180034843A1 (en) * 2016-07-29 2018-02-01 Rohde & Schwarz Gmbh & Co. Kg Method and apparatus for testing a security of communication of a device under test
WO2018100432A1 (en) * 2016-12-02 2018-06-07 Secude Ag Data stream surveillance, intelligence and reporting
JP6938205B2 (ja) * 2017-05-02 2021-09-22 アライドテレシスホールディングス株式会社 アクセス制御システム
US10616260B2 (en) 2017-11-30 2020-04-07 Bank Of America Corporation System for information security threat assessment
US10635822B2 (en) 2017-11-30 2020-04-28 Bank Of America Corporation Data integration system for triggering analysis of connection oscillations
US10826929B2 (en) 2017-12-01 2020-11-03 Bank Of America Corporation Exterior data deployment system using hash generation and confirmation triggering
US11050783B2 (en) * 2018-01-31 2021-06-29 International Business Machines Corporation System and method for detecting client participation in malware activity
JP2021103342A (ja) * 2018-04-02 2021-07-15 ソニーグループ株式会社 情報処理装置、情報処理方法、およびプログラム
US10911479B2 (en) 2018-08-06 2021-02-02 Microsoft Technology Licensing, Llc Real-time mitigations for unfamiliar threat scenarios
US10826756B2 (en) * 2018-08-06 2020-11-03 Microsoft Technology Licensing, Llc Automatic generation of threat remediation steps by crowd sourcing security solutions
US11520898B2 (en) * 2019-03-28 2022-12-06 EMC IP Holding Company LLC Intrusion detection
US11218503B2 (en) * 2019-07-19 2022-01-04 Jpmorgan Chase Bank, N.A. System and method for implementing a vulnerability management module
US11528291B2 (en) * 2019-11-25 2022-12-13 Mcafee, Llc Methods and apparatus for defending against exploitation of vulnerable software
US11363041B2 (en) * 2020-05-15 2022-06-14 International Business Machines Corporation Protecting computer assets from malicious attacks
US11966476B2 (en) * 2020-05-17 2024-04-23 Avocado Systems, Inc. Deep application discovery and forensics for automated threat modeling
US11895144B2 (en) * 2020-05-22 2024-02-06 AuthMind Inc. Systems and methods for network security
CN112487434A (zh) * 2020-11-05 2021-03-12 杭州孝道科技有限公司 一种应用软件自适应安全防护方法
CN113315786B (zh) * 2021-06-25 2023-05-26 郑州信源信息技术股份有限公司 一种安全认证方法及系统
CN114430347A (zh) * 2022-01-31 2022-05-03 上海纽盾科技股份有限公司 网络资产的安全态势感知防御方法、装置及系统

Family Cites Families (141)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6131120A (en) 1997-10-24 2000-10-10 Directory Logic, Inc. Enterprise network management directory containing network addresses of users and devices providing access lists to routers and servers
US6321338B1 (en) 1998-11-09 2001-11-20 Sri International Network surveillance
US7181769B1 (en) * 2000-08-25 2007-02-20 Ncircle Network Security, Inc. Network security system having a device profiler communicatively coupled to a traffic monitor
US9525696B2 (en) * 2000-09-25 2016-12-20 Blue Coat Systems, Inc. Systems and methods for processing data flows
US20110238855A1 (en) * 2000-09-25 2011-09-29 Yevgeny Korsunsky Processing data flows with a data flow processor
US20020186683A1 (en) 2001-04-02 2002-12-12 Alan Buck Firewall gateway for voice over internet telephony communications
US7028179B2 (en) 2001-07-03 2006-04-11 Intel Corporation Apparatus and method for secure, automated response to distributed denial of service attacks
US7647422B2 (en) 2001-11-06 2010-01-12 Enterasys Networks, Inc. VPN failure recovery
US7174566B2 (en) 2002-02-01 2007-02-06 Intel Corporation Integrated network intrusion detection
US8561167B2 (en) 2002-03-08 2013-10-15 Mcafee, Inc. Web reputation scoring
US7366894B1 (en) 2002-06-25 2008-04-29 Cisco Technology, Inc. Method and apparatus for dynamically securing voice and other delay-sensitive network traffic
US7152242B2 (en) * 2002-09-11 2006-12-19 Enterasys Networks, Inc. Modular system for detecting, filtering and providing notice about attack events associated with network security
US8272061B1 (en) 2002-10-01 2012-09-18 Skyobox security Inc. Method for evaluating a network
US7634230B2 (en) 2002-11-25 2009-12-15 Fujitsu Limited Methods and apparatus for secure, portable, wireless and multi-hop data networking
US7339887B2 (en) 2003-05-06 2008-03-04 Overture Networks, Inc. Multipoint protected switching ring
US7472422B1 (en) 2003-09-10 2008-12-30 Symantec Corporation Security management system including feedback and control
US7340597B1 (en) 2003-09-19 2008-03-04 Cisco Technology, Inc. Method and apparatus for securing a communications device using a logging module
US7814554B1 (en) 2003-11-06 2010-10-12 Gary Dean Ragner Dynamic associative storage security for long-term memory storage devices
US7424736B2 (en) 2004-03-10 2008-09-09 Combrio, Inc. Method for establishing directed circuits between parties with limited mutual trust
US8963713B2 (en) 2005-03-16 2015-02-24 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US8146160B2 (en) 2004-03-24 2012-03-27 Arbor Networks, Inc. Method and system for authentication event security policy generation
US7383462B2 (en) 2004-07-02 2008-06-03 Hitachi, Ltd. Method and apparatus for encrypted remote copy for secure data backup and restoration
US7620001B2 (en) 2004-10-13 2009-11-17 Good Technology, Inc. Communication system and method with mobile devices
US7478424B2 (en) 2004-11-30 2009-01-13 Cymtec Systems, Inc. Propagation protection within a network
WO2006101549A2 (en) 2004-12-03 2006-09-28 Whitecell Software, Inc. Secure system for allowing the execution of authorized computer program code
US7620974B2 (en) 2005-01-12 2009-11-17 Symantec Distributed traffic scanning through data stream security tagging
US7370143B1 (en) 2005-06-20 2008-05-06 Network Appliance, Inc. Controlling write request access to a non-volatile log
US7669242B2 (en) 2005-06-30 2010-02-23 Intel Corporation Agent presence monitor configured to execute in a secure environment
GB0513375D0 (en) 2005-06-30 2005-08-03 Retento Ltd Computer security
US7599301B2 (en) 2005-07-01 2009-10-06 Net Optics, Inc. Communications network tap with heartbeat monitor
US7979368B2 (en) 2005-07-01 2011-07-12 Crossbeam Systems, Inc. Systems and methods for processing data flows
US8984636B2 (en) 2005-07-29 2015-03-17 Bit9, Inc. Content extractor and analysis system
CN101283539B (zh) 2005-10-05 2012-10-24 拜尔斯安全公司 网络安全设备
US7917613B2 (en) 2005-11-15 2011-03-29 Microsoft Corporation Heartbeat heuristics
US7926108B2 (en) 2005-11-23 2011-04-12 Trend Micro Incorporated SMTP network security processing in a transparent relay in a computer network
US20070143851A1 (en) 2005-12-21 2007-06-21 Fiberlink Method and systems for controlling access to computing resources based on known security vulnerabilities
US20070167194A1 (en) 2006-01-13 2007-07-19 Research In Motion Limited Plural wirelessly connected devices with user alarm if wireless connection is lost or endangered
US7975058B2 (en) 2006-01-31 2011-07-05 Cisco Technology, Inc. Systems and methods for remote access of network devices having private addresses
US9167000B2 (en) 2006-02-14 2015-10-20 Ca, Inc. Dynamic threat event management system and method
CN101444119A (zh) 2006-03-27 2009-05-27 意大利电信股份公司 在移动通信设备上实施安全策略的系统
US8201243B2 (en) 2006-04-20 2012-06-12 Webroot Inc. Backwards researching activity indicative of pestware
US8181244B2 (en) 2006-04-20 2012-05-15 Webroot Inc. Backward researching time stamped events to find an origin of pestware
US7890612B2 (en) 2006-05-08 2011-02-15 Electro Guard Corp. Method and apparatus for regulating data flow between a communications device and a network
US9098706B1 (en) 2006-07-31 2015-08-04 Symantec Corporation Installer trust chain validation
US8190868B2 (en) 2006-08-07 2012-05-29 Webroot Inc. Malware management through kernel detection
GB0623101D0 (en) 2006-11-20 2006-12-27 British Telecomm Secure network architecture
US8020207B2 (en) 2007-01-23 2011-09-13 Alcatel Lucent Containment mechanism for potentially contaminated end systems
US8179798B2 (en) 2007-01-24 2012-05-15 Mcafee, Inc. Reputation based connection throttling
US20080310337A1 (en) 2007-06-18 2008-12-18 Gainspan, Inc. Periodic heartbeat communication between devices and a control point
US20090064334A1 (en) 2007-08-30 2009-03-05 International Business Machines Corporation Adaptive Autonomic Threat Detection and Quarantine
EP2048847A1 (de) 2007-10-08 2009-04-15 Nokia Siemens Networks Oy Verfahren, Vorrichtungen, System und entsprechendes Computerprogrammprodukt für Richtlinienkontrolle
US20090172114A1 (en) 2007-12-31 2009-07-02 International Business Machines Corporation System and method for server-side interruption management
US8347355B2 (en) 2008-01-17 2013-01-01 Aerohive Networks, Inc. Networking as a service: delivering network services using remote appliances controlled via a hosted, multi-tenant management system
US7890637B1 (en) 2008-02-25 2011-02-15 Juniper Networks, Inc. Secure communications in a system having multi-homed devices
US20090247125A1 (en) 2008-03-27 2009-10-01 Grant Calum Anders Mckay Method and system for controlling access of computer resources of mobile client facilities
US8806630B2 (en) 2008-05-13 2014-08-12 At&T Intellectual Property, I, L.P. Methods and apparatus for intrusion protection in systems that monitor for improper network usage
US9152789B2 (en) 2008-05-28 2015-10-06 Zscaler, Inc. Systems and methods for dynamic cloud-based malware behavior analysis
US8090852B2 (en) 2008-06-04 2012-01-03 Sophos Plc Managing use of proxies to access restricted network locations
US8229812B2 (en) 2009-01-28 2012-07-24 Headwater Partners I, Llc Open transaction central billing system
US8413238B1 (en) 2008-07-21 2013-04-02 Zscaler, Inc. Monitoring darknet access to identify malicious activity
US10262136B1 (en) 2008-08-04 2019-04-16 Zscaler, Inc. Cloud-based malware detection
US8286255B2 (en) 2008-08-07 2012-10-09 Sophos Plc Computer file control through file tagging
US8556991B2 (en) 2008-08-08 2013-10-15 Absolute Software Corporation Approaches for ensuring data security
US8677473B2 (en) 2008-11-18 2014-03-18 International Business Machines Corporation Network intrusion protection
US8462212B1 (en) 2008-12-04 2013-06-11 Stoplift, Inc. Correlating detected events with image data
US7898939B2 (en) 2008-12-16 2011-03-01 At&T Intellectual Property I, L.P. Scalable and robust mechanism for remote IP device monitoring with changing IP address assignment
US9270698B2 (en) 2008-12-30 2016-02-23 Intel Corporation Filter for network intrusion and virus detection
US20140075567A1 (en) 2009-01-28 2014-03-13 Headwater Partners I Llc Service Processor Configurations for Enhancing or Augmenting System Software of a Mobile Communications Device
US9270559B2 (en) 2009-01-28 2016-02-23 Headwater Partners I Llc Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
US8417954B1 (en) 2009-02-11 2013-04-09 Hewlett-Packard Development Company, L.P. Installation image including digital signature
US8392972B2 (en) 2009-02-11 2013-03-05 Sophos Plc Protected access control method for shared computer resources
US20100212010A1 (en) 2009-02-18 2010-08-19 Stringer John D Systems and methods that detect sensitive data leakages from applications
US9177145B2 (en) 2009-03-24 2015-11-03 Sophos Limited Modified file tracking on virtual machines
US8353058B1 (en) 2009-03-24 2013-01-08 Symantec Corporation Methods and systems for detecting rootkits
US8479267B2 (en) 2009-06-30 2013-07-02 Sophos Limited System and method for identifying unauthorized endpoints
US20110055891A1 (en) 2009-08-26 2011-03-03 Rice Christopher T Device security
JP5551913B2 (ja) 2009-10-13 2014-07-16 株式会社クローラ研究所 動画追尾による情報提供システム
US8621460B2 (en) 2009-11-02 2013-12-31 International Business Machines Corporation Endpoint-hosted hypervisor management
US20120174219A1 (en) 2010-05-14 2012-07-05 Mcafee, Inc. Identifying mobile device reputations
US20110296519A1 (en) 2010-05-14 2011-12-01 Mcafee, Inc. Reputation based connection control
US8374183B2 (en) 2010-06-22 2013-02-12 Microsoft Corporation Distributed virtual network gateways
US8510829B2 (en) 2010-06-24 2013-08-13 Mcafee, Inc. Systems and methods to detect malicious media files
US8938800B2 (en) 2010-07-28 2015-01-20 Mcafee, Inc. System and method for network level protection against malicious software
US8925101B2 (en) 2010-07-28 2014-12-30 Mcafee, Inc. System and method for local protection against malicious software
US9235586B2 (en) 2010-09-13 2016-01-12 Microsoft Technology Licensing, Llc Reputation checking obtained files
US8407804B2 (en) 2010-09-13 2013-03-26 Sophos Plc System and method of whitelisting parent virtual images
US8671449B1 (en) 2010-11-10 2014-03-11 Symantec Corporation Systems and methods for identifying potential malware
US9413721B2 (en) 2011-02-15 2016-08-09 Webroot Inc. Methods and apparatus for dealing with malware
US9270639B2 (en) 2011-02-16 2016-02-23 Fortinet, Inc. Load balancing among a cluster of firewall security devices
US9047441B2 (en) 2011-05-24 2015-06-02 Palo Alto Networks, Inc. Malware analysis system
US9118702B2 (en) 2011-05-31 2015-08-25 Bce Inc. System and method for generating and refining cyber threat intelligence data
US8990560B2 (en) 2011-06-17 2015-03-24 The Boeing Company Multiple independent levels of security (MILS) host to multilevel secure (MLS) offload communications unit
US8706834B2 (en) 2011-06-30 2014-04-22 Amazon Technologies, Inc. Methods and apparatus for remotely updating executing processes
EP2737742A4 (de) 2011-07-27 2015-01-28 Seven Networks Inc Automatische erzeugung und verteilung von richtlinieninformationen über bösartigen mobilverkehr in einem drahtlosen netzwerk
US20130031632A1 (en) 2011-07-28 2013-01-31 Dell Products, Lp System and Method for Detecting Malicious Content
US9256735B2 (en) 2011-10-10 2016-02-09 Masergy Communications, Inc. Detecting emergent behavior in communications networks
JP5687173B2 (ja) 2011-11-15 2015-03-18 株式会社日立製作所 通信システム及び方法、ハートビート代行サーバ
US20130232576A1 (en) 2011-11-18 2013-09-05 Vinsula, Inc. Systems and methods for cyber-threat detection
US9235706B2 (en) 2011-12-02 2016-01-12 Mcafee, Inc. Preventing execution of task scheduled malware
WO2013103988A1 (en) 2012-01-05 2013-07-11 Seven Networks, Inc. Detection and management of user interactions with foreground applications on a mobile device in distributed caching
US8914406B1 (en) 2012-02-01 2014-12-16 Vorstack, Inc. Scalable network security with fast response protocol
CA2859415C (en) 2012-02-21 2016-01-12 Logos Technologies, Llc System for detecting, analyzing, and controlling infiltration of computer and network systems
US8918881B2 (en) 2012-02-24 2014-12-23 Appthority, Inc. Off-device anti-malware protection for mobile devices
US8931043B2 (en) 2012-04-10 2015-01-06 Mcafee Inc. System and method for determining and using local reputations of users and hosts to protect information in a network environment
WO2013186640A2 (en) 2012-05-24 2013-12-19 Lundy Douglas H Threat detection system and method
US9055090B2 (en) 2012-06-12 2015-06-09 Verizon Patent And Licensing Inc. Network based device security and controls
US9374374B2 (en) 2012-06-19 2016-06-21 SecureMySocial, Inc. Systems and methods for securing social media for users and businesses and rewarding for enhancing security
US8819772B2 (en) 2012-06-25 2014-08-26 Appthority, Inc. In-line filtering of insecure or unwanted mobile device software components or communications
US8700899B1 (en) 2012-06-27 2014-04-15 Emc Corporation Forward-secure key unlocking for cryptographic devices
US9088606B2 (en) * 2012-07-05 2015-07-21 Tenable Network Security, Inc. System and method for strategic anti-malware monitoring
KR101369727B1 (ko) 2012-07-11 2014-03-06 한국전자통신연구원 캡차를 기반으로 하는 트래픽 제어 장치 및 그 방법
US9191399B2 (en) 2012-09-11 2015-11-17 The Boeing Company Detection of infected network devices via analysis of responseless outgoing network traffic
US9178715B2 (en) 2012-10-01 2015-11-03 International Business Machines Corporation Providing services to virtual overlay network traffic
US8655307B1 (en) 2012-10-26 2014-02-18 Lookout, Inc. System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security
US9124636B1 (en) 2012-12-28 2015-09-01 Pulse Secure, Llc Infected endpoint containment using aggregated security status information
US9430646B1 (en) 2013-03-14 2016-08-30 Fireeye, Inc. Distributed systems and methods for automatically detecting unknown bots and botnets
US10742601B2 (en) 2013-03-14 2020-08-11 Fortinet, Inc. Notifying users within a protected network regarding events and information
US9614865B2 (en) 2013-03-15 2017-04-04 Mcafee, Inc. Server-assisted anti-malware client
WO2014143000A1 (en) 2013-03-15 2014-09-18 Mcafee, Inc. Server-assisted anti-malware
US9143519B2 (en) 2013-03-15 2015-09-22 Mcafee, Inc. Remote malware remediation
US9578045B2 (en) 2013-05-03 2017-02-21 Webroot Inc. Method and apparatus for providing forensic visibility into systems and networks
US20150047032A1 (en) 2013-08-07 2015-02-12 Front Porch Communications, Inc. System and method for computer security
US9781019B1 (en) 2013-08-15 2017-10-03 Symantec Corporation Systems and methods for managing network communication
US9215250B2 (en) 2013-08-20 2015-12-15 Janus Technologies, Inc. System and method for remotely managing security and configuration of compute devices
US9628507B2 (en) 2013-09-30 2017-04-18 Fireeye, Inc. Advanced persistent threat (APT) detection center
US9578052B2 (en) 2013-10-24 2017-02-21 Mcafee, Inc. Agent assisted malicious application blocking in a network environment
US9386034B2 (en) 2013-12-17 2016-07-05 Hoplite Industries, Inc. Behavioral model based malware protection system and method
US9210183B2 (en) 2013-12-19 2015-12-08 Microsoft Technology Licensing, Llc Detecting anomalous activity from accounts of an online service
JP6188956B2 (ja) 2013-12-30 2017-08-30 ノキア テクノロジーズ オーユー マルウェア検出検査方法及び装置
US8832832B1 (en) 2014-01-03 2014-09-09 Palantir Technologies Inc. IP reputation
US20150201016A1 (en) 2014-01-14 2015-07-16 Amit Golander Methods and system for incorporating a direct attached storage to a network attached storage
US9483482B2 (en) 2014-02-17 2016-11-01 Netapp, Inc. Partitioning file system namespace
US10320676B2 (en) 2014-02-28 2019-06-11 Cisco Technology, Inc. Smarter policy decisions based on metadata in data flows
US9270636B2 (en) 2014-04-07 2016-02-23 Oracle International Corporation Neighbor lookup operations in a network node
US9392015B2 (en) 2014-04-28 2016-07-12 Sophos Limited Advanced persistent threat detection
US9917851B2 (en) 2014-04-28 2018-03-13 Sophos Limited Intrusion detection using a heartbeat
US10122753B2 (en) 2014-04-28 2018-11-06 Sophos Limited Using reputation to avoid false malware detections
WO2016097757A1 (en) 2014-12-18 2016-06-23 Sophos Limited A method and system for network access control based on traffic monitoring and vulnerability detection using process related information
US9736693B2 (en) 2015-07-21 2017-08-15 Motorola Solutions, Inc. Systems and methods for monitoring an operating system of a mobile wireless communication device for unauthorized modifications
US9928366B2 (en) 2016-04-15 2018-03-27 Sophos Limited Endpoint malware detection using an event graph
US9716617B1 (en) 2016-06-14 2017-07-25 ShieldX Networks, Inc. Dynamic, load-based, auto-scaling network security microservices architecture

Also Published As

Publication number Publication date
US11616791B2 (en) 2023-03-28
US20170339172A1 (en) 2017-11-23
GB2548270B (en) 2019-10-30
US20230208860A1 (en) 2023-06-29
US20190306181A1 (en) 2019-10-03
US20210250367A1 (en) 2021-08-12
GB2548270A (en) 2017-09-13
US10630698B2 (en) 2020-04-21
US10979441B2 (en) 2021-04-13
GB201915196D0 (en) 2019-12-04
US11882136B2 (en) 2024-01-23
GB201708089D0 (en) 2017-07-05
WO2016097757A1 (en) 2016-06-23

Similar Documents

Publication Publication Date Title
IN2014MU04068A (de)
WO2015013376A3 (en) Systems and methods for self-tuning network intrusion detection and prevention
AU2016202184B1 (en) Event correlation across heterogeneous operations
MX2018005237A (es) Deteccion de anomalias en una secuencia de datos.
WO2013164821A3 (en) Detection and prevention for malicious threats
WO2016004403A3 (en) Sensor-based human authorization evaluation
WO2014078585A3 (en) Methods, systems and computer readable media for detecting command injection attacks
IL270310B (en) A system and method for threat monitoring, detection and response
SG10201914133SA (en) Methods and systems for personal information detection, extraction, linking, protection and management
SG11202101452RA (en) Methods, machine learning engines and file management platform systems for content and context aware data classification and security anomaly detection
GB2525719A8 (en) Method and system for providing a vulnerability management and verification service
EP4307192A3 (de) System und verfahren zur überwachung der herstellung
WO2014153462A3 (en) Advanced authentication techniques and applications
NZ610890A (en) Method and system for detecting an event on a sports track
EP4243372A3 (de) Verfahren und system zum abfangen und entschlüsseln von fingerabdruckgeschütztem medienverkehr
WO2014008079A3 (en) Systems and methods for identity authentication using a social network
WO2015142410A3 (en) Systems and methods for creating fingerprints of encryption devices
EP3394779A4 (de) Verfahren und systeme zur identitätserstellung, -verifikation und -verwaltung
GB201208529D0 (en) Foiling a document exploit attack
WO2018080124A3 (ko) 딥 러닝 신경망 기반의 보안 시스템 및 그 제어 방법
MX2016017148A (es) Sistema y metodo para deteccion de multiples caracteristicas y analisis de una llanta en rotacion.
SG11201702919UA (en) Voiceprint information management method and apparatus, and identity authentication method and system
WO2016019060A3 (en) Automated password generation and change
IL227598B (en) Systems and methods for identifying malicious hosts
WO2014105994A3 (en) Query system and method to determine authentication capabilities