MX2015003389A - Sistema de defensa de red emergente. - Google Patents
Sistema de defensa de red emergente.Info
- Publication number
- MX2015003389A MX2015003389A MX2015003389A MX2015003389A MX2015003389A MX 2015003389 A MX2015003389 A MX 2015003389A MX 2015003389 A MX2015003389 A MX 2015003389A MX 2015003389 A MX2015003389 A MX 2015003389A MX 2015003389 A MX2015003389 A MX 2015003389A
- Authority
- MX
- Mexico
- Prior art keywords
- node
- defense system
- network defense
- network
- emergent network
- Prior art date
Links
- 230000007123 defense Effects 0.000 title 1
- 206010029216 Nervousness Diseases 0.000 abstract 2
- 235000008694 Humulus lupulus Nutrition 0.000 abstract 1
- 238000000034 method Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261702484P | 2012-09-18 | 2012-09-18 | |
| PCT/US2013/060425 WO2014182326A2 (en) | 2012-09-18 | 2013-09-18 | Emergent network defense system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| MX2015003389A true MX2015003389A (es) | 2016-05-31 |
Family
ID=51867836
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MX2015003389A MX2015003389A (es) | 2012-09-18 | 2013-09-18 | Sistema de defensa de red emergente. |
Country Status (13)
| Country | Link |
|---|---|
| US (1) | US9860276B2 (enExample) |
| EP (1) | EP2898439A4 (enExample) |
| JP (1) | JP2015535364A (enExample) |
| KR (1) | KR20150058304A (enExample) |
| AU (1) | AU2013388938A1 (enExample) |
| BR (1) | BR112015005889A2 (enExample) |
| CL (1) | CL2015000669A1 (enExample) |
| IN (1) | IN2015DN02359A (enExample) |
| MX (1) | MX2015003389A (enExample) |
| PE (1) | PE20151242A1 (enExample) |
| PH (1) | PH12015500830A1 (enExample) |
| SG (1) | SG11201501854PA (enExample) |
| WO (1) | WO2014182326A2 (enExample) |
Families Citing this family (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9813449B1 (en) * | 2012-08-10 | 2017-11-07 | Lookwise S.L. | Systems and methods for providing a security information and event management system in a distributed architecture |
| US20140274246A1 (en) * | 2013-03-15 | 2014-09-18 | University Of Southern California | Localized shortest-paths estimation of influence propagation for multiple influencers |
| US10216938B2 (en) * | 2014-12-05 | 2019-02-26 | T-Mobile Usa, Inc. | Recombinant threat modeling |
| US10574675B2 (en) | 2014-12-05 | 2020-02-25 | T-Mobile Usa, Inc. | Similarity search for discovering multiple vector attacks |
| US9900299B2 (en) * | 2015-04-03 | 2018-02-20 | Oracle International Corporation | Aggregated computing infrastructure analyzer |
| US10476754B2 (en) * | 2015-04-16 | 2019-11-12 | Nec Corporation | Behavior-based community detection in enterprise information networks |
| US9832220B2 (en) * | 2015-09-22 | 2017-11-28 | The United States Of America As Represented By The Secretary Of The Air Force | Security method for allocation of virtual machines in a cloud computing network |
| US10032361B2 (en) * | 2016-06-23 | 2018-07-24 | Intel Corporation | Threat monitoring for crowd environments with swarm analytics |
| US10650621B1 (en) | 2016-09-13 | 2020-05-12 | Iocurrents, Inc. | Interfacing with a vehicular controller area network |
| US10277625B1 (en) * | 2016-09-28 | 2019-04-30 | Symantec Corporation | Systems and methods for securing computing systems on private networks |
| US10970284B2 (en) * | 2017-05-12 | 2021-04-06 | Oracle International Corporation | Dynamic self-reconfiguration of nodes in a processing pipeline |
| WO2019028341A1 (en) * | 2017-08-03 | 2019-02-07 | T-Mobile Usa, Inc. | SIMILARITY SEARCH FOR DISCOVERY OF MULTI-VECTOR ATTACKS |
| GB2578918B (en) * | 2018-11-14 | 2021-07-07 | F Secure Corp | Threat control method and system |
| US11138158B2 (en) | 2019-05-20 | 2021-10-05 | Callplex, Inc. | Binding a local data storage device to remote data storage |
| US11475126B2 (en) * | 2019-10-31 | 2022-10-18 | Dell Products, L.P. | Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem |
| CN111478813B (zh) * | 2020-04-07 | 2022-07-01 | 中国人民解放军国防科技大学 | 一种基于单层信息流传递的网络关键点分析方法 |
| CN113032782B (zh) * | 2021-03-09 | 2024-08-20 | 中国人民解放军空军工程大学 | 一种病毒传播抑制方法 |
| US12418418B2 (en) * | 2021-09-17 | 2025-09-16 | B Data Solutions Inc. | System and method for building a trusted network of devices |
| CN114139156B (zh) * | 2021-12-01 | 2024-11-01 | 浙江大学 | 一种基于博弈论的微电网信息物理系统防御方法 |
| US12267299B2 (en) * | 2022-01-12 | 2025-04-01 | Bank Of America Corporation | Preemptive threat detection for an information system |
| CN118784379B (zh) * | 2024-09-12 | 2024-11-19 | 南京中新赛克科技有限责任公司 | 动态安全基线建模方法 |
Family Cites Families (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US2005101A (en) | 1934-09-26 | 1935-06-18 | Herberts Machinery Co Ltd | Lathe |
| US6397061B1 (en) | 2000-06-24 | 2002-05-28 | Motorola, Inc. | Method and apparatus to reprioritize data transfer in a short range Ad Hoc network |
| US7305371B2 (en) * | 2001-07-06 | 2007-12-04 | Newvectors Llc | Swarming agents for distributed pattern detection and classification |
| US7352868B2 (en) | 2001-10-09 | 2008-04-01 | Philip Hawkes | Method and apparatus for security in a data processing system |
| EP1355468A1 (en) * | 2002-04-19 | 2003-10-22 | BRITISH TELECOMMUNICATIONS public limited company | Method and apparatus for network security |
| WO2003084170A1 (en) * | 2002-03-28 | 2003-10-09 | British Telecommunications Public Limited Company | Method and apparatus for network security |
| WO2003083626A1 (en) * | 2002-03-28 | 2003-10-09 | British Telecommunications Public Limited Company | Method and apparatus for network security |
| US8392999B2 (en) | 2005-12-19 | 2013-03-05 | White Cyber Knight Ltd. | Apparatus and methods for assessing and maintaining security of a computerized system under development |
| US8204684B2 (en) | 2007-06-28 | 2012-06-19 | Apple Inc. | Adaptive mobile device navigation |
| WO2009122437A2 (en) * | 2008-03-31 | 2009-10-08 | Tata Consultancy Services Limited | Security in mobile ad hoc networks |
| WO2012164150A1 (en) | 2011-05-31 | 2012-12-06 | Nokia Corporation | Method and apparatus for facilitating location based interaction over an ad-hoc mesh network |
| US8739280B2 (en) | 2011-09-29 | 2014-05-27 | Hewlett-Packard Development Company, L.P. | Context-sensitive taint analysis |
| US8595845B2 (en) | 2012-01-19 | 2013-11-26 | Mcafee, Inc. | Calculating quantitative asset risk |
-
2013
- 2013-09-18 AU AU2013388938A patent/AU2013388938A1/en not_active Abandoned
- 2013-09-18 IN IN2359DEN2015 patent/IN2015DN02359A/en unknown
- 2013-09-18 WO PCT/US2013/060425 patent/WO2014182326A2/en not_active Ceased
- 2013-09-18 SG SG11201501854PA patent/SG11201501854PA/en unknown
- 2013-09-18 US US14/428,590 patent/US9860276B2/en not_active Expired - Fee Related
- 2013-09-18 PE PE2015000388A patent/PE20151242A1/es not_active Application Discontinuation
- 2013-09-18 MX MX2015003389A patent/MX2015003389A/es unknown
- 2013-09-18 KR KR1020157009309A patent/KR20150058304A/ko not_active Withdrawn
- 2013-09-18 BR BR112015005889A patent/BR112015005889A2/pt not_active IP Right Cessation
- 2013-09-18 EP EP13884031.9A patent/EP2898439A4/en not_active Withdrawn
- 2013-09-18 JP JP2015533153A patent/JP2015535364A/ja active Pending
-
2015
- 2015-03-17 CL CL2015000669A patent/CL2015000669A1/es unknown
- 2015-04-15 PH PH12015500830A patent/PH12015500830A1/en unknown
Also Published As
| Publication number | Publication date |
|---|---|
| SG11201501854PA (en) | 2015-04-29 |
| US20150249685A1 (en) | 2015-09-03 |
| WO2014182326A3 (en) | 2015-09-24 |
| CL2015000669A1 (es) | 2015-10-09 |
| PH12015500830A1 (en) | 2015-06-08 |
| EP2898439A2 (en) | 2015-07-29 |
| AU2013388938A1 (en) | 2015-04-09 |
| PE20151242A1 (es) | 2015-08-29 |
| BR112015005889A2 (pt) | 2017-07-04 |
| KR20150058304A (ko) | 2015-05-28 |
| WO2014182326A2 (en) | 2014-11-13 |
| IN2015DN02359A (enExample) | 2015-09-04 |
| JP2015535364A (ja) | 2015-12-10 |
| US9860276B2 (en) | 2018-01-02 |
| EP2898439A4 (en) | 2016-10-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| PH12015500830A1 (en) | Emergent network defense system | |
| MX2015000705A (es) | Metodos para dispositivos de consumo en redes. | |
| EP3545662A4 (en) | COMMUNICATIONS MANAGEMENT WITH MESSAGING PROTOCOL | |
| MX350318B (es) | Metodos para dispositivos de consumo en redes. | |
| EP3520317A4 (en) | NETWORK TOPOLOGY | |
| MX344541B (es) | Metodo y sistema para dispositivos de consumo en redes. | |
| EP3348005A4 (en) | GLOBAL COMMUNICATION NETWORK | |
| MX2015000702A (es) | Sistemas y metodos para dispositivos de consumo en redes. | |
| EP3089032A4 (en) | Management system, overall management node, and management method | |
| AR087500A1 (es) | Almacenamiento y asignacion de configuraciones de temporizacion de control en una red multiple de comunicaciones celulares | |
| UY34651A (es) | ?formas de dosificación de liberación inmediata resistentes a la manipulación, procesos para prepararlas, métodos y usos de las mismas?.. | |
| HUE044311T2 (hu) | Hálózat felfedezés és sugárnyaláb gyûjtés nyaláb cella mûvelethez | |
| BR112016021687A2 (pt) | Comunicação através de nós de rede dedicados | |
| IN2014DN09369A (enExample) | ||
| KR20180084836A (ko) | 사용자 장비, 네트워크 노드 및 무선 통신 방법 | |
| WO2014015005A3 (en) | Methods and system for networking consumer devices | |
| EP2866489A4 (en) | METHOD, NODE AND SYSTEM FOR UPLINK INTERFERENCE MANAGEMENT | |
| MX377393B (es) | Señalización de banda base duplexada por división de tiempo gestionada. | |
| DK3378250T3 (da) | Trafikstyring mellem radioadgangsnetværksknuder | |
| EP3384651A4 (en) | NETWORK SECURITY AGENT | |
| PT3360359T (pt) | Nós para utilização numa rede de comunicação e seus métodos de funcionamento | |
| GB2534807A (en) | Method and system for estimating a topology of a network and its use in a mobile adhoc radio network | |
| FR2988549B1 (fr) | Procede, terminal et casque de communication vocale sans fil avec auto-synchronisation | |
| EP3272027A4 (en) | Das management by radio access network node | |
| EP3605159A4 (en) | SUPERSTRUCTURED GRID AND TUNABLE LASER |