JP2019535068A5 - - Google Patents

Download PDF

Info

Publication number
JP2019535068A5
JP2019535068A5 JP2019514755A JP2019514755A JP2019535068A5 JP 2019535068 A5 JP2019535068 A5 JP 2019535068A5 JP 2019514755 A JP2019514755 A JP 2019514755A JP 2019514755 A JP2019514755 A JP 2019514755A JP 2019535068 A5 JP2019535068 A5 JP 2019535068A5
Authority
JP
Japan
Prior art keywords
policy
data
dynamic execution
execution policy
dynamic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
JP2019514755A
Other languages
English (en)
Japanese (ja)
Other versions
JP2019535068A (ja
JP7088913B2 (ja
Filing date
Publication date
Application filed filed Critical
Priority claimed from PCT/US2017/051886 external-priority patent/WO2018053337A1/en
Publication of JP2019535068A publication Critical patent/JP2019535068A/ja
Publication of JP2019535068A5 publication Critical patent/JP2019535068A5/ja
Priority to JP2022093754A priority Critical patent/JP7358564B2/ja
Application granted granted Critical
Publication of JP7088913B2 publication Critical patent/JP7088913B2/ja
Priority to JP2023165968A priority patent/JP7595723B2/ja
Priority to JP2024201627A priority patent/JP2025024129A/ja
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

JP2019514755A 2016-09-16 2017-09-15 脅威を検出するための動的ポリシーの導入およびアクセスの可視化 Active JP7088913B2 (ja)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2022093754A JP7358564B2 (ja) 2016-09-16 2022-06-09 脅威を検出するための動的ポリシーの導入およびアクセスの可視化
JP2023165968A JP7595723B2 (ja) 2016-09-16 2023-09-27 脅威を検出するための動的ポリシーの導入およびアクセスの可視化
JP2024201627A JP2025024129A (ja) 2016-09-16 2024-11-19 脅威を検出するための動的ポリシーの導入およびアクセスの可視化

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201662396016P 2016-09-16 2016-09-16
US62/396,016 2016-09-16
US201762447759P 2017-01-18 2017-01-18
US62/447,759 2017-01-18
PCT/US2017/051886 WO2018053337A1 (en) 2016-09-16 2017-09-15 Dynamic policy injection and access visualization for threat detection

Related Child Applications (1)

Application Number Title Priority Date Filing Date
JP2022093754A Division JP7358564B2 (ja) 2016-09-16 2022-06-09 脅威を検出するための動的ポリシーの導入およびアクセスの可視化

Publications (3)

Publication Number Publication Date
JP2019535068A JP2019535068A (ja) 2019-12-05
JP2019535068A5 true JP2019535068A5 (enExample) 2020-10-01
JP7088913B2 JP7088913B2 (ja) 2022-06-21

Family

ID=59982502

Family Applications (4)

Application Number Title Priority Date Filing Date
JP2019514755A Active JP7088913B2 (ja) 2016-09-16 2017-09-15 脅威を検出するための動的ポリシーの導入およびアクセスの可視化
JP2022093754A Active JP7358564B2 (ja) 2016-09-16 2022-06-09 脅威を検出するための動的ポリシーの導入およびアクセスの可視化
JP2023165968A Active JP7595723B2 (ja) 2016-09-16 2023-09-27 脅威を検出するための動的ポリシーの導入およびアクセスの可視化
JP2024201627A Pending JP2025024129A (ja) 2016-09-16 2024-11-19 脅威を検出するための動的ポリシーの導入およびアクセスの可視化

Family Applications After (3)

Application Number Title Priority Date Filing Date
JP2022093754A Active JP7358564B2 (ja) 2016-09-16 2022-06-09 脅威を検出するための動的ポリシーの導入およびアクセスの可視化
JP2023165968A Active JP7595723B2 (ja) 2016-09-16 2023-09-27 脅威を検出するための動的ポリシーの導入およびアクセスの可視化
JP2024201627A Pending JP2025024129A (ja) 2016-09-16 2024-11-19 脅威を検出するための動的ポリシーの導入およびアクセスの可視化

Country Status (5)

Country Link
US (4) US10447738B2 (enExample)
EP (1) EP3513543B1 (enExample)
JP (4) JP7088913B2 (enExample)
CN (1) CN109792439B (enExample)
WO (1) WO2018053337A1 (enExample)

Families Citing this family (116)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9058486B2 (en) * 2011-10-18 2015-06-16 Mcafee, Inc. User behavioral risk assessment
US9832678B1 (en) 2015-01-13 2017-11-28 Syniverse Technologies, Llc Traffic hub system to provide roaming service in a wireless environment
US10204211B2 (en) 2016-02-03 2019-02-12 Extrahop Networks, Inc. Healthcare operations with passive network monitoring
US9729416B1 (en) 2016-07-11 2017-08-08 Extrahop Networks, Inc. Anomaly detection using device relationship graphs
US10447738B2 (en) 2016-09-16 2019-10-15 Oracle International Corporation Dynamic policy injection and access visualization for threat detection
US10855783B2 (en) * 2017-01-23 2020-12-01 Adobe Inc. Communication notification trigger modeling preview
US10476673B2 (en) 2017-03-22 2019-11-12 Extrahop Networks, Inc. Managing session secrets for continuous packet capture systems
US10721239B2 (en) 2017-03-31 2020-07-21 Oracle International Corporation Mechanisms for anomaly detection and access management
US11032307B2 (en) 2017-04-30 2021-06-08 Splunk Inc. User interface for defining custom threat rules in a network security system
US11632382B2 (en) 2017-05-15 2023-04-18 Forcepoint Llc Anomaly detection using endpoint counters
US10810316B2 (en) * 2017-05-15 2020-10-20 International Business Machines Corporation Updating monitoring systems using merged data policies
US11949700B2 (en) 2017-05-15 2024-04-02 Forcepoint Llc Using content stored in an entity behavior catalog in combination with an entity risk score
US10999296B2 (en) 2017-05-15 2021-05-04 Forcepoint, LLC Generating adaptive trust profiles using information derived from similarly situated organizations
US10510014B2 (en) * 2017-05-31 2019-12-17 Microsoft Technology Licensing, Llc Escalation-compatible processing flows for anti-abuse infrastructures
US10666508B2 (en) * 2017-06-09 2020-05-26 Nicira, Inc. Unified software defined networking configuration management over multiple hosting environments
US10601847B2 (en) * 2017-06-22 2020-03-24 Cisco Technology, Inc. Detecting user behavior activities of interest in a network
US10318729B2 (en) 2017-07-26 2019-06-11 Forcepoint, LLC Privacy protection during insider threat monitoring
US10999324B2 (en) 2017-08-01 2021-05-04 Forcepoint, LLC Direct-connect web endpoint
US10764295B2 (en) * 2017-08-08 2020-09-01 International Business Machines Corporation Monitoring service policy management
US10063434B1 (en) 2017-08-29 2018-08-28 Extrahop Networks, Inc. Classifying applications or activities based on network behavior
US9967292B1 (en) 2017-10-25 2018-05-08 Extrahop Networks, Inc. Inline secret sharing
US20230328086A1 (en) * 2017-11-27 2023-10-12 Lacework, Inc. Detecting Anomalous Behavior Using A Browser Extension
US11979422B1 (en) * 2017-11-27 2024-05-07 Lacework, Inc. Elastic privileges in a secure access service edge
US11017126B2 (en) * 2017-12-19 2021-05-25 Western Digital Technologies, Inc. Apparatus and method of detecting potential security violations of direct access non-volatile memory device
US11061799B1 (en) 2017-12-28 2021-07-13 Cerner Innovation, Inc. Log analysis application
US10264003B1 (en) 2018-02-07 2019-04-16 Extrahop Networks, Inc. Adaptive network monitoring with tuneable elastic granularity
US10389574B1 (en) 2018-02-07 2019-08-20 Extrahop Networks, Inc. Ranking alerts based on network monitoring
US10038611B1 (en) 2018-02-08 2018-07-31 Extrahop Networks, Inc. Personalization of alerts based on network monitoring
US10270794B1 (en) 2018-02-09 2019-04-23 Extrahop Networks, Inc. Detection of denial of service attacks
US10652266B1 (en) * 2018-02-28 2020-05-12 Amazon Technologies, Inc. Automated threat modeling using machine-readable threat models
US11044271B1 (en) * 2018-03-15 2021-06-22 NortonLifeLock Inc. Automatic adaptive policy based security
US10958649B2 (en) * 2018-03-21 2021-03-23 Akamai Technologies, Inc. Systems and methods for internet-wide monitoring and protection of user credentials
US10789355B1 (en) * 2018-03-28 2020-09-29 Proofpoint, Inc. Spammy app detection systems and methods
US11303667B2 (en) * 2018-04-25 2022-04-12 Illusive Networks Ltd Organization attack surface management
US10116679B1 (en) 2018-05-18 2018-10-30 Extrahop Networks, Inc. Privilege inference and monitoring based on network behavior
US10887307B1 (en) * 2018-06-25 2021-01-05 Ca, Inc. Systems and methods for identifying users
US11108823B2 (en) 2018-07-31 2021-08-31 International Business Machines Corporation Resource security system using fake connections
US10411978B1 (en) 2018-08-09 2019-09-10 Extrahop Networks, Inc. Correlating causes and effects associated with network activity
US11025641B2 (en) * 2018-08-21 2021-06-01 Bank Of America Corporation System for optimizing access control for server privilege
US10594718B1 (en) 2018-08-21 2020-03-17 Extrahop Networks, Inc. Managing incident response operations based on monitored network activity
US10999290B2 (en) 2018-08-28 2021-05-04 Cobalt Iron, Inc. Dynamic authorization control system and method
US11310237B2 (en) 2018-08-28 2022-04-19 Cobalt Iron, Inc. Dynamic authorization control system and method
US11500997B1 (en) * 2018-09-20 2022-11-15 Bentley Systems, Incorporated ICS threat modeling and intelligence framework
CN110943961B (zh) 2018-09-21 2022-06-21 阿里巴巴集团控股有限公司 数据处理方法、设备以及存储介质
US11012468B2 (en) * 2018-10-30 2021-05-18 Okta, Inc. Detecting and responding to attempts to gain unauthorized access to user accounts in an online system
CN111147371B (zh) 2018-11-02 2022-03-11 华为技术有限公司 处理路由事件记录表项的方法、网络设备和控制设备
US10904250B2 (en) * 2018-11-07 2021-01-26 Verizon Patent And Licensing Inc. Systems and methods for automated network-based rule generation and configuration of different network devices
US10885186B2 (en) 2018-11-13 2021-01-05 Forcepoint, LLC System and method for operating a protected endpoint device
US11132109B2 (en) 2019-05-08 2021-09-28 EXFO Solutions SAS Timeline visualization and investigation systems and methods for time lasting events
US10965702B2 (en) 2019-05-28 2021-03-30 Extrahop Networks, Inc. Detecting injection attacks using passive network monitoring
US11233754B2 (en) * 2019-06-11 2022-01-25 Livechat Software S.A Real-time chat message preview enabling to view the message during the writing process
US11632373B2 (en) * 2019-06-18 2023-04-18 Microsoft Technology Licensing, Llc Activity based authorization for accessing and operating enterprise infrastructure
GB201910654D0 (en) 2019-07-25 2019-09-11 Palantir Technologies Inc System event detection system and method
US11165814B2 (en) 2019-07-29 2021-11-02 Extrahop Networks, Inc. Modifying triage information based on network monitoring
US10742530B1 (en) 2019-08-05 2020-08-11 Extrahop Networks, Inc. Correlating network traffic that crosses opaque endpoints
US11388072B2 (en) 2019-08-05 2022-07-12 Extrahop Networks, Inc. Correlating network traffic that crosses opaque endpoints
CN110471655B (zh) * 2019-08-19 2023-08-01 浪潮云信息技术股份公司 一种对象存储中Bucket权限的图形化展示与验证方法
US10742677B1 (en) 2019-09-04 2020-08-11 Extrahop Networks, Inc. Automatic determination of user roles and asset types based on network monitoring
US11388175B2 (en) * 2019-09-05 2022-07-12 Cisco Technology, Inc. Threat detection of application traffic flows
CN112787837A (zh) * 2019-11-07 2021-05-11 华为技术有限公司 数据共享的方法、设备及系统
CN111178064B (zh) * 2019-12-13 2022-11-29 深圳平安医疗健康科技服务有限公司 基于字段分词处理的信息推送方法、装置和计算机设备
US11165823B2 (en) 2019-12-17 2021-11-02 Extrahop Networks, Inc. Automated preemptive polymorphic deception
CN111327607B (zh) * 2020-02-13 2022-11-01 重庆特斯联智慧科技股份有限公司 一种基于大数据的安全威胁情报管理方法、系统、存储介质及终端
KR102156891B1 (ko) * 2020-02-25 2020-09-16 주식회사 에프원시큐리티 인공지능 머신러닝 행위 기반 웹 프로토콜 분석을 통한 웹 공격 탐지 및 차단 시스템 및 방법
CN111447202B (zh) * 2020-03-24 2021-03-30 江苏易安联网络技术有限公司 一种安全策略可视化编排系统
JP7487769B2 (ja) * 2020-03-27 2024-05-21 日本電気株式会社 異常アクセス予測システム、異常アクセス予測方法および異常アクセス予測プログラム
US11283695B2 (en) * 2020-04-21 2022-03-22 Aviatrix Systems, Inc. System and method for determination of network operation metrics and generation of network operation metrics visualizations
CN111562930A (zh) * 2020-04-30 2020-08-21 深圳壹账通智能科技有限公司 web应用安全的升级方法与系统
US12309206B2 (en) * 2020-08-09 2025-05-20 Ericom Software Ltd. System and method for creating access control policies for individual users, user groups, network host or network host groups through network traffic analysis
US11483351B2 (en) * 2020-08-26 2022-10-25 Cisco Technology, Inc. Securing network resources from known threats
EP4218212A4 (en) 2020-09-23 2024-10-16 ExtraHop Networks, Inc. Monitoring encrypted network traffic
US11463466B2 (en) 2020-09-23 2022-10-04 Extrahop Networks, Inc. Monitoring encrypted network traffic
CN113395251B (zh) * 2021-01-20 2024-06-14 腾讯科技(深圳)有限公司 一种机器学习安全场景检测方法及装置
US11941020B2 (en) 2021-02-26 2024-03-26 Micro Focus Llc Displaying query results using machine learning model-determined query results visualizations
US11902284B2 (en) 2021-03-05 2024-02-13 Sap Se Tenant user management in cloud database operation
US11838275B2 (en) 2021-03-12 2023-12-05 Forcepoint Llc Web endpoint device having automatic switching between proxied and non-proxied communication modes
US11216580B1 (en) * 2021-03-12 2022-01-04 Snowflake Inc. Secure machine learning using shared data in a distributed database
US11868500B2 (en) 2021-03-24 2024-01-09 International Business Machines Corporation Fine-grained access control of column-major relational database management systems
US11526617B2 (en) 2021-03-24 2022-12-13 Bank Of America Corporation Information security system for identifying security threats in deployed software package
US12013963B2 (en) * 2021-04-16 2024-06-18 Bank Of America Corporation Insight generation using personal identifiable information (PII) footprint modeling
US11562082B2 (en) 2021-05-28 2023-01-24 Capital One Services, Llc Crafting effective policies for identity and access management roles
US11902282B2 (en) 2021-05-28 2024-02-13 Capital One Services, Llc Validating compliance of roles with access permissions
US12155666B2 (en) * 2021-05-28 2024-11-26 Capital One Services, Llc Evaluation of effective access permissions in identity and access management (IAM) systems
US20220400127A1 (en) * 2021-06-09 2022-12-15 Microsoft Technology Licensing, Llc Anomalous user activity timing determinations
US11349861B1 (en) 2021-06-18 2022-05-31 Extrahop Networks, Inc. Identifying network entities based on beaconing activity
US11831688B2 (en) * 2021-06-18 2023-11-28 Capital One Services, Llc Systems and methods for network security
GB2609193A (en) 2021-07-19 2023-02-01 Nchain Licensing Ag Enforcing conditions on blockchain transactions
GB2609194A (en) 2021-07-19 2023-02-01 Nchain Licensing Ag Enforcing conditions on blockchain transactions
US11296967B1 (en) 2021-09-23 2022-04-05 Extrahop Networks, Inc. Combining passive network analysis and active probing
US12170688B1 (en) * 2021-09-30 2024-12-17 Amazon Technologies, Inc. Automated attack mitigation
US12088633B2 (en) * 2021-09-30 2024-09-10 Hewlett Packard Enterprise Development Lp Dynamic intrusion detection and prevention in computer networks
US11818101B2 (en) * 2021-10-11 2023-11-14 Cisco Technology, Inc. Context-based path selection for VPN clients to facilitate remote access to network-based applications
US12348525B2 (en) * 2021-10-13 2025-07-01 Zscaler, Inc. Generating zero-trust policy for application access using machine learning
US12229287B2 (en) * 2021-10-25 2025-02-18 International Business Machines Corporation Automatic resource access policy generation and implementation
US12445460B2 (en) 2021-12-03 2025-10-14 International Business Machines Corporation Tracking a potential attacker on an external computer system
CN116319398A (zh) * 2021-12-21 2023-06-23 华为技术有限公司 一种网络巡检方法、网络设备及网络管理设备
US12267299B2 (en) * 2022-01-12 2025-04-01 Bank Of America Corporation Preemptive threat detection for an information system
WO2023150531A1 (en) 2022-02-02 2023-08-10 Oracle International Corporation Cloud-link adaptor of a multi-cloud infrastructure
WO2023150522A1 (en) 2022-02-02 2023-08-10 Oracle International Corporation Enhanced network-link architecture for improved end-to-end latency in communication between different cloud environments
WO2023150143A1 (en) * 2022-02-02 2023-08-10 Oracle International Corporation Multi-cloud control plane architecture
US12111933B2 (en) 2022-02-07 2024-10-08 Bank Of America Corporation System and method for dynamically updating existing threat models based on newly identified active threats
US11843606B2 (en) 2022-03-30 2023-12-12 Extrahop Networks, Inc. Detecting abnormal data access based on data similarity
US12255924B2 (en) 2022-05-31 2025-03-18 Acronis International Gmbh Policy creation and adjustment methods
JPWO2023233580A1 (enExample) * 2022-06-01 2023-12-07
WO2024017786A1 (en) 2022-07-22 2024-01-25 Nchain Licensing Ag Proving and verifying input data
US12061633B2 (en) 2022-09-08 2024-08-13 Tyco Fire & Security Gmbh Building system that maps points into a graph schema
US12013823B2 (en) * 2022-09-08 2024-06-18 Tyco Fire & Security Gmbh Gateway system that maps points into a graph schema
CN120035975A (zh) 2022-10-14 2025-05-23 甲骨文国际公司 多云基础设施中的网络链路建立
US12061516B2 (en) * 2022-10-25 2024-08-13 Jpmorgan Chase Bank, N.A. Determining false positive and active event data
US12278730B2 (en) 2023-06-21 2025-04-15 International Business Machines Corporation Analyzing policies executed in a computer system
US20250112961A1 (en) * 2023-10-02 2025-04-03 Okta, Inc. Techniques for generating policy recommendations and insights using generative ai
US12438868B2 (en) 2024-01-02 2025-10-07 Bank Of America Corporation Pre-access automated login to computing devices, applications and web sites/services based on machine-learning determined user access patterns
CN117847301B (zh) * 2024-01-09 2024-08-02 上海开恒光岳机械制造有限公司 一种基于数据分析的单向阀运行效率评估系统
US20250272428A1 (en) * 2024-02-27 2025-08-28 GE Precision Healthcare LLC Automated role-based access control for patient health information security and compliance
CN119853990A (zh) * 2024-12-31 2025-04-18 萨孚凯信息系统(无锡)有限公司 一种微信运营自动化综合服务平台
US12483384B1 (en) 2025-04-16 2025-11-25 Extrahop Networks, Inc. Resynchronizing encrypted network traffic

Family Cites Families (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001257400A1 (en) * 2000-04-28 2001-11-12 Internet Security Systems, Inc. System and method for managing security events on a network
US8990723B1 (en) * 2002-12-13 2015-03-24 Mcafee, Inc. System, method, and computer program product for managing a plurality of applications via a single interface
GB2405229B (en) * 2003-08-19 2006-01-11 Sophos Plc Method and apparatus for filtering electronic mail
US7581249B2 (en) * 2003-11-14 2009-08-25 Enterasys Networks, Inc. Distributed intrusion response system
US7440406B2 (en) * 2004-12-29 2008-10-21 Korea University Industry & Academy Cooperation Foundation Apparatus for displaying network status
WO2007019583A2 (en) 2005-08-09 2007-02-15 Sipera Systems, Inc. System and method for providing network level and nodal level vulnerability protection in voip networks
CA2531410A1 (en) 2005-12-23 2007-06-23 Snipe Network Security Corporation Behavioural-based network anomaly detection based on user and group profiling
US7970746B2 (en) * 2006-06-13 2011-06-28 Microsoft Corporation Declarative management framework
FI20060665A0 (fi) 2006-07-07 2006-07-07 Nokia Corp Poikkeavuuden havaitseminen
US7783666B1 (en) 2007-09-26 2010-08-24 Netapp, Inc. Controlling access to storage resources by using access pattern based quotas
US7912965B2 (en) 2007-10-12 2011-03-22 Informed Control Inc. System and method for anomalous directory client activity detection
US9338176B2 (en) 2008-01-07 2016-05-10 Global Dataguard, Inc. Systems and methods of identity and access management
US8756650B2 (en) 2010-03-15 2014-06-17 Broadcom Corporation Dynamic authentication of a user
US8600875B2 (en) 2010-04-12 2013-12-03 Visa International Service Association Authentication process using search technology
US8712596B2 (en) * 2010-05-20 2014-04-29 Accenture Global Services Limited Malicious attack detection and analysis
US9419841B1 (en) 2011-06-29 2016-08-16 Amazon Technologies, Inc. Token-based secure data management
US8839349B2 (en) * 2011-10-18 2014-09-16 Mcafee, Inc. Integrating security policy and event management
US9058486B2 (en) 2011-10-18 2015-06-16 Mcafee, Inc. User behavioral risk assessment
JP6004408B2 (ja) 2012-03-30 2016-10-05 シンクロノス テクノロジーズ インコーポレイテッド 安全移動体フレームワーク
US9501613B1 (en) 2012-04-24 2016-11-22 Alarm.Com Incorporated Health and wellness management technology
US9497212B2 (en) * 2012-05-21 2016-11-15 Fortinet, Inc. Detecting malicious resources in a network based upon active client reputation monitoring
EP2880820A4 (en) 2012-07-31 2016-03-23 Hewlett Packard Development Co PATTERN CONSOLIDATION FOR THE IDENTIFICATION OF MISSING ACTIVITIES
US9515892B2 (en) 2012-09-12 2016-12-06 Tekelec, Inc. Methods, systems, and computer readable media for providing diameter traffic estimator
US9401924B2 (en) 2012-12-20 2016-07-26 At&T Intellectual Property I, L.P. Monitoring operational activities in networks and detecting potential network intrusions and misuses
US11321784B2 (en) 2013-03-06 2022-05-03 AppZen, Inc. Methods and systems for automatically detecting fraud and compliance issues in expense reports and invoices
US10313345B2 (en) 2013-03-11 2019-06-04 Amazon Technologies, Inc. Application marketplace for virtual desktops
CN104065622B (zh) * 2013-03-20 2018-10-19 腾讯科技(深圳)有限公司 网络设备的安全预警方法及装置
US9166993B1 (en) 2013-07-25 2015-10-20 Symantec Corporation Anomaly detection based on profile history and peer history
US10063654B2 (en) 2013-12-13 2018-08-28 Oracle International Corporation Systems and methods for contextual and cross application threat detection and prediction in cloud applications
CN104933049B (zh) 2014-03-17 2019-02-19 华为技术有限公司 生成数字人的方法及系统
JP6559402B2 (ja) * 2014-05-12 2019-08-14 富士通株式会社 表示方法、表示装置および表示プログラム
US9721212B2 (en) 2014-06-04 2017-08-01 Qualcomm Incorporated Efficient on-device binary analysis for auto-generated behavioral models
US9356969B2 (en) * 2014-09-23 2016-05-31 Intel Corporation Technologies for multi-factor security analysis and runtime control
US9942158B2 (en) * 2014-09-25 2018-04-10 Dell Products L.P. Data traffic policy management system
RU2580432C1 (ru) 2014-10-31 2016-04-10 Общество С Ограниченной Ответственностью "Яндекс" Способ для обработки запроса от потенциального несанкционированного пользователя на доступ к ресурсу и серверу, используемый в нем
US9531757B2 (en) * 2015-01-20 2016-12-27 Cisco Technology, Inc. Management of security policies across multiple security products
WO2016138067A1 (en) * 2015-02-24 2016-09-01 Cloudlock, Inc. System and method for securing an enterprise computing environment
US10412106B2 (en) 2015-03-02 2019-09-10 Verizon Patent And Licensing Inc. Network threat detection and management system based on user behavior information
US10101244B2 (en) 2015-03-02 2018-10-16 Ca, Inc. Self-learning simulation environments
US10142353B2 (en) * 2015-06-05 2018-11-27 Cisco Technology, Inc. System for monitoring and managing datacenters
CN104951539B (zh) * 2015-06-19 2017-12-22 成都艾尔普科技有限责任公司 互联网数据中心有害信息监测系统
US10192065B2 (en) 2015-08-31 2019-01-29 Commvault Systems, Inc. Automated intelligent provisioning of data storage resources in response to user requests in a data storage management system
US20170126727A1 (en) * 2015-11-03 2017-05-04 Juniper Networks, Inc. Integrated security system having threat visualization
CN105303324B (zh) * 2015-11-10 2019-11-19 中国建设银行股份有限公司 一种信息系统参数管理方法和装置
US20170140278A1 (en) 2015-11-18 2017-05-18 Ca, Inc. Using machine learning to predict big data environment performance
US9876825B2 (en) 2016-02-04 2018-01-23 Amadeus S.A.S. Monitoring user authenticity
US10447738B2 (en) 2016-09-16 2019-10-15 Oracle International Corporation Dynamic policy injection and access visualization for threat detection
US10721239B2 (en) 2017-03-31 2020-07-21 Oracle International Corporation Mechanisms for anomaly detection and access management
US10757103B2 (en) 2017-04-11 2020-08-25 Xage Security, Inc. Single authentication portal for diverse industrial network protocols across multiple OSI layers
WO2018195278A1 (en) * 2017-04-21 2018-10-25 Walmart Apollo, Llc Virtual reality appliance management user interface
US10812342B2 (en) * 2017-04-28 2020-10-20 Hewlett Packard Enterprise Development Lp Generating composite network policy
WO2019204778A1 (en) 2018-04-20 2019-10-24 Orkus, Inc. Automated access control management for computing systems

Similar Documents

Publication Publication Date Title
JP2019535068A5 (enExample)
US10452994B2 (en) Versioning of trained models used to deliver cognitive services
US20210160262A1 (en) Systems and methods for determining network data quality and identifying anomalous network behavior
JP5878537B2 (ja) データフローグラフの特性の評価
US10606649B2 (en) Workload identification and display of workload-specific metrics
US20200026560A1 (en) Dynamic workload classification for workload-based resource allocation
CN110737895A (zh) 使用静态和动态恶意软件分析来扩展恶意软件的动态检测
US10983873B1 (en) Prioritizing electronic backup
Gunther et al. Hadoop superlinear scalability
CN101233491B (zh) 检测集群环境中动态工作负载调度的不平衡的系统和方法
US10043139B2 (en) Method and apparatus for resolving contention in a computer system
Chen et al. Predicting job completion times using system logs in supercomputing clusters
CN111316238A (zh) 数据中心利用率预测系统和方法
US20130254524A1 (en) Automated configuration change authorization
Chan et al. Implementation of a cluster-based heterogeneous edge computing system for resource monitoring and performance evaluation
CN107220121A (zh) 一种numa架构下沙箱环境测试方法及其系统
Dino et al. Impact of Process Execution and Physical Memory-Spaces on OS Performance
CN109144834A (zh) 用户行为数据的采集方法及装置、安卓系统及终端设备
Kim et al. A supervised learning model for identifying inactive VMs in private cloud data centers
Choi et al. Interference-aware co-scheduling method based on classification of application characteristics from hardware performance counter using data mining
Alnafessah et al. A neural-network driven methodology for anomaly detection in apache spark
US20190354460A1 (en) Anomaly detection management apparatus and anomaly detection management method
JP7698378B2 (ja) 異常物を除去するための方法、システム、コンピュータ・プログラム、及びコンピュータ可読ストレージ媒体
Canali et al. Agate: Adaptive gray area-based technique to cluster virtual machines with similar behavior
Yoo et al. Performance analysis tool for HPC and big data applications on scientific clusters