KR20150058304A - 창발적 네트워크 방어 시스템 - Google Patents

창발적 네트워크 방어 시스템 Download PDF

Info

Publication number
KR20150058304A
KR20150058304A KR1020157009309A KR20157009309A KR20150058304A KR 20150058304 A KR20150058304 A KR 20150058304A KR 1020157009309 A KR1020157009309 A KR 1020157009309A KR 20157009309 A KR20157009309 A KR 20157009309A KR 20150058304 A KR20150058304 A KR 20150058304A
Authority
KR
South Korea
Prior art keywords
node
network
anxiety
level
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
KR1020157009309A
Other languages
English (en)
Korean (ko)
Inventor
엔 크레인 얼
엠 크레인 사라
씨 에이치 라이언 줄리
Original Assignee
더 조지 워싱턴 유니버시티
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 더 조지 워싱턴 유니버시티 filed Critical 더 조지 워싱턴 유니버시티
Publication of KR20150058304A publication Critical patent/KR20150058304A/ko
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)
KR1020157009309A 2012-09-18 2013-09-18 창발적 네트워크 방어 시스템 Withdrawn KR20150058304A (ko)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201261702484P 2012-09-18 2012-09-18
US61/702,484 2012-09-18
PCT/US2013/060425 WO2014182326A2 (en) 2012-09-18 2013-09-18 Emergent network defense system

Publications (1)

Publication Number Publication Date
KR20150058304A true KR20150058304A (ko) 2015-05-28

Family

ID=51867836

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020157009309A Withdrawn KR20150058304A (ko) 2012-09-18 2013-09-18 창발적 네트워크 방어 시스템

Country Status (13)

Country Link
US (1) US9860276B2 (enExample)
EP (1) EP2898439A4 (enExample)
JP (1) JP2015535364A (enExample)
KR (1) KR20150058304A (enExample)
AU (1) AU2013388938A1 (enExample)
BR (1) BR112015005889A2 (enExample)
CL (1) CL2015000669A1 (enExample)
IN (1) IN2015DN02359A (enExample)
MX (1) MX2015003389A (enExample)
PE (1) PE20151242A1 (enExample)
PH (1) PH12015500830A1 (enExample)
SG (1) SG11201501854PA (enExample)
WO (1) WO2014182326A2 (enExample)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9813449B1 (en) * 2012-08-10 2017-11-07 Lookwise S.L. Systems and methods for providing a security information and event management system in a distributed architecture
US20140274246A1 (en) * 2013-03-15 2014-09-18 University Of Southern California Localized shortest-paths estimation of influence propagation for multiple influencers
US10574675B2 (en) 2014-12-05 2020-02-25 T-Mobile Usa, Inc. Similarity search for discovering multiple vector attacks
US10216938B2 (en) 2014-12-05 2019-02-26 T-Mobile Usa, Inc. Recombinant threat modeling
US9900299B2 (en) * 2015-04-03 2018-02-20 Oracle International Corporation Aggregated computing infrastructure analyzer
US10476754B2 (en) * 2015-04-16 2019-11-12 Nec Corporation Behavior-based community detection in enterprise information networks
US9832220B2 (en) * 2015-09-22 2017-11-28 The United States Of America As Represented By The Secretary Of The Air Force Security method for allocation of virtual machines in a cloud computing network
US10032361B2 (en) * 2016-06-23 2018-07-24 Intel Corporation Threat monitoring for crowd environments with swarm analytics
US10650621B1 (en) 2016-09-13 2020-05-12 Iocurrents, Inc. Interfacing with a vehicular controller area network
US10277625B1 (en) * 2016-09-28 2019-04-30 Symantec Corporation Systems and methods for securing computing systems on private networks
US10970284B2 (en) * 2017-05-12 2021-04-06 Oracle International Corporation Dynamic self-reconfiguration of nodes in a processing pipeline
CN110999249A (zh) * 2017-08-03 2020-04-10 T移动美国公司 发现多个向量攻击的相似搜索
GB2578918B (en) * 2018-11-14 2021-07-07 F Secure Corp Threat control method and system
US11138158B2 (en) 2019-05-20 2021-10-05 Callplex, Inc. Binding a local data storage device to remote data storage
US11475126B2 (en) 2019-10-31 2022-10-18 Dell Products, L.P. Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem
CN111478813B (zh) * 2020-04-07 2022-07-01 中国人民解放军国防科技大学 一种基于单层信息流传递的网络关键点分析方法
CN113032782B (zh) * 2021-03-09 2024-08-20 中国人民解放军空军工程大学 一种病毒传播抑制方法
US12418418B2 (en) * 2021-09-17 2025-09-16 B Data Solutions Inc. System and method for building a trusted network of devices
CN114139156B (zh) * 2021-12-01 2024-11-01 浙江大学 一种基于博弈论的微电网信息物理系统防御方法
US12267299B2 (en) * 2022-01-12 2025-04-01 Bank Of America Corporation Preemptive threat detection for an information system
CN118784379B (zh) * 2024-09-12 2024-11-19 南京中新赛克科技有限责任公司 动态安全基线建模方法

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US2005101A (en) 1934-09-26 1935-06-18 Herberts Machinery Co Ltd Lathe
US6397061B1 (en) 2000-06-24 2002-05-28 Motorola, Inc. Method and apparatus to reprioritize data transfer in a short range Ad Hoc network
US7305371B2 (en) 2001-07-06 2007-12-04 Newvectors Llc Swarming agents for distributed pattern detection and classification
US7352868B2 (en) 2001-10-09 2008-04-01 Philip Hawkes Method and apparatus for security in a data processing system
DE60319682T2 (de) * 2002-03-28 2009-03-12 British Telecommunications Public Ltd. Co. Verfahren und vorrichtung zur netzwerksicherheit
EP1355468A1 (en) 2002-04-19 2003-10-22 BRITISH TELECOMMUNICATIONS public limited company Method and apparatus for network security
AU2003217021A1 (en) * 2002-03-28 2003-10-13 British Telecommunications Public Limited Company Method and apparatus for network security
US8392999B2 (en) 2005-12-19 2013-03-05 White Cyber Knight Ltd. Apparatus and methods for assessing and maintaining security of a computerized system under development
US8204684B2 (en) 2007-06-28 2012-06-19 Apple Inc. Adaptive mobile device navigation
WO2009122437A2 (en) 2008-03-31 2009-10-08 Tata Consultancy Services Limited Security in mobile ad hoc networks
WO2012164150A1 (en) 2011-05-31 2012-12-06 Nokia Corporation Method and apparatus for facilitating location based interaction over an ad-hoc mesh network
US8739280B2 (en) 2011-09-29 2014-05-27 Hewlett-Packard Development Company, L.P. Context-sensitive taint analysis
US8595845B2 (en) 2012-01-19 2013-11-26 Mcafee, Inc. Calculating quantitative asset risk

Also Published As

Publication number Publication date
EP2898439A4 (en) 2016-10-05
WO2014182326A3 (en) 2015-09-24
US20150249685A1 (en) 2015-09-03
US9860276B2 (en) 2018-01-02
PE20151242A1 (es) 2015-08-29
CL2015000669A1 (es) 2015-10-09
JP2015535364A (ja) 2015-12-10
WO2014182326A2 (en) 2014-11-13
EP2898439A2 (en) 2015-07-29
MX2015003389A (es) 2016-05-31
SG11201501854PA (en) 2015-04-29
AU2013388938A1 (en) 2015-04-09
PH12015500830A1 (en) 2015-06-08
BR112015005889A2 (pt) 2017-07-04
IN2015DN02359A (enExample) 2015-09-04

Similar Documents

Publication Publication Date Title
KR20150058304A (ko) 창발적 네트워크 방어 시스템
Jhanjhi et al. Cyber security and privacy issues in industrial internet of things.
Meng et al. Enhancing medical smartphone networks via blockchain-based trust management against insider attacks
US10863358B2 (en) Threat index based WLAN security and quality of service
US10305926B2 (en) Application platform security enforcement in cross device and ownership structures
Furfaro et al. Using virtual environments for the assessment of cybersecurity issues in IoT scenarios
Özalp et al. Layer-based examination of cyber-attacks in IoT
US20160072770A1 (en) Emergent network defense system
Zahra et al. Fuzzy logic and fog based secure architecture for internet of things (flfsiot)
WO2017142934A1 (en) Digital asset protection policy using dynamic network attributes
Stephens et al. Detecting internet of things bots: A comparative study
Anithaashri et al. Security enhancement for software defined network using game theoretical approach
Bhale et al. Energy efficient approach to detect sinkhole attack using roving IDS in 6LoWPAN network
Jani et al. IoT and cyber security: introduction, attacks, and preventive steps
Bouras et al. Teaching network security in mobile 5G using ONOS SDN controller
Velazquez et al. Toward autonomous cyber defense for protected core networking
Jouad et al. Security challenges in intrusion detection
Cortés Analysis and design of security mechanisms in the context of Advanced Persistent Threats against critical infrastructures
Shandilya et al. IoT security: An introduction
Nalini et al. Analysis on Security in IoT Devices—An Overview
Janani et al. Countermeasure SDN-based IoT threats using blockchain multicontroller
Figueroa et al. A SOUND approach to security in mobile and cloud-oriented environments
Akpabio et al. Securing the Connected World: Federated Learning and IoT Cybersecurity
El Maliki Security adaptation in highly dynamic wireless networks
Thanki et al. Machine Learning for Security in Wireless Networks

Legal Events

Date Code Title Description
PA0105 International application

Patent event date: 20150410

Patent event code: PA01051R01D

Comment text: International Patent Application

PG1501 Laying open of application
PC1203 Withdrawal of no request for examination
WITN Application deemed withdrawn, e.g. because no request for examination was filed or no examination fee was paid