PE20151242A1 - Sistema de defensa de red emergente - Google Patents
Sistema de defensa de red emergenteInfo
- Publication number
- PE20151242A1 PE20151242A1 PE2015000388A PE2015000388A PE20151242A1 PE 20151242 A1 PE20151242 A1 PE 20151242A1 PE 2015000388 A PE2015000388 A PE 2015000388A PE 2015000388 A PE2015000388 A PE 2015000388A PE 20151242 A1 PE20151242 A1 PE 20151242A1
- Authority
- PE
- Peru
- Prior art keywords
- node
- nervousness
- level
- defense system
- network defense
- Prior art date
Links
- 230000007123 defense Effects 0.000 title 1
- 206010029216 Nervousness Diseases 0.000 abstract 3
- 235000008694 Humulus lupulus Nutrition 0.000 abstract 1
- 238000000034 method Methods 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201261702484P | 2012-09-18 | 2012-09-18 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| PE20151242A1 true PE20151242A1 (es) | 2015-08-29 |
Family
ID=51867836
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PE2015000388A PE20151242A1 (es) | 2012-09-18 | 2013-09-18 | Sistema de defensa de red emergente |
Country Status (13)
| Country | Link |
|---|---|
| US (1) | US9860276B2 (enExample) |
| EP (1) | EP2898439A4 (enExample) |
| JP (1) | JP2015535364A (enExample) |
| KR (1) | KR20150058304A (enExample) |
| AU (1) | AU2013388938A1 (enExample) |
| BR (1) | BR112015005889A2 (enExample) |
| CL (1) | CL2015000669A1 (enExample) |
| IN (1) | IN2015DN02359A (enExample) |
| MX (1) | MX2015003389A (enExample) |
| PE (1) | PE20151242A1 (enExample) |
| PH (1) | PH12015500830A1 (enExample) |
| SG (1) | SG11201501854PA (enExample) |
| WO (1) | WO2014182326A2 (enExample) |
Families Citing this family (21)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9813449B1 (en) * | 2012-08-10 | 2017-11-07 | Lookwise S.L. | Systems and methods for providing a security information and event management system in a distributed architecture |
| US20140274246A1 (en) * | 2013-03-15 | 2014-09-18 | University Of Southern California | Localized shortest-paths estimation of influence propagation for multiple influencers |
| US10216938B2 (en) * | 2014-12-05 | 2019-02-26 | T-Mobile Usa, Inc. | Recombinant threat modeling |
| US10574675B2 (en) | 2014-12-05 | 2020-02-25 | T-Mobile Usa, Inc. | Similarity search for discovering multiple vector attacks |
| US9900299B2 (en) * | 2015-04-03 | 2018-02-20 | Oracle International Corporation | Aggregated computing infrastructure analyzer |
| US10476754B2 (en) * | 2015-04-16 | 2019-11-12 | Nec Corporation | Behavior-based community detection in enterprise information networks |
| US9832220B2 (en) * | 2015-09-22 | 2017-11-28 | The United States Of America As Represented By The Secretary Of The Air Force | Security method for allocation of virtual machines in a cloud computing network |
| US10032361B2 (en) * | 2016-06-23 | 2018-07-24 | Intel Corporation | Threat monitoring for crowd environments with swarm analytics |
| US10650621B1 (en) | 2016-09-13 | 2020-05-12 | Iocurrents, Inc. | Interfacing with a vehicular controller area network |
| US10277625B1 (en) * | 2016-09-28 | 2019-04-30 | Symantec Corporation | Systems and methods for securing computing systems on private networks |
| US10970284B2 (en) * | 2017-05-12 | 2021-04-06 | Oracle International Corporation | Dynamic self-reconfiguration of nodes in a processing pipeline |
| WO2019028341A1 (en) * | 2017-08-03 | 2019-02-07 | T-Mobile Usa, Inc. | SIMILARITY SEARCH FOR DISCOVERY OF MULTI-VECTOR ATTACKS |
| GB2578918B (en) * | 2018-11-14 | 2021-07-07 | F Secure Corp | Threat control method and system |
| US11138158B2 (en) | 2019-05-20 | 2021-10-05 | Callplex, Inc. | Binding a local data storage device to remote data storage |
| US11475126B2 (en) * | 2019-10-31 | 2022-10-18 | Dell Products, L.P. | Systems and methods for modernizing workspace and hardware lifecycle management in an enterprise productivity ecosystem |
| CN111478813B (zh) * | 2020-04-07 | 2022-07-01 | 中国人民解放军国防科技大学 | 一种基于单层信息流传递的网络关键点分析方法 |
| CN113032782B (zh) * | 2021-03-09 | 2024-08-20 | 中国人民解放军空军工程大学 | 一种病毒传播抑制方法 |
| US12418418B2 (en) * | 2021-09-17 | 2025-09-16 | B Data Solutions Inc. | System and method for building a trusted network of devices |
| CN114139156B (zh) * | 2021-12-01 | 2024-11-01 | 浙江大学 | 一种基于博弈论的微电网信息物理系统防御方法 |
| US12267299B2 (en) * | 2022-01-12 | 2025-04-01 | Bank Of America Corporation | Preemptive threat detection for an information system |
| CN118784379B (zh) * | 2024-09-12 | 2024-11-19 | 南京中新赛克科技有限责任公司 | 动态安全基线建模方法 |
Family Cites Families (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US2005101A (en) | 1934-09-26 | 1935-06-18 | Herberts Machinery Co Ltd | Lathe |
| US6397061B1 (en) | 2000-06-24 | 2002-05-28 | Motorola, Inc. | Method and apparatus to reprioritize data transfer in a short range Ad Hoc network |
| US7305371B2 (en) * | 2001-07-06 | 2007-12-04 | Newvectors Llc | Swarming agents for distributed pattern detection and classification |
| US7352868B2 (en) | 2001-10-09 | 2008-04-01 | Philip Hawkes | Method and apparatus for security in a data processing system |
| EP1355468A1 (en) * | 2002-04-19 | 2003-10-22 | BRITISH TELECOMMUNICATIONS public limited company | Method and apparatus for network security |
| WO2003084170A1 (en) * | 2002-03-28 | 2003-10-09 | British Telecommunications Public Limited Company | Method and apparatus for network security |
| WO2003083626A1 (en) * | 2002-03-28 | 2003-10-09 | British Telecommunications Public Limited Company | Method and apparatus for network security |
| US8392999B2 (en) | 2005-12-19 | 2013-03-05 | White Cyber Knight Ltd. | Apparatus and methods for assessing and maintaining security of a computerized system under development |
| US8204684B2 (en) | 2007-06-28 | 2012-06-19 | Apple Inc. | Adaptive mobile device navigation |
| WO2009122437A2 (en) * | 2008-03-31 | 2009-10-08 | Tata Consultancy Services Limited | Security in mobile ad hoc networks |
| WO2012164150A1 (en) | 2011-05-31 | 2012-12-06 | Nokia Corporation | Method and apparatus for facilitating location based interaction over an ad-hoc mesh network |
| US8739280B2 (en) | 2011-09-29 | 2014-05-27 | Hewlett-Packard Development Company, L.P. | Context-sensitive taint analysis |
| US8595845B2 (en) | 2012-01-19 | 2013-11-26 | Mcafee, Inc. | Calculating quantitative asset risk |
-
2013
- 2013-09-18 AU AU2013388938A patent/AU2013388938A1/en not_active Abandoned
- 2013-09-18 IN IN2359DEN2015 patent/IN2015DN02359A/en unknown
- 2013-09-18 WO PCT/US2013/060425 patent/WO2014182326A2/en not_active Ceased
- 2013-09-18 SG SG11201501854PA patent/SG11201501854PA/en unknown
- 2013-09-18 US US14/428,590 patent/US9860276B2/en not_active Expired - Fee Related
- 2013-09-18 PE PE2015000388A patent/PE20151242A1/es not_active Application Discontinuation
- 2013-09-18 MX MX2015003389A patent/MX2015003389A/es unknown
- 2013-09-18 KR KR1020157009309A patent/KR20150058304A/ko not_active Withdrawn
- 2013-09-18 BR BR112015005889A patent/BR112015005889A2/pt not_active IP Right Cessation
- 2013-09-18 EP EP13884031.9A patent/EP2898439A4/en not_active Withdrawn
- 2013-09-18 JP JP2015533153A patent/JP2015535364A/ja active Pending
-
2015
- 2015-03-17 CL CL2015000669A patent/CL2015000669A1/es unknown
- 2015-04-15 PH PH12015500830A patent/PH12015500830A1/en unknown
Also Published As
| Publication number | Publication date |
|---|---|
| SG11201501854PA (en) | 2015-04-29 |
| US20150249685A1 (en) | 2015-09-03 |
| MX2015003389A (es) | 2016-05-31 |
| WO2014182326A3 (en) | 2015-09-24 |
| CL2015000669A1 (es) | 2015-10-09 |
| PH12015500830A1 (en) | 2015-06-08 |
| EP2898439A2 (en) | 2015-07-29 |
| AU2013388938A1 (en) | 2015-04-09 |
| BR112015005889A2 (pt) | 2017-07-04 |
| KR20150058304A (ko) | 2015-05-28 |
| WO2014182326A2 (en) | 2014-11-13 |
| IN2015DN02359A (enExample) | 2015-09-04 |
| JP2015535364A (ja) | 2015-12-10 |
| US9860276B2 (en) | 2018-01-02 |
| EP2898439A4 (en) | 2016-10-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| PE20151242A1 (es) | Sistema de defensa de red emergente | |
| MX2019005226A (es) | Manejo de disponibilidad de segmentos de red limitada. | |
| MX2015000640A (es) | Metodos y sistema para dispositivos de consumo en redes. | |
| MX2015000639A (es) | Metodos para dispositivos de consumo en redes. | |
| UY34651A (es) | ?formas de dosificación de liberación inmediata resistentes a la manipulación, procesos para prepararlas, métodos y usos de las mismas?.. | |
| MX349290B (es) | Red hogareña de dispositivos de consumo conectados. | |
| ES2404979R1 (es) | Metodo y sistema para ahorrar energia y minimizar el nivel de interferencia en un despliegue de red de nodos de acceso de radio | |
| EP3092837A4 (en) | SECURE AD HOC GROUP IN A INFORMATION CENTERED NETWORK | |
| MX351132B (es) | Métodos y sistema para arbitraje de espectro dinámico con gestión de la movilidad. | |
| EP3433650A4 (en) | GRID-BASED BACKLIGHT WITH REFLECTIVE GRID INSERTS | |
| EP2962485A4 (en) | Wireless TRAFFIC offload | |
| MX2015000706A (es) | Red hogareña de dispositivos de consumo conectados. | |
| CL2013002221A1 (es) | Procedimiento y sistema para mejorar la deteccion de amenazas de seguridad en redes de comunicacion que incluye dispositivos de seguridad que generan eventos de seguridad que son almacenados en una base de datos. | |
| MX2013010682A (es) | Analisis de manejo de servicios con datos de redes sociales. | |
| UY34018A (es) | Derivados glucósidos y usos de los mismos | |
| MX2019000083A (es) | Metodo de comunicacion, equipo de red y equipo de terminal. | |
| AR097126A1 (es) | Sistemas y métodos para la selección de realización de modelos para conjuntos de rocas sedimentarias o metamórficas | |
| MX2016003674A (es) | Matrices detectables, sistemas para el diagnostico y sus metodos de preparacion y uso. | |
| PL3360359T3 (pl) | Węzły do stosowania w sieci komunikacyjnej i sposoby ich działania | |
| EP2929480A4 (en) | PRIVACY POLICY FOR SOCIAL NETWORKS | |
| KR20180084836A (ko) | 사용자 장비, 네트워크 노드 및 무선 통신 방법 | |
| BR112014010340A2 (pt) | conjunto de duas unidades de tubulação, método para produzir um conjunto de duas unidades de tubulação, e, uso de um conjunto | |
| DK3378250T3 (da) | Trafikstyring mellem radioadgangsnetværksknuder | |
| BR112014009476A2 (pt) | refletor, iluminador e uso do iluminador | |
| CL2016003181A1 (es) | Vacunas de virus varicela zóster inactivado, métodos de producción y uso de las mismas (divisional de sol. n° 360-13). |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FA | Abandonment or withdrawal |