JP2017511072A5 - - Google Patents
Download PDFInfo
- Publication number
- JP2017511072A5 JP2017511072A5 JP2016561300A JP2016561300A JP2017511072A5 JP 2017511072 A5 JP2017511072 A5 JP 2017511072A5 JP 2016561300 A JP2016561300 A JP 2016561300A JP 2016561300 A JP2016561300 A JP 2016561300A JP 2017511072 A5 JP2017511072 A5 JP 2017511072A5
- Authority
- JP
- Japan
- Prior art keywords
- traffic flow
- level
- detail
- condition
- inspection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007689 inspection Methods 0.000 claims 20
- 238000000034 method Methods 0.000 claims 11
- 238000001514 detection method Methods 0.000 claims 2
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/251,049 | 2014-04-11 | ||
| US14/251,049 US9088508B1 (en) | 2014-04-11 | 2014-04-11 | Incremental application of resources to network traffic flows based on heuristics and business policies |
| PCT/US2015/024156 WO2015157095A1 (en) | 2014-04-11 | 2015-04-02 | Incremental application of resources to network traffic flows based on heuristics and business policies |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| JP2017511072A JP2017511072A (ja) | 2017-04-13 |
| JP2017511072A5 true JP2017511072A5 (enExample) | 2018-05-17 |
| JP6598382B2 JP6598382B2 (ja) | 2019-10-30 |
Family
ID=52946308
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| JP2016561300A Active JP6598382B2 (ja) | 2014-04-11 | 2015-04-02 | ヒューリスティック及びビジネスポリシーに基づく、ネットワークトラフィックフローに対するリソースのインクリメンタルアプリケーション |
Country Status (6)
| Country | Link |
|---|---|
| US (4) | US9088508B1 (enExample) |
| EP (1) | EP2930885B1 (enExample) |
| JP (1) | JP6598382B2 (enExample) |
| CN (1) | CN106416134A (enExample) |
| CA (1) | CA2887803C (enExample) |
| WO (1) | WO2015157095A1 (enExample) |
Families Citing this family (25)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9088508B1 (en) | 2014-04-11 | 2015-07-21 | Level 3 Communications, Llc | Incremental application of resources to network traffic flows based on heuristics and business policies |
| US10127383B2 (en) * | 2014-11-06 | 2018-11-13 | International Business Machines Corporation | Resource usage optimized auditing of database shared memory |
| US10341203B2 (en) | 2015-01-02 | 2019-07-02 | Gigamon Inc. | Policy tracking in a network that includes virtual devices |
| US10142353B2 (en) | 2015-06-05 | 2018-11-27 | Cisco Technology, Inc. | System for monitoring and managing datacenters |
| US10536357B2 (en) | 2015-06-05 | 2020-01-14 | Cisco Technology, Inc. | Late data detection in data center |
| CN106487766B (zh) * | 2015-08-31 | 2021-10-29 | 微软技术许可有限责任公司 | 具有独立服务子系统的路由设备 |
| US11902118B2 (en) * | 2016-07-18 | 2024-02-13 | Telecom Italia S.P.A. | Traffic monitoring in a packet-switched communication network |
| US10659476B2 (en) * | 2016-09-12 | 2020-05-19 | Architecture Technology Corporation | Transparent bridge for monitoring crypto-partitioned wide-area network |
| US10833891B2 (en) * | 2017-02-11 | 2020-11-10 | Pismo Labs Technology Limited | Methods and systems for transmitting information packets through tunnel groups at a network node |
| JP6934758B2 (ja) * | 2017-06-28 | 2021-09-15 | アラクサラネットワークス株式会社 | パケット中継装置およびパケット中継方法 |
| US20190036842A1 (en) * | 2017-07-31 | 2019-01-31 | Cisco Technology, Inc. | Traffic steering in fastpath |
| US20190036814A1 (en) * | 2017-07-31 | 2019-01-31 | Cisco Technology, Inc. | Traffic steering with path ordering |
| KR102373874B1 (ko) | 2017-08-16 | 2022-03-14 | 삼성전자주식회사 | 소프트웨어 정의 네트워크에서 네트워크 공격을 처리하기 위한 장치 및 방법 |
| US10798015B2 (en) * | 2018-01-25 | 2020-10-06 | Cisco Technology, Inc. | Discovery of middleboxes using traffic flow stitching |
| US12463985B2 (en) | 2018-02-20 | 2025-11-04 | Darktrace Holdings Limited | Endpoint agent client sensors (cSENSORS) and associated infrastructures for extending network visibility in an artificial intelligence (AI) threat defense environment |
| US10742608B2 (en) * | 2018-03-08 | 2020-08-11 | Ribbon Communications Operating Company, Inc. | Communications methods, systems and apparatus for packet policing |
| JP7371686B2 (ja) * | 2019-06-05 | 2023-10-31 | 日本電信電話株式会社 | 要求通信品質推定装置、要求通信品質推定方法、及びプログラム |
| WO2021236661A1 (en) | 2020-05-18 | 2021-11-25 | Darktrace, Inc. | Endpoint client sensors for extending network visibility |
| US11641392B2 (en) * | 2020-06-04 | 2023-05-02 | Nec Corporation | Methods and systems for de-centralized data sharing with enforced data usage control for cross-party data analytics |
| US11463366B1 (en) | 2020-09-22 | 2022-10-04 | Architecture Technology Corporation | Autonomous network optimization using network templates |
| JP7104201B2 (ja) * | 2021-03-19 | 2022-07-20 | アラクサラネットワークス株式会社 | パケット中継装置およびパケット中継方法 |
| US11882448B2 (en) * | 2021-06-07 | 2024-01-23 | Sr Technologies, Inc. | System and method for packet detail detection and precision blocking |
| US11425099B1 (en) * | 2022-03-08 | 2022-08-23 | Uab 360 It | Managing data communication in a virtual private network |
| US20250007800A1 (en) * | 2023-06-30 | 2025-01-02 | Netscout Systems, Inc. | Systems and methods for temporal context monitoring and enforcement for telecommunications networks |
| US20250337753A1 (en) * | 2024-04-29 | 2025-10-30 | Dell Products L.P. | Managing intrusion events using a management controller |
Family Cites Families (50)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7478161B2 (en) * | 1999-11-30 | 2009-01-13 | Microsoft Corporation | Network quality of service for qualitative applications |
| JP3820832B2 (ja) * | 2000-02-21 | 2006-09-13 | コニカミノルタビジネステクノロジーズ株式会社 | 画像読取装置 |
| US20020133586A1 (en) * | 2001-01-16 | 2002-09-19 | Carter Shanklin | Method and device for monitoring data traffic and preventing unauthorized access to a network |
| US7225271B1 (en) * | 2001-06-29 | 2007-05-29 | Cisco Technology, Inc. | System and method for recognizing application-specific flows and assigning them to queues |
| EP1412870A4 (en) * | 2001-07-30 | 2005-07-13 | Alcatel Internetworking Inc | DISTRIBUTED NETWORK MANAGEMENT SYSTEM WITH GUIDELINES |
| US7331060B1 (en) * | 2001-09-10 | 2008-02-12 | Xangati, Inc. | Dynamic DoS flooding protection |
| NZ516346A (en) * | 2001-12-21 | 2004-09-24 | Esphion Ltd | A device for evaluating traffic on a computer network to detect traffic abnormalities such as a denial of service attack |
| US7076803B2 (en) * | 2002-01-28 | 2006-07-11 | International Business Machines Corporation | Integrated intrusion detection services |
| US8209756B1 (en) * | 2002-02-08 | 2012-06-26 | Juniper Networks, Inc. | Compound attack detection in a computer network |
| US20030188189A1 (en) * | 2002-03-27 | 2003-10-02 | Desai Anish P. | Multi-level and multi-platform intrusion detection and response system |
| US6983323B2 (en) * | 2002-08-12 | 2006-01-03 | Tippingpoint Technologies, Inc. | Multi-level packet screening with dynamically selected filtering criteria |
| KR100445665B1 (ko) * | 2002-08-16 | 2004-08-21 | 주식회사 엔에스텍 | 복수의 대역폭 데이터들을 분산처리하는 통신망 관리장치및 그 방법 |
| US8201252B2 (en) * | 2002-09-03 | 2012-06-12 | Alcatel Lucent | Methods and devices for providing distributed, adaptive IP filtering against distributed denial of service attacks |
| JP3966231B2 (ja) * | 2003-06-11 | 2007-08-29 | 日本電信電話株式会社 | ネットワークシステムと不正アクセス制御方法およびプログラム |
| US7409712B1 (en) * | 2003-07-16 | 2008-08-05 | Cisco Technology, Inc. | Methods and apparatus for network message traffic redirection |
| US20050050334A1 (en) * | 2003-08-29 | 2005-03-03 | Trend Micro Incorporated, A Japanese Corporation | Network traffic management by a virus/worm monitor in a distributed network |
| KR100666980B1 (ko) * | 2004-01-19 | 2007-01-10 | 삼성전자주식회사 | 트래픽 폭주 제어 방법 및 이를 구현하기 위한 장치 |
| US8220055B1 (en) * | 2004-02-06 | 2012-07-10 | Symantec Corporation | Behavior blocking utilizing positive behavior system and method |
| GB0407144D0 (en) * | 2004-03-30 | 2004-05-05 | British Telecomm | Networks |
| JP4634456B2 (ja) * | 2004-09-09 | 2011-02-16 | アバイア インコーポレーテッド | ネットワーク・トラフィックのセキュリティのための方法およびシステム |
| US7797411B1 (en) * | 2005-02-02 | 2010-09-14 | Juniper Networks, Inc. | Detection and prevention of encapsulated network attacks using an intermediate device |
| JP4547342B2 (ja) * | 2005-04-06 | 2010-09-22 | アラクサラネットワークス株式会社 | ネットワーク制御装置と制御システム並びに制御方法 |
| US7861296B2 (en) * | 2005-06-16 | 2010-12-28 | Microsoft Corporation | System and method for efficiently scanning a file for malware |
| JP4545647B2 (ja) * | 2005-06-17 | 2010-09-15 | 富士通株式会社 | 攻撃検知・防御システム |
| CN1917426B (zh) * | 2005-08-17 | 2010-12-08 | 国际商业机器公司 | 端口扫描方法与设备及其检测方法与设备、端口扫描系统 |
| US7624447B1 (en) * | 2005-09-08 | 2009-11-24 | Cisco Technology, Inc. | Using threshold lists for worm detection |
| US20070300304A1 (en) * | 2006-06-26 | 2007-12-27 | Nokia Corporation | SIP washing machine |
| US8085775B1 (en) * | 2006-07-31 | 2011-12-27 | Sable Networks, Inc. | Identifying flows based on behavior characteristics and applying user-defined actions |
| US7769024B1 (en) * | 2006-10-24 | 2010-08-03 | Marvell International Ltd. | State-based traffic management for classifier-equipped silicon switches |
| US7768921B2 (en) * | 2006-10-30 | 2010-08-03 | Juniper Networks, Inc. | Identification of potential network threats using a distributed threshold random walk |
| CN101291233B (zh) * | 2007-04-20 | 2011-04-20 | 华为技术有限公司 | 一种实现事件检测的方法及系统 |
| JP2009049592A (ja) * | 2007-08-16 | 2009-03-05 | Nippon Telegr & Teleph Corp <Ntt> | Ipフロー計測回路およびipフロー計測方法 |
| US7644150B1 (en) * | 2007-08-22 | 2010-01-05 | Narus, Inc. | System and method for network traffic management |
| JP2009077136A (ja) * | 2007-09-20 | 2009-04-09 | Oki Electric Ind Co Ltd | トラヒック情報提供装置、トラヒック情報取得装置、トラヒック情報収集システム、トラヒック情報提供プログラム、トラヒック情報取得プログラム及びトラヒック情報収集方法 |
| US8898280B2 (en) * | 2009-02-19 | 2014-11-25 | Fluke Corporation | Methods and apparatus for determining and displaying WAN optimization attributes for individual transactions |
| US8266673B2 (en) * | 2009-03-12 | 2012-09-11 | At&T Mobility Ii Llc | Policy-based privacy protection in converged communication networks |
| CN101938396B (zh) * | 2009-06-30 | 2013-04-17 | 华为技术有限公司 | 数据流控制方法及装置 |
| US8789173B2 (en) * | 2009-09-03 | 2014-07-22 | Juniper Networks, Inc. | Protecting against distributed network flood attacks |
| US8797866B2 (en) * | 2010-02-12 | 2014-08-05 | Cisco Technology, Inc. | Automatic adjusting of reputation thresholds in order to change the processing of certain packets |
| JP5614326B2 (ja) * | 2010-08-20 | 2014-10-29 | 東京エレクトロン株式会社 | 基板搬送装置、基板搬送方法及びその基板搬送方法を実行させるためのプログラムを記録した記録媒体 |
| US8565108B1 (en) * | 2010-09-28 | 2013-10-22 | Amazon Technologies, Inc. | Network data transmission analysis |
| US9363278B2 (en) * | 2011-05-11 | 2016-06-07 | At&T Mobility Ii Llc | Dynamic and selective response to cyber attack for telecommunications carrier networks |
| US9130864B2 (en) * | 2011-06-27 | 2015-09-08 | Citrix Systems, Inc. | Prioritizing classes of network traffic to provide a predetermined quality of service |
| US8725522B2 (en) * | 2011-06-29 | 2014-05-13 | Sap Ag | Automatic identification of user-aligned fragments in business process models |
| US8948191B2 (en) * | 2011-12-09 | 2015-02-03 | Telefonaktiebolaget L M Ericsson (Publ) | Intelligent traffic quota management |
| KR20130085570A (ko) * | 2011-12-22 | 2013-07-30 | 한국전자통신연구원 | 단말 중심 사이버 공격 방지 방법 및 그에 따른 단말 장치 |
| CN103718513B (zh) * | 2012-07-13 | 2017-02-01 | 华为技术有限公司 | 深度报文检测的方法及装置 |
| US9571502B2 (en) * | 2012-09-14 | 2017-02-14 | International Business Machines Corporation | Priority resolution for access control list policies in a networking device |
| US9590880B2 (en) * | 2013-08-07 | 2017-03-07 | Microsoft Technology Licensing, Llc | Dynamic collection analysis and reporting of telemetry data |
| US9088508B1 (en) | 2014-04-11 | 2015-07-21 | Level 3 Communications, Llc | Incremental application of resources to network traffic flows based on heuristics and business policies |
-
2014
- 2014-04-11 US US14/251,049 patent/US9088508B1/en active Active
-
2015
- 2015-04-02 EP EP15162496.2A patent/EP2930885B1/en active Active
- 2015-04-02 WO PCT/US2015/024156 patent/WO2015157095A1/en not_active Ceased
- 2015-04-02 CN CN201580019052.6A patent/CN106416134A/zh active Pending
- 2015-04-02 JP JP2016561300A patent/JP6598382B2/ja active Active
- 2015-04-10 CA CA2887803A patent/CA2887803C/en active Active
- 2015-07-16 US US14/800,933 patent/US9473456B2/en active Active
-
2016
- 2016-09-28 US US15/279,289 patent/US9825868B2/en active Active
-
2017
- 2017-11-16 US US15/814,747 patent/US10291534B2/en active Active
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| JP2017511072A5 (enExample) | ||
| US10785249B2 (en) | Predicting the risk associated with a network flow, such as one involving an IoT device, and applying an appropriate level of security inspection based thereon | |
| JP6441957B2 (ja) | 疑わしいオブジェクトにおけるエクスプロイトを自動的に実証し、当該実証済みエクスプロイトに関連付けられた表示情報を強調するシステム、装置、および方法 | |
| EP4271017A3 (en) | Secured home network | |
| US10104124B2 (en) | Analysis rule adjustment device, analysis rule adjustment system, analysis rule adjustment method, and analysis rule adjustment program | |
| AU2014377369B2 (en) | Method and system for virtual asset assisted extrusion and intrusion detection in a cloud computing environment | |
| Singh et al. | A systematic review of IP traceback schemes for denial of service attacks | |
| KR20200052881A (ko) | 멀웨어 호스트 넷플로우 분석 시스템 및 방법 | |
| JP2017538376A5 (enExample) | ||
| US11258812B2 (en) | Automatic characterization of malicious data flows | |
| CN108293039B (zh) | 处理网络威胁的计算设备、方法和存储介质 | |
| JP2016146192A5 (enExample) | ||
| MX2018010193A (es) | Tecnicas para comunicaciones enriquecidas de robot de mensajeria. | |
| US9992215B2 (en) | Network intrusion detection | |
| CN109922021A (zh) | 安全防护系统以及安全防护方法 | |
| US20170134400A1 (en) | Method for detecting malicious activity on an aircraft network | |
| JP2014534489A5 (enExample) | ||
| JP2017528998A5 (enExample) | ||
| WO2016049065A3 (en) | Adaptive network function chaining | |
| JP2017528023A5 (enExample) | ||
| JP2013226037A5 (enExample) | ||
| EP4593345A3 (en) | Rule-based network-threat detection | |
| JP2016519345A5 (enExample) | ||
| GB2534259A (en) | Methods and Systems for Transmitting Data Packets | |
| JP2017533615A5 (enExample) |