SG10201808502QA - Networking flow logs for multi-tenant environments - Google Patents

Networking flow logs for multi-tenant environments

Info

Publication number
SG10201808502QA
SG10201808502QA SG10201808502QA SG10201808502QA SG10201808502QA SG 10201808502Q A SG10201808502Q A SG 10201808502QA SG 10201808502Q A SG10201808502Q A SG 10201808502QA SG 10201808502Q A SG10201808502Q A SG 10201808502QA SG 10201808502Q A SG10201808502Q A SG 10201808502QA
Authority
SG
Singapore
Prior art keywords
log information
computing resources
firewall
customer
security device
Prior art date
Application number
SG10201808502QA
Inventor
Rajat Banerjee
Nathan Andrew Miller
Aniket Deepak Divecha
Mingxue Zhao
Shuai Ye
Kevin Christopher Miller
John Robert Kerl
Original Assignee
Amazon Tech Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Amazon Tech Inc filed Critical Amazon Tech Inc
Publication of SG10201808502QA publication Critical patent/SG10201808502QA/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/067Generation of reports using time frame reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

OF THE DISCLOSURE Computing resource service providers may provide computing resources to customers in a multi-tenant environment. These computing resources may be behind a firewall or other security device such that certain information does not reach the computing resources provided to the customer. A logging entity may be implemented on computer server 5 operated by the computing resource service provider. The logging entity may obtain log information from the firewall or other security device and store the log information such that it is accessible to the customer. Additionally, the log information may be provided to other services such as a metrics service or intrusion detection service. 10 [FIG. 1]
SG10201808502QA 2015-03-30 2016-03-29 Networking flow logs for multi-tenant environments SG10201808502QA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/673,516 US9667656B2 (en) 2015-03-30 2015-03-30 Networking flow logs for multi-tenant environments

Publications (1)

Publication Number Publication Date
SG10201808502QA true SG10201808502QA (en) 2018-11-29

Family

ID=55699841

Family Applications (2)

Application Number Title Priority Date Filing Date
SG10201808502QA SG10201808502QA (en) 2015-03-30 2016-03-29 Networking flow logs for multi-tenant environments
SG11201707777YA SG11201707777YA (en) 2015-03-30 2016-03-29 Networking flow logs for multi-tenant environments

Family Applications After (1)

Application Number Title Priority Date Filing Date
SG11201707777YA SG11201707777YA (en) 2015-03-30 2016-03-29 Networking flow logs for multi-tenant environments

Country Status (8)

Country Link
US (4) US9667656B2 (en)
EP (1) EP3278534B1 (en)
JP (3) JP6608948B2 (en)
CN (2) CN112187764A (en)
AU (2) AU2016242813B2 (en)
CA (1) CA2980583C (en)
SG (2) SG10201808502QA (en)
WO (1) WO2016160848A1 (en)

Families Citing this family (86)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9565213B2 (en) 2012-10-22 2017-02-07 Centripetal Networks, Inc. Methods and systems for protecting a secured network
US9137205B2 (en) 2012-10-22 2015-09-15 Centripetal Networks, Inc. Methods and systems for protecting a secured network
US9203806B2 (en) 2013-01-11 2015-12-01 Centripetal Networks, Inc. Rule swapping in a packet network
US9124552B2 (en) 2013-03-12 2015-09-01 Centripetal Networks, Inc. Filtering network data transfers
US9094445B2 (en) 2013-03-15 2015-07-28 Centripetal Networks, Inc. Protecting networks from cyber attacks and overloading
US9264370B1 (en) 2015-02-10 2016-02-16 Centripetal Networks, Inc. Correlating packets in communications networks
US9667656B2 (en) * 2015-03-30 2017-05-30 Amazon Technologies, Inc. Networking flow logs for multi-tenant environments
US9866576B2 (en) 2015-04-17 2018-01-09 Centripetal Networks, Inc. Rule-based network-threat detection
US10498764B2 (en) * 2015-12-08 2019-12-03 Jpu.Io Ltd Network routing and security within a mobile radio network
US9917856B2 (en) 2015-12-23 2018-03-13 Centripetal Networks, Inc. Rule-based network-threat detection for encrypted communications
US11729144B2 (en) 2016-01-04 2023-08-15 Centripetal Networks, Llc Efficient packet capture for cyber threat analysis
US10284598B2 (en) 2016-01-29 2019-05-07 Sophos Limited Honeypot network services
US10484382B2 (en) 2016-08-31 2019-11-19 Oracle International Corporation Data management for a multi-tenant identity cloud service
US10846390B2 (en) 2016-09-14 2020-11-24 Oracle International Corporation Single sign-on functionality for a multi-tenant identity and data security management cloud service
US10594684B2 (en) 2016-09-14 2020-03-17 Oracle International Corporation Generating derived credentials for a multi-tenant identity cloud service
US10445395B2 (en) 2016-09-16 2019-10-15 Oracle International Corporation Cookie based state propagation for a multi-tenant identity cloud service
WO2018053258A1 (en) * 2016-09-16 2018-03-22 Oracle International Corporation Tenant and service management for a multi-tenant identity and data security management cloud service
US10904074B2 (en) 2016-09-17 2021-01-26 Oracle International Corporation Composite event handler for a multi-tenant identity cloud service
US10841337B2 (en) 2016-11-28 2020-11-17 Secureworks Corp. Computer implemented system and method, and computer program product for reversibly remediating a security risk
SG10201913949UA (en) * 2016-12-30 2020-03-30 Bitdefender Netherlands B V System for preparing network traffic for fast analysis
US10868832B2 (en) * 2017-03-22 2020-12-15 Ca, Inc. Systems and methods for enforcing dynamic network security policies
US10476673B2 (en) 2017-03-22 2019-11-12 Extrahop Networks, Inc. Managing session secrets for continuous packet capture systems
WO2018233891A1 (en) * 2017-06-23 2018-12-27 Robert Bosch Gmbh Graphical user interface tool for configuring a vehicle's intrusion detection system
US10503899B2 (en) 2017-07-10 2019-12-10 Centripetal Networks, Inc. Cyberanalysis workflow acceleration
US11233777B2 (en) 2017-07-24 2022-01-25 Centripetal Networks, Inc. Efficient SSL/TLS proxy
US10284526B2 (en) 2017-07-24 2019-05-07 Centripetal Networks, Inc. Efficient SSL/TLS proxy
US11308132B2 (en) 2017-09-27 2022-04-19 Oracle International Corporation Reference attributes for related stored objects in a multi-tenant cloud service
US10705823B2 (en) 2017-09-29 2020-07-07 Oracle International Corporation Application templates and upgrade framework for a multi-tenant identity cloud service
US10855705B2 (en) * 2017-09-29 2020-12-01 Cisco Technology, Inc. Enhanced flow-based computer network threat detection
EP3474489B1 (en) * 2017-10-17 2020-05-20 Deutsche Telekom AG A method and a system to enable a (re-)configuration of a telecommunications network
US11416563B1 (en) 2017-10-20 2022-08-16 Amazon Technologies, Inc. Query language for selecting and addressing resources
US9967292B1 (en) 2017-10-25 2018-05-08 Extrahop Networks, Inc. Inline secret sharing
US10735470B2 (en) 2017-11-06 2020-08-04 Secureworks Corp. Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics
US10594713B2 (en) 2017-11-10 2020-03-17 Secureworks Corp. Systems and methods for secure propagation of statistical models within threat intelligence communities
US20200311617A1 (en) * 2017-11-22 2020-10-01 Amazon Technologies, Inc. Packaging and deploying algorithms for flexible machine learning
US10715564B2 (en) 2018-01-29 2020-07-14 Oracle International Corporation Dynamic client registration for an identity cloud service
US10389574B1 (en) 2018-02-07 2019-08-20 Extrahop Networks, Inc. Ranking alerts based on network monitoring
US10038611B1 (en) 2018-02-08 2018-07-31 Extrahop Networks, Inc. Personalization of alerts based on network monitoring
US10270794B1 (en) 2018-02-09 2019-04-23 Extrahop Networks, Inc. Detection of denial of service attacks
TWI657681B (en) * 2018-02-13 2019-04-21 愛迪爾資訊有限公司 Analysis method of network flow and system
CN110389786B (en) * 2018-04-20 2022-10-14 伊姆西Ip控股有限责任公司 Kernel management method, electronic device and computer-readable storage medium
CN108737275B (en) * 2018-05-29 2020-04-21 北京航空航天大学 Plug-and-play satellite-borne network management method based on SpaceFibre
US10785238B2 (en) 2018-06-12 2020-09-22 Secureworks Corp. Systems and methods for threat discovery across distinct organizations
US11003718B2 (en) 2018-06-12 2021-05-11 Secureworks Corp. Systems and methods for enabling a global aggregated search, while allowing configurable client anonymity
US11063658B2 (en) 2018-06-28 2021-07-13 Amazon Technologies, Inc. Satellite antenna ground station service system
US10333898B1 (en) 2018-07-09 2019-06-25 Centripetal Networks, Inc. Methods and systems for efficient network protection
JP6965843B2 (en) * 2018-08-02 2021-11-10 日本電信電話株式会社 Catalog creation support device, support screen display method and catalog creation support method
US10411978B1 (en) 2018-08-09 2019-09-10 Extrahop Networks, Inc. Correlating causes and effects associated with network activity
US10594718B1 (en) 2018-08-21 2020-03-17 Extrahop Networks, Inc. Managing incident response operations based on monitored network activity
CN110956349B (en) * 2018-09-27 2023-05-09 阿里巴巴集团控股有限公司 Quality of service analysis method, system, device, server and electronic equipment
CN109471846A (en) * 2018-11-02 2019-03-15 中国电子科技网络信息安全有限公司 User behavior auditing system and method on a kind of cloud based on cloud log analysis
US11238174B2 (en) * 2019-01-31 2022-02-01 Salesforce.Com, Inc. Systems and methods of database encryption in a multitenant database management system
EP3700134A1 (en) * 2019-02-21 2020-08-26 Sandvine Corporation System and method for providing a network traffic portal
US11792226B2 (en) 2019-02-25 2023-10-17 Oracle International Corporation Automatic api document generation from scim metadata
US11423111B2 (en) 2019-02-25 2022-08-23 Oracle International Corporation Client API for rest based endpoints for a multi-tenant identify cloud service
US11310268B2 (en) 2019-05-06 2022-04-19 Secureworks Corp. Systems and methods using computer vision and machine learning for detection of malicious actions
US11418524B2 (en) 2019-05-07 2022-08-16 SecureworksCorp. Systems and methods of hierarchical behavior activity modeling and detection for systems-level security
US10965702B2 (en) * 2019-05-28 2021-03-30 Extrahop Networks, Inc. Detecting injection attacks using passive network monitoring
CA3208382A1 (en) * 2019-06-17 2020-12-17 Bank Of Montreal Network capacity planning systems and methods
US11405321B2 (en) * 2019-07-23 2022-08-02 At&T Mobility Ii Llc 5G filters for virtual network functions
US11165814B2 (en) 2019-07-29 2021-11-02 Extrahop Networks, Inc. Modifying triage information based on network monitoring
US10742530B1 (en) 2019-08-05 2020-08-11 Extrahop Networks, Inc. Correlating network traffic that crosses opaque endpoints
US11388072B2 (en) 2019-08-05 2022-07-12 Extrahop Networks, Inc. Correlating network traffic that crosses opaque endpoints
US10742677B1 (en) 2019-09-04 2020-08-11 Extrahop Networks, Inc. Automatic determination of user roles and asset types based on network monitoring
US11870770B2 (en) 2019-09-13 2024-01-09 Oracle International Corporation Multi-tenant identity cloud service with on-premise authentication integration
US11687378B2 (en) 2019-09-13 2023-06-27 Oracle International Corporation Multi-tenant identity cloud service with on-premise authentication integration and bridge high availability
US11381589B2 (en) 2019-10-11 2022-07-05 Secureworks Corp. Systems and methods for distributed extended common vulnerabilities and exposures data management
US11483290B2 (en) * 2019-10-21 2022-10-25 Cisco Technology, Inc. Distribution of stateless security functions
KR102260272B1 (en) * 2019-12-12 2021-06-03 한국과학기술정보연구원 Apparatus for visualizling security information, method thereof, and storage medium storing a program visualizing security information
US11522877B2 (en) 2019-12-16 2022-12-06 Secureworks Corp. Systems and methods for identifying malicious actors or activities
US11165823B2 (en) 2019-12-17 2021-11-02 Extrahop Networks, Inc. Automated preemptive polymorphic deception
CN111190805A (en) * 2019-12-29 2020-05-22 广东浪潮大数据研究有限公司 Training log visualization system, method and equipment of deep learning training platform
US11204975B1 (en) * 2020-08-10 2021-12-21 Coupang Corp. Program interface remote management and provisioning
US11588834B2 (en) 2020-09-03 2023-02-21 Secureworks Corp. Systems and methods for identifying attack patterns or suspicious activity in client networks
EP4218212A1 (en) 2020-09-23 2023-08-02 ExtraHop Networks, Inc. Monitoring encrypted network traffic
US11463466B2 (en) 2020-09-23 2022-10-04 Extrahop Networks, Inc. Monitoring encrypted network traffic
US11362996B2 (en) 2020-10-27 2022-06-14 Centripetal Networks, Inc. Methods and systems for efficient adaptive logging of cyber threat incidents
US11528294B2 (en) 2021-02-18 2022-12-13 SecureworksCorp. Systems and methods for automated threat detection
US11726957B2 (en) 2021-04-07 2023-08-15 Pensando Systems Inc. Methods and systems for a network flow log database
US11159546B1 (en) 2021-04-20 2021-10-26 Centripetal Networks, Inc. Methods and systems for efficient threat context-aware packet filtering for network protection
US11349861B1 (en) 2021-06-18 2022-05-31 Extrahop Networks, Inc. Identifying network entities based on beaconing activity
CN113709017B (en) * 2021-08-17 2022-10-04 中盈优创资讯科技有限公司 Method and device for acquiring virtualization traffic
CN113746837B (en) * 2021-09-03 2023-07-21 北京百度网讯科技有限公司 Information processing method and apparatus, electronic device, and computer readable medium
US11296967B1 (en) 2021-09-23 2022-04-05 Extrahop Networks, Inc. Combining passive network analysis and active probing
KR102393183B1 (en) * 2021-09-29 2022-05-02 (주)로그스택 Method, device and system for managing and processing log data of corporate server
US11843606B2 (en) 2022-03-30 2023-12-12 Extrahop Networks, Inc. Detecting abnormal data access based on data similarity

Family Cites Families (46)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3278865B2 (en) 1991-06-28 2002-04-30 日本電気株式会社 Traffic control method
JP3141988B2 (en) 1996-10-30 2001-03-07 三菱電機株式会社 Problem analysis method for computer systems
EP0883075A3 (en) * 1997-06-05 1999-01-27 Nortel Networks Corporation A method and apparatus for forecasting future values of a time series
US6243451B1 (en) 1997-10-09 2001-06-05 Alcatel Usa Sourcing, L.P. Service management access point
US20020120741A1 (en) 2000-03-03 2002-08-29 Webb Theodore S. Systems and methods for using distributed interconnects in information management enviroments
US7266595B1 (en) 2000-05-20 2007-09-04 Ciena Corporation Accessing network device data through user profiles
US7280529B1 (en) 2000-05-20 2007-10-09 Ciena Corporation Providing network management access through user profiles
US7020696B1 (en) 2000-05-20 2006-03-28 Ciena Corp. Distributed user management information in telecommunications networks
US7174566B2 (en) 2002-02-01 2007-02-06 Intel Corporation Integrated network intrusion detection
JP2004165761A (en) * 2002-11-11 2004-06-10 Nec Corp Communication system
US8560671B1 (en) 2003-10-23 2013-10-15 Netapp, Inc. Systems and methods for path-based management of virtual servers in storage network environments
WO2005093576A1 (en) 2004-03-28 2005-10-06 Robert Iakobashvili Visualization of packet network performance, analysis and optimization for design
US8584239B2 (en) 2004-04-01 2013-11-12 Fireeye, Inc. Virtual machine with dynamic data flow analysis
JP4400868B2 (en) * 2004-04-05 2010-01-20 日本電信電話株式会社 Unauthorized communication automatic setting intrusion detection device, method and recording medium
US7522634B2 (en) 2004-10-27 2009-04-21 Qwest Communications International Inc. User-to-user data relay systems and methods
US8005483B2 (en) 2004-10-27 2011-08-23 Qwest Communications International Inc. Mobile caching and data relay vectoring systems and methods
US7849502B1 (en) 2006-04-29 2010-12-07 Ironport Systems, Inc. Apparatus for monitoring network traffic
US8125897B2 (en) 2006-08-22 2012-02-28 Embarq Holdings Company Lp System and method for monitoring and optimizing network performance with user datagram protocol network performance information packets
US8032317B2 (en) * 2008-05-15 2011-10-04 The Nielsen Company (Us), Llc System and methods for metering and analyzing energy consumption of events within a portable device
US20100031156A1 (en) * 2008-07-31 2010-02-04 Mazu Networks, Inc. User Interface For Network Events and Tuning
US8935382B2 (en) * 2009-03-16 2015-01-13 Microsoft Corporation Flexible logging, such as for a web server
US8458769B2 (en) * 2009-12-12 2013-06-04 Akamai Technologies, Inc. Cloud based firewall system and service
KR101400415B1 (en) 2009-12-21 2014-05-28 한국기술교육대학교 산학협력단 Network-based Flow Binding Method Through Terminal's Notification
US8595843B1 (en) * 2010-08-12 2013-11-26 Amazon Technologies, Inc. Techniques for identifying sources of unauthorized code
JP2012099062A (en) 2010-11-05 2012-05-24 Hitachi Ltd Service cooperation system and information processing system
US9329886B2 (en) 2010-12-10 2016-05-03 Amazon Technologies, Inc. Virtual machine morphing for heterogeneous migration environments
US9460169B2 (en) * 2011-01-12 2016-10-04 International Business Machines Corporation Multi-tenant audit awareness in support of cloud environments
JP5659839B2 (en) * 2011-02-10 2015-01-28 横河電機株式会社 Illegal packet extractor
JP2012173779A (en) 2011-02-17 2012-09-10 Ntt Docomo Inc Distributed processing state visualization system, distributed processing state visualization device, distributed processing state visualization program, and distributed processing state visualization method
US9319272B1 (en) * 2011-09-21 2016-04-19 Amazon Technologies, Inc. Methods and apparatus for providing composed appliance services in virtualized private networks
CN103428177B (en) * 2012-05-18 2018-03-23 中兴通讯股份有限公司 The configuration of cloud environment audit log and/or security incident, generation method and device
WO2013186900A1 (en) * 2012-06-14 2013-12-19 三菱電機株式会社 Optical transmission system, station-side optical terminal apparatus, and communication line switching method
US10203972B2 (en) 2012-08-27 2019-02-12 Vmware, Inc. Framework for networking and security services in virtual networks
JP2014081811A (en) 2012-10-17 2014-05-08 Hitachi Solutions Ltd Log management system and log management method
JP2014096675A (en) 2012-11-08 2014-05-22 Hitachi Ltd Communication apparatus and setting method
US8881259B2 (en) * 2012-12-18 2014-11-04 Verizon Patent And Licensing Inc. Network security system with customizable rule-based analytics engine for identifying application layer violations
CN103051710B (en) * 2012-12-20 2016-04-13 中国科学院深圳先进技术研究院 A kind of virtual cloud platform management system
US9060025B2 (en) * 2013-02-05 2015-06-16 Fortinet, Inc. Cloud-based security policy configuration
EP2961111B1 (en) 2013-02-21 2018-01-31 Nippon Telegraph and Telephone Corporation Network monitoring device, network monitoring method, and network monitoring program
US10389608B2 (en) * 2013-03-15 2019-08-20 Amazon Technologies, Inc. Network traffic mapping and performance analysis
JP5894963B2 (en) * 2013-04-30 2016-03-30 株式会社日立製作所 Analysis server and analysis method
US9049173B2 (en) * 2013-06-05 2015-06-02 Fortinet, Inc. Cloud based logging service
US9251344B2 (en) * 2013-06-09 2016-02-02 Tencent Technology (Shenzhen) Company Limited Method, device and storage medium for processing virus
US20150067171A1 (en) 2013-08-30 2015-03-05 Verizon Patent And Licensing Inc. Cloud service brokering systems and methods
CN104378387A (en) * 2014-12-09 2015-02-25 浪潮电子信息产业股份有限公司 Virtual platform information security protection method
US9667656B2 (en) 2015-03-30 2017-05-30 Amazon Technologies, Inc. Networking flow logs for multi-tenant environments

Also Published As

Publication number Publication date
US9667656B2 (en) 2017-05-30
US11659004B2 (en) 2023-05-23
CA2980583C (en) 2021-11-23
JP6608948B2 (en) 2019-11-20
JP2020039137A (en) 2020-03-12
EP3278534B1 (en) 2020-06-03
AU2019204090B2 (en) 2020-05-14
AU2016242813B2 (en) 2019-03-14
CA2980583A1 (en) 2016-10-06
EP3278534A1 (en) 2018-02-07
JP2018510576A (en) 2018-04-12
AU2019204090A1 (en) 2019-07-04
US20160294870A1 (en) 2016-10-06
AU2016242813A1 (en) 2017-10-19
JP2020114016A (en) 2020-07-27
JP6687799B2 (en) 2020-04-28
CN112187764A (en) 2021-01-05
US10469536B2 (en) 2019-11-05
WO2016160848A1 (en) 2016-10-06
US20200220900A1 (en) 2020-07-09
JP7211391B2 (en) 2023-01-24
US20170359384A1 (en) 2017-12-14
CN107431712A (en) 2017-12-01
CN107431712B (en) 2020-10-16
US20190104158A1 (en) 2019-04-04
US10187427B2 (en) 2019-01-22
SG11201707777YA (en) 2017-10-30

Similar Documents

Publication Publication Date Title
SG10201808502QA (en) Networking flow logs for multi-tenant environments
US20220377093A1 (en) System and method for data compliance and prevention with threat detection and response
EP4271017A3 (en) Secured home network
US20180121657A1 (en) Security risk evaluation
MX2017003826A (en) Distributed traffic management system and techniques.
Lee et al. Toward the SIEM architecture for cloud-based security services
US20180137303A1 (en) Intercepting sensitive data using hashed candidates
GB2531677A (en) A network security system
US9112900B1 (en) Distributed polymorphic transformation of served content
SG11201808421SA (en) Method and device for generating logistics distribution network
US20160330215A1 (en) Detection of potentially malicious web content by emulating user behavior and user environment
GB2555341A (en) Systems and methods for utilizing webpage scripts to segment client sessions of a website
Creese et al. Inadequacies of current risk controls for the cloud
JP2016525247A5 (en)
TR201901051T4 (en) Self service terminal service emergency method and site server
US10306465B2 (en) Protecting sensitive data in a security area
Fetjah et al. Toward a big data architecture for security events analytic
SG10201705700RA (en) Digital asset tracking system and method
Fehér et al. Cloud SaaS security issues and challenges
US20170124139A1 (en) Privacy Enforcement of Data Query Results.
SG10201803964RA (en) Systems and methods for authenticating network messages
Ell et al. Quaternion algebra
Wang Are enterprises really ready to move into the cloud
MY188883A (en) Methods and systems for use in monitoring the operations of a business
Yamato et al. Survey of public IaaS cloud computing API