IN2015CH05315A - - Google Patents

Download PDF

Info

Publication number
IN2015CH05315A
IN2015CH05315A IN5315CH2015A IN2015CH05315A IN 2015CH05315 A IN2015CH05315 A IN 2015CH05315A IN 5315CH2015 A IN5315CH2015 A IN 5315CH2015A IN 2015CH05315 A IN2015CH05315 A IN 2015CH05315A
Authority
IN
India
Application number
Other languages
English (en)
Inventor
Krishna Singuru Radha
Original Assignee
Wipro Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wipro Ltd filed Critical Wipro Ltd
Priority to IN5315CH2015 priority Critical patent/IN2015CH05315A/en
Publication of IN2015CH05315A publication Critical patent/IN2015CH05315A/en
Priority to US14/943,048 priority patent/US10250630B2/en
Priority to CN201610116015.3A priority patent/CN106561025B/zh
Priority to EP16159529.3A priority patent/EP3154236B1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/80Information retrieval; Database structures therefor; File system structures therefor of semi-structured data, e.g. markup language structured data such as SGML, XML or HTML
    • G06F16/84Mapping; Conversion
    • G06F16/86Mapping to a database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4604LAN interconnection over a backbone network, e.g. Internet, Frame Relay
    • H04L12/462LAN interconnection over a bridge based backbone
    • H04L12/4625Single bridge functionality, e.g. connection of two networks over a single bridge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L49/00Packet switching elements
    • H04L49/70Virtual switches
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45587Isolation or security of virtual machine instances
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0895Configuration of virtualised networks or elements, e.g. virtualised network function or OpenFlow elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/42Centralised routing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/64Routing or path finding of packets in data switching networks using an overlay routing layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
IN5315CH2015 2015-10-05 2015-10-05 IN2015CH05315A (fr)

Priority Applications (4)

Application Number Priority Date Filing Date Title
IN5315CH2015 IN2015CH05315A (fr) 2015-10-05 2015-10-05
US14/943,048 US10250630B2 (en) 2015-10-05 2015-11-17 System and method for providing computer network security
CN201610116015.3A CN106561025B (zh) 2015-10-05 2016-03-01 用于提供计算机网络安全的系统和方法
EP16159529.3A EP3154236B1 (fr) 2015-10-05 2016-03-09 Système et procédé assurant la sécurité d'un réseau informatique

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IN5315CH2015 IN2015CH05315A (fr) 2015-10-05 2015-10-05

Publications (1)

Publication Number Publication Date
IN2015CH05315A true IN2015CH05315A (fr) 2015-10-23

Family

ID=54397763

Family Applications (1)

Application Number Title Priority Date Filing Date
IN5315CH2015 IN2015CH05315A (fr) 2015-10-05 2015-10-05

Country Status (4)

Country Link
US (1) US10250630B2 (fr)
EP (1) EP3154236B1 (fr)
CN (1) CN106561025B (fr)
IN (1) IN2015CH05315A (fr)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9892622B2 (en) * 2016-05-27 2018-02-13 At&T Intellectual Property I, L.P. Emergency event virtual network function deployment and configuration
US10216556B2 (en) 2016-07-27 2019-02-26 Sap Se Master database synchronization for multiple applications
US10366060B2 (en) * 2016-07-27 2019-07-30 Sap Se Augmenting database schema using information from multiple sources
US11182476B2 (en) * 2016-09-07 2021-11-23 Micro Focus Llc Enhanced intelligence for a security information sharing platform
US10097490B1 (en) 2017-09-01 2018-10-09 Global Tel*Link Corporation Secure forum facilitator in controlled environment
US10771239B2 (en) 2018-04-18 2020-09-08 International Business Machines Corporation Biometric threat intelligence processing for blockchains
US11416274B2 (en) * 2018-12-07 2022-08-16 International Business Machines Corporation Bridging a connection to a service by way of a container to virtually provide the service
CN110866253B (zh) * 2018-12-28 2022-05-27 北京安天网络安全技术有限公司 一种威胁分析方法、装置、电子设备及存储介质
CN110191118B (zh) * 2019-05-28 2021-06-01 哈尔滨工程大学 一种面向网络安全设备的统一指控方法及系统
US11558402B2 (en) * 2019-10-28 2023-01-17 Cisco Technology, Inc. Virtual switch-based threat defense for networks with multiple virtual network functions
CN112433808A (zh) * 2020-11-03 2021-03-02 深圳市永达电子信息股份有限公司 基于网格计算的网络安全事件检测系统及方法

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8266697B2 (en) * 2006-03-04 2012-09-11 21St Century Technologies, Inc. Enabling network intrusion detection by representing network activity in graphical form utilizing distributed data sensors to detect and transmit activity data
US20080028464A1 (en) 2006-07-25 2008-01-31 Michael Paul Bringle Systems and Methods for Data Processing Anomaly Prevention and Detection
US8707427B2 (en) * 2010-04-06 2014-04-22 Triumfant, Inc. Automated malware detection and remediation
US8726376B2 (en) * 2011-03-11 2014-05-13 Openet Telecom Ltd. Methods, systems and devices for the detection and prevention of malware within a network
US8726379B1 (en) * 2011-07-15 2014-05-13 Norse Corporation Systems and methods for dynamic protection from electronic attacks
US20130074143A1 (en) * 2011-09-15 2013-03-21 Mcafee, Inc. System and method for real-time customized threat protection
US9774616B2 (en) 2012-06-26 2017-09-26 Oppleo Security, Inc. Threat evaluation system and method
US9264301B1 (en) * 2012-09-20 2016-02-16 Wiretap Ventures, LLC High availability for software defined networks
US8898784B1 (en) 2013-05-29 2014-11-25 The United States of America, as represented by the Director, National Security Agency Device for and method of computer intrusion anticipation, detection, and remediation
CN104219218B (zh) * 2013-06-04 2018-05-08 新华三技术有限公司 一种主动安全防御的方法及装置
WO2015041706A1 (fr) 2013-09-23 2015-03-26 Mcafee, Inc. Fourniture d'un trajet rapide entre deux entités
US20150089566A1 (en) 2013-09-24 2015-03-26 Radware, Ltd. Escalation security method for use in software defined networks
US9386041B2 (en) * 2014-06-11 2016-07-05 Accenture Global Services Limited Method and system for automated incident response
US10447733B2 (en) 2014-06-11 2019-10-15 Accenture Global Services Limited Deception network system
US9210185B1 (en) * 2014-12-05 2015-12-08 Lookingglass Cyber Solutions, Inc. Cyber threat monitor and control apparatuses, methods and systems

Also Published As

Publication number Publication date
US10250630B2 (en) 2019-04-02
CN106561025B (zh) 2019-07-09
EP3154236A1 (fr) 2017-04-12
US20170099313A1 (en) 2017-04-06
EP3154236B1 (fr) 2021-10-06
CN106561025A (zh) 2017-04-12

Similar Documents

Publication Publication Date Title
BR112018002279A2 (fr)
BR112018005042A2 (fr)
IN2015CH05315A (fr)
BR112018002937A2 (fr)
BR112018005030A2 (fr)
BR112018002682A2 (fr)
BE2015C047I2 (fr)
BE2015C044I2 (fr)
BR0002435B1 (fr)
BR0212408B1 (fr)
BR0002033B1 (fr)
BR0002402B1 (fr)
BR0008719B1 (fr)
BR0002694B1 (fr)
BR0002802B1 (fr)
BR0002874B1 (fr)
BR0003166B1 (fr)
CN303100339S (fr)
CN303096229S (fr)
CN303089671S (fr)
CN303070992S (fr)
BR9812441B1 (fr)
BR0001684B1 (fr)
BR0001536B1 (fr)
BR0000763F1 (fr)