JP2015535364A - 創発的ネットワーク防御システム - Google Patents
創発的ネットワーク防御システム Download PDFInfo
- Publication number
- JP2015535364A JP2015535364A JP2015533153A JP2015533153A JP2015535364A JP 2015535364 A JP2015535364 A JP 2015535364A JP 2015533153 A JP2015533153 A JP 2015533153A JP 2015533153 A JP2015533153 A JP 2015533153A JP 2015535364 A JP2015535364 A JP 2015535364A
- Authority
- JP
- Japan
- Prior art keywords
- node
- nervousness
- network
- level
- nodes
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261702484P | 2012-09-18 | 2012-09-18 | |
| US61/702,484 | 2012-09-18 | ||
| PCT/US2013/060425 WO2014182326A2 (en) | 2012-09-18 | 2013-09-18 | Emergent network defense system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| JP2015535364A true JP2015535364A (ja) | 2015-12-10 |
Family
ID=51867836
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2015533153A Pending JP2015535364A (ja) | 2012-09-18 | 2013-09-18 | 創発的ネットワーク防御システム |
Country Status (13)
| Country | Link |
|---|---|
| US (1) | US9860276B2 (enExample) |
| EP (1) | EP2898439A4 (enExample) |
| JP (1) | JP2015535364A (enExample) |
| KR (1) | KR20150058304A (enExample) |
| AU (1) | AU2013388938A1 (enExample) |
| BR (1) | BR112015005889A2 (enExample) |
| CL (1) | CL2015000669A1 (enExample) |
| IN (1) | IN2015DN02359A (enExample) |
| MX (1) | MX2015003389A (enExample) |
| PE (1) | PE20151242A1 (enExample) |
| PH (1) | PH12015500830A1 (enExample) |
| SG (1) | SG11201501854PA (enExample) |
| WO (1) | WO2014182326A2 (enExample) |
Families Citing this family (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9813449B1 (en) * | 2012-08-10 | 2017-11-07 | Lookwise S.L. | Systems and methods for providing a security information and event management system in a distributed architecture |
| US20140274246A1 (en) * | 2013-03-15 | 2014-09-18 | University Of Southern California | Localized shortest-paths estimation of influence propagation for multiple influencers |
| US10216938B2 (en) * | 2014-12-05 | 2019-02-26 | T-Mobile Usa, Inc. | Recombinant threat modeling |
| US10574675B2 (en) | 2014-12-05 | 2020-02-25 | T-Mobile Usa, Inc. | Similarity search for discovering multiple vector attacks |
| US9900299B2 (en) * | 2015-04-03 | 2018-02-20 | Oracle International Corporation | Aggregated computing infrastructure analyzer |
| US10476754B2 (en) * | 2015-04-16 | 2019-11-12 | Nec Corporation | Behavior-based community detection in enterprise information networks |
| US9832220B2 (en) * | 2015-09-22 | 2017-11-28 | The United States Of America As Represented By The Secretary Of The Air Force | Security method for allocation of virtual machines in a cloud computing network |
| US10032361B2 (en) * | 2016-06-23 | 2018-07-24 | Intel Corporation | Threat monitoring for crowd environments with swarm analytics |
| US10650621B1 (en) | 2016-09-13 | 2020-05-12 | Iocurrents, Inc. | Interfacing with a vehicular controller area network |
| US10277625B1 (en) * | 2016-09-28 | 2019-04-30 | Symantec Corporation | Systems and methods for securing computing systems on private networks |
| US10970284B2 (en) * | 2017-05-12 | 2021-04-06 | Oracle International Corporation | Dynamic self-reconfiguration of nodes in a processing pipeline |
| WO2019028341A1 (en) * | 2017-08-03 | 2019-02-07 | T-Mobile Usa, Inc. | SIMILARITY SEARCH FOR DISCOVERY OF MULTI-VECTOR ATTACKS |
| GB2578918B (en) * | 2018-11-14 | 2021-07-07 | F Secure Corp | Threat control method and system |
| US11138158B2 (en) | 2019-05-20 | 2021-10-05 | Callplex, Inc. | Binding a local data storage device to remote data storage |
| US11475126B2 (en) * | 2019-10-31 | 2022-10-18 | Dell Products, L.P. | Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem |
| CN111478813B (zh) * | 2020-04-07 | 2022-07-01 | 中国人民解放军国防科技大学 | 一种基于单层信息流传递的网络关键点分析方法 |
| CN113032782B (zh) * | 2021-03-09 | 2024-08-20 | 中国人民解放军空军工程大学 | 一种病毒传播抑制方法 |
| US12418418B2 (en) * | 2021-09-17 | 2025-09-16 | B Data Solutions Inc. | System and method for building a trusted network of devices |
| CN114139156B (zh) * | 2021-12-01 | 2024-11-01 | 浙江大学 | 一种基于博弈论的微电网信息物理系统防御方法 |
| US12267299B2 (en) * | 2022-01-12 | 2025-04-01 | Bank Of America Corporation | Preemptive threat detection for an information system |
| CN118784379B (zh) * | 2024-09-12 | 2024-11-19 | 南京中新赛克科技有限责任公司 | 动态安全基线建模方法 |
Family Cites Families (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US2005101A (en) | 1934-09-26 | 1935-06-18 | Herberts Machinery Co Ltd | Lathe |
| US6397061B1 (en) | 2000-06-24 | 2002-05-28 | Motorola, Inc. | Method and apparatus to reprioritize data transfer in a short range Ad Hoc network |
| US7305371B2 (en) * | 2001-07-06 | 2007-12-04 | Newvectors Llc | Swarming agents for distributed pattern detection and classification |
| US7352868B2 (en) | 2001-10-09 | 2008-04-01 | Philip Hawkes | Method and apparatus for security in a data processing system |
| EP1355468A1 (en) * | 2002-04-19 | 2003-10-22 | BRITISH TELECOMMUNICATIONS public limited company | Method and apparatus for network security |
| WO2003084170A1 (en) * | 2002-03-28 | 2003-10-09 | British Telecommunications Public Limited Company | Method and apparatus for network security |
| WO2003083626A1 (en) * | 2002-03-28 | 2003-10-09 | British Telecommunications Public Limited Company | Method and apparatus for network security |
| US8392999B2 (en) | 2005-12-19 | 2013-03-05 | White Cyber Knight Ltd. | Apparatus and methods for assessing and maintaining security of a computerized system under development |
| US8204684B2 (en) | 2007-06-28 | 2012-06-19 | Apple Inc. | Adaptive mobile device navigation |
| WO2009122437A2 (en) * | 2008-03-31 | 2009-10-08 | Tata Consultancy Services Limited | Security in mobile ad hoc networks |
| WO2012164150A1 (en) | 2011-05-31 | 2012-12-06 | Nokia Corporation | Method and apparatus for facilitating location based interaction over an ad-hoc mesh network |
| US8739280B2 (en) | 2011-09-29 | 2014-05-27 | Hewlett-Packard Development Company, L.P. | Context-sensitive taint analysis |
| US8595845B2 (en) | 2012-01-19 | 2013-11-26 | Mcafee, Inc. | Calculating quantitative asset risk |
-
2013
- 2013-09-18 AU AU2013388938A patent/AU2013388938A1/en not_active Abandoned
- 2013-09-18 IN IN2359DEN2015 patent/IN2015DN02359A/en unknown
- 2013-09-18 WO PCT/US2013/060425 patent/WO2014182326A2/en not_active Ceased
- 2013-09-18 SG SG11201501854PA patent/SG11201501854PA/en unknown
- 2013-09-18 US US14/428,590 patent/US9860276B2/en not_active Expired - Fee Related
- 2013-09-18 PE PE2015000388A patent/PE20151242A1/es not_active Application Discontinuation
- 2013-09-18 MX MX2015003389A patent/MX2015003389A/es unknown
- 2013-09-18 KR KR1020157009309A patent/KR20150058304A/ko not_active Withdrawn
- 2013-09-18 BR BR112015005889A patent/BR112015005889A2/pt not_active IP Right Cessation
- 2013-09-18 EP EP13884031.9A patent/EP2898439A4/en not_active Withdrawn
- 2013-09-18 JP JP2015533153A patent/JP2015535364A/ja active Pending
-
2015
- 2015-03-17 CL CL2015000669A patent/CL2015000669A1/es unknown
- 2015-04-15 PH PH12015500830A patent/PH12015500830A1/en unknown
Also Published As
| Publication number | Publication date |
|---|---|
| SG11201501854PA (en) | 2015-04-29 |
| US20150249685A1 (en) | 2015-09-03 |
| MX2015003389A (es) | 2016-05-31 |
| WO2014182326A3 (en) | 2015-09-24 |
| CL2015000669A1 (es) | 2015-10-09 |
| PH12015500830A1 (en) | 2015-06-08 |
| EP2898439A2 (en) | 2015-07-29 |
| AU2013388938A1 (en) | 2015-04-09 |
| PE20151242A1 (es) | 2015-08-29 |
| BR112015005889A2 (pt) | 2017-07-04 |
| KR20150058304A (ko) | 2015-05-28 |
| WO2014182326A2 (en) | 2014-11-13 |
| IN2015DN02359A (enExample) | 2015-09-04 |
| US9860276B2 (en) | 2018-01-02 |
| EP2898439A4 (en) | 2016-10-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2015535364A (ja) | 創発的ネットワーク防御システム | |
| Meng et al. | Enhancing medical smartphone networks via blockchain-based trust management against insider attacks | |
| Li et al. | Surveying trust-based collaborative intrusion detection: state-of-the-art, challenges and future directions | |
| Chaabouni et al. | Network intrusion detection for IoT security based on learning techniques | |
| CA2960531C (en) | Application platform security enforcement in cross device and ownership structures | |
| US10708304B2 (en) | Honeypot network services | |
| Meng et al. | Towards Bayesian-based trust management for insider attacks in healthcare software-defined networks | |
| Guha Roy et al. | A blockchain‐based cyber attack detection scheme for decentralized Internet of Things using software‐defined network | |
| US20160072770A1 (en) | Emergent network defense system | |
| Zahra et al. | Fuzzy logic and fog based secure architecture for internet of things (flfsiot) | |
| Sicari et al. | A risk assessment methodology for the Internet of Things | |
| Rafferty et al. | Intelligent multi-agent collaboration model for smart home IoT security | |
| Saeed et al. | Data-driven techniques and security issues in wireless networks | |
| Jani et al. | IoT and cyber security: introduction, attacks, and preventive steps | |
| Zeeshan | SDN based intrusion detection and prevention systems using manufacturer usage description: A survey | |
| Zhu | The doctrine of cyber effect: An ethics framework for defensive cyber deception | |
| Das et al. | Emerging cyber threats in healthcare: A study of attacks in iomt ecosystems | |
| Jouad et al. | Security challenges in intrusion detection | |
| Arunkumar et al. | Next generation firewalls for dynamic coalitions | |
| Liyakat | Malicious node detection in IoT networks using artificial neural networks: A machine learning approach | |
| Tanya et al. | A Comprehensive Study on Cybersecurity Challenges and Solutions in an IoT Framework | |
| Ray et al. | A proactive approach to DDoS attack recognition and preclusion in securing m-health systems | |
| Thanki et al. | Machine Learning for Security in Wireless Networks | |
| Ponnusamy et al. | A Survey on Intrusion Detection in Wired and Wireless Network for Future IoT Deployment | |
| Μηλιώνης | Implementation of a security information and event management (SIEM) system with integrated extended detection and response (XDR) for host and network monitoring |