SG10201808502QA - Networking flow logs for multi-tenant environments - Google Patents
Networking flow logs for multi-tenant environmentsInfo
- Publication number
- SG10201808502QA SG10201808502QA SG10201808502QA SG10201808502QA SG10201808502QA SG 10201808502Q A SG10201808502Q A SG 10201808502QA SG 10201808502Q A SG10201808502Q A SG 10201808502QA SG 10201808502Q A SG10201808502Q A SG 10201808502QA SG 10201808502Q A SG10201808502Q A SG 10201808502QA
- Authority
- SG
- Singapore
- Prior art keywords
- log information
- computing resources
- firewall
- customer
- security device
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
- H04L43/067—Generation of reports using time frame reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Abstract
OF THE DISCLOSURE Computing resource service providers may provide computing resources to customers in a multi-tenant environment. These computing resources may be behind a firewall or other security device such that certain information does not reach the computing resources provided to the customer. A logging entity may be implemented on computer server 5 operated by the computing resource service provider. The logging entity may obtain log information from the firewall or other security device and store the log information such that it is accessible to the customer. Additionally, the log information may be provided to other services such as a metrics service or intrusion detection service. 10 [FIG. 1]
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/673,516 US9667656B2 (en) | 2015-03-30 | 2015-03-30 | Networking flow logs for multi-tenant environments |
Publications (1)
Publication Number | Publication Date |
---|---|
SG10201808502QA true SG10201808502QA (en) | 2018-11-29 |
Family
ID=55699841
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG10201808502QA SG10201808502QA (en) | 2015-03-30 | 2016-03-29 | Networking flow logs for multi-tenant environments |
SG11201707777YA SG11201707777YA (en) | 2015-03-30 | 2016-03-29 | Networking flow logs for multi-tenant environments |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
SG11201707777YA SG11201707777YA (en) | 2015-03-30 | 2016-03-29 | Networking flow logs for multi-tenant environments |
Country Status (8)
Country | Link |
---|---|
US (4) | US9667656B2 (en) |
EP (1) | EP3278534B1 (en) |
JP (3) | JP6608948B2 (en) |
CN (2) | CN112187764A (en) |
AU (2) | AU2016242813B2 (en) |
CA (1) | CA2980583C (en) |
SG (2) | SG10201808502QA (en) |
WO (1) | WO2016160848A1 (en) |
Families Citing this family (86)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9565213B2 (en) | 2012-10-22 | 2017-02-07 | Centripetal Networks, Inc. | Methods and systems for protecting a secured network |
US9137205B2 (en) | 2012-10-22 | 2015-09-15 | Centripetal Networks, Inc. | Methods and systems for protecting a secured network |
US9203806B2 (en) | 2013-01-11 | 2015-12-01 | Centripetal Networks, Inc. | Rule swapping in a packet network |
US9124552B2 (en) | 2013-03-12 | 2015-09-01 | Centripetal Networks, Inc. | Filtering network data transfers |
US9094445B2 (en) | 2013-03-15 | 2015-07-28 | Centripetal Networks, Inc. | Protecting networks from cyber attacks and overloading |
US9264370B1 (en) | 2015-02-10 | 2016-02-16 | Centripetal Networks, Inc. | Correlating packets in communications networks |
US9667656B2 (en) * | 2015-03-30 | 2017-05-30 | Amazon Technologies, Inc. | Networking flow logs for multi-tenant environments |
US9866576B2 (en) | 2015-04-17 | 2018-01-09 | Centripetal Networks, Inc. | Rule-based network-threat detection |
US10498764B2 (en) * | 2015-12-08 | 2019-12-03 | Jpu.Io Ltd | Network routing and security within a mobile radio network |
US9917856B2 (en) | 2015-12-23 | 2018-03-13 | Centripetal Networks, Inc. | Rule-based network-threat detection for encrypted communications |
US11729144B2 (en) | 2016-01-04 | 2023-08-15 | Centripetal Networks, Llc | Efficient packet capture for cyber threat analysis |
US10284598B2 (en) | 2016-01-29 | 2019-05-07 | Sophos Limited | Honeypot network services |
US10484382B2 (en) | 2016-08-31 | 2019-11-19 | Oracle International Corporation | Data management for a multi-tenant identity cloud service |
US10846390B2 (en) | 2016-09-14 | 2020-11-24 | Oracle International Corporation | Single sign-on functionality for a multi-tenant identity and data security management cloud service |
US10594684B2 (en) | 2016-09-14 | 2020-03-17 | Oracle International Corporation | Generating derived credentials for a multi-tenant identity cloud service |
US10445395B2 (en) | 2016-09-16 | 2019-10-15 | Oracle International Corporation | Cookie based state propagation for a multi-tenant identity cloud service |
WO2018053258A1 (en) * | 2016-09-16 | 2018-03-22 | Oracle International Corporation | Tenant and service management for a multi-tenant identity and data security management cloud service |
US10904074B2 (en) | 2016-09-17 | 2021-01-26 | Oracle International Corporation | Composite event handler for a multi-tenant identity cloud service |
US10841337B2 (en) | 2016-11-28 | 2020-11-17 | Secureworks Corp. | Computer implemented system and method, and computer program product for reversibly remediating a security risk |
SG10201913949UA (en) * | 2016-12-30 | 2020-03-30 | Bitdefender Netherlands B V | System for preparing network traffic for fast analysis |
US10868832B2 (en) * | 2017-03-22 | 2020-12-15 | Ca, Inc. | Systems and methods for enforcing dynamic network security policies |
US10476673B2 (en) | 2017-03-22 | 2019-11-12 | Extrahop Networks, Inc. | Managing session secrets for continuous packet capture systems |
WO2018233891A1 (en) * | 2017-06-23 | 2018-12-27 | Robert Bosch Gmbh | Graphical user interface tool for configuring a vehicle's intrusion detection system |
US10503899B2 (en) | 2017-07-10 | 2019-12-10 | Centripetal Networks, Inc. | Cyberanalysis workflow acceleration |
US11233777B2 (en) | 2017-07-24 | 2022-01-25 | Centripetal Networks, Inc. | Efficient SSL/TLS proxy |
US10284526B2 (en) | 2017-07-24 | 2019-05-07 | Centripetal Networks, Inc. | Efficient SSL/TLS proxy |
US11308132B2 (en) | 2017-09-27 | 2022-04-19 | Oracle International Corporation | Reference attributes for related stored objects in a multi-tenant cloud service |
US10705823B2 (en) | 2017-09-29 | 2020-07-07 | Oracle International Corporation | Application templates and upgrade framework for a multi-tenant identity cloud service |
US10855705B2 (en) * | 2017-09-29 | 2020-12-01 | Cisco Technology, Inc. | Enhanced flow-based computer network threat detection |
EP3474489B1 (en) * | 2017-10-17 | 2020-05-20 | Deutsche Telekom AG | A method and a system to enable a (re-)configuration of a telecommunications network |
US11416563B1 (en) | 2017-10-20 | 2022-08-16 | Amazon Technologies, Inc. | Query language for selecting and addressing resources |
US9967292B1 (en) | 2017-10-25 | 2018-05-08 | Extrahop Networks, Inc. | Inline secret sharing |
US10735470B2 (en) | 2017-11-06 | 2020-08-04 | Secureworks Corp. | Systems and methods for sharing, distributing, or accessing security data and/or security applications, models, or analytics |
US10594713B2 (en) | 2017-11-10 | 2020-03-17 | Secureworks Corp. | Systems and methods for secure propagation of statistical models within threat intelligence communities |
US20200311617A1 (en) * | 2017-11-22 | 2020-10-01 | Amazon Technologies, Inc. | Packaging and deploying algorithms for flexible machine learning |
US10715564B2 (en) | 2018-01-29 | 2020-07-14 | Oracle International Corporation | Dynamic client registration for an identity cloud service |
US10389574B1 (en) | 2018-02-07 | 2019-08-20 | Extrahop Networks, Inc. | Ranking alerts based on network monitoring |
US10038611B1 (en) | 2018-02-08 | 2018-07-31 | Extrahop Networks, Inc. | Personalization of alerts based on network monitoring |
US10270794B1 (en) | 2018-02-09 | 2019-04-23 | Extrahop Networks, Inc. | Detection of denial of service attacks |
TWI657681B (en) * | 2018-02-13 | 2019-04-21 | 愛迪爾資訊有限公司 | Analysis method of network flow and system |
CN110389786B (en) * | 2018-04-20 | 2022-10-14 | 伊姆西Ip控股有限责任公司 | Kernel management method, electronic device and computer-readable storage medium |
CN108737275B (en) * | 2018-05-29 | 2020-04-21 | 北京航空航天大学 | Plug-and-play satellite-borne network management method based on SpaceFibre |
US10785238B2 (en) | 2018-06-12 | 2020-09-22 | Secureworks Corp. | Systems and methods for threat discovery across distinct organizations |
US11003718B2 (en) | 2018-06-12 | 2021-05-11 | Secureworks Corp. | Systems and methods for enabling a global aggregated search, while allowing configurable client anonymity |
US11063658B2 (en) | 2018-06-28 | 2021-07-13 | Amazon Technologies, Inc. | Satellite antenna ground station service system |
US10333898B1 (en) | 2018-07-09 | 2019-06-25 | Centripetal Networks, Inc. | Methods and systems for efficient network protection |
JP6965843B2 (en) * | 2018-08-02 | 2021-11-10 | 日本電信電話株式会社 | Catalog creation support device, support screen display method and catalog creation support method |
US10411978B1 (en) | 2018-08-09 | 2019-09-10 | Extrahop Networks, Inc. | Correlating causes and effects associated with network activity |
US10594718B1 (en) | 2018-08-21 | 2020-03-17 | Extrahop Networks, Inc. | Managing incident response operations based on monitored network activity |
CN110956349B (en) * | 2018-09-27 | 2023-05-09 | 阿里巴巴集团控股有限公司 | Quality of service analysis method, system, device, server and electronic equipment |
CN109471846A (en) * | 2018-11-02 | 2019-03-15 | 中国电子科技网络信息安全有限公司 | User behavior auditing system and method on a kind of cloud based on cloud log analysis |
US11238174B2 (en) * | 2019-01-31 | 2022-02-01 | Salesforce.Com, Inc. | Systems and methods of database encryption in a multitenant database management system |
EP3700134A1 (en) * | 2019-02-21 | 2020-08-26 | Sandvine Corporation | System and method for providing a network traffic portal |
US11792226B2 (en) | 2019-02-25 | 2023-10-17 | Oracle International Corporation | Automatic api document generation from scim metadata |
US11423111B2 (en) | 2019-02-25 | 2022-08-23 | Oracle International Corporation | Client API for rest based endpoints for a multi-tenant identify cloud service |
US11310268B2 (en) | 2019-05-06 | 2022-04-19 | Secureworks Corp. | Systems and methods using computer vision and machine learning for detection of malicious actions |
US11418524B2 (en) | 2019-05-07 | 2022-08-16 | SecureworksCorp. | Systems and methods of hierarchical behavior activity modeling and detection for systems-level security |
US10965702B2 (en) * | 2019-05-28 | 2021-03-30 | Extrahop Networks, Inc. | Detecting injection attacks using passive network monitoring |
CA3208382A1 (en) * | 2019-06-17 | 2020-12-17 | Bank Of Montreal | Network capacity planning systems and methods |
US11405321B2 (en) * | 2019-07-23 | 2022-08-02 | At&T Mobility Ii Llc | 5G filters for virtual network functions |
US11165814B2 (en) | 2019-07-29 | 2021-11-02 | Extrahop Networks, Inc. | Modifying triage information based on network monitoring |
US10742530B1 (en) | 2019-08-05 | 2020-08-11 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
US11388072B2 (en) | 2019-08-05 | 2022-07-12 | Extrahop Networks, Inc. | Correlating network traffic that crosses opaque endpoints |
US10742677B1 (en) | 2019-09-04 | 2020-08-11 | Extrahop Networks, Inc. | Automatic determination of user roles and asset types based on network monitoring |
US11870770B2 (en) | 2019-09-13 | 2024-01-09 | Oracle International Corporation | Multi-tenant identity cloud service with on-premise authentication integration |
US11687378B2 (en) | 2019-09-13 | 2023-06-27 | Oracle International Corporation | Multi-tenant identity cloud service with on-premise authentication integration and bridge high availability |
US11381589B2 (en) | 2019-10-11 | 2022-07-05 | Secureworks Corp. | Systems and methods for distributed extended common vulnerabilities and exposures data management |
US11483290B2 (en) * | 2019-10-21 | 2022-10-25 | Cisco Technology, Inc. | Distribution of stateless security functions |
KR102260272B1 (en) * | 2019-12-12 | 2021-06-03 | 한국과학기술정보연구원 | Apparatus for visualizling security information, method thereof, and storage medium storing a program visualizing security information |
US11522877B2 (en) | 2019-12-16 | 2022-12-06 | Secureworks Corp. | Systems and methods for identifying malicious actors or activities |
US11165823B2 (en) | 2019-12-17 | 2021-11-02 | Extrahop Networks, Inc. | Automated preemptive polymorphic deception |
CN111190805A (en) * | 2019-12-29 | 2020-05-22 | 广东浪潮大数据研究有限公司 | Training log visualization system, method and equipment of deep learning training platform |
US11204975B1 (en) * | 2020-08-10 | 2021-12-21 | Coupang Corp. | Program interface remote management and provisioning |
US11588834B2 (en) | 2020-09-03 | 2023-02-21 | Secureworks Corp. | Systems and methods for identifying attack patterns or suspicious activity in client networks |
EP4218212A1 (en) | 2020-09-23 | 2023-08-02 | ExtraHop Networks, Inc. | Monitoring encrypted network traffic |
US11463466B2 (en) | 2020-09-23 | 2022-10-04 | Extrahop Networks, Inc. | Monitoring encrypted network traffic |
US11362996B2 (en) | 2020-10-27 | 2022-06-14 | Centripetal Networks, Inc. | Methods and systems for efficient adaptive logging of cyber threat incidents |
US11528294B2 (en) | 2021-02-18 | 2022-12-13 | SecureworksCorp. | Systems and methods for automated threat detection |
US11726957B2 (en) | 2021-04-07 | 2023-08-15 | Pensando Systems Inc. | Methods and systems for a network flow log database |
US11159546B1 (en) | 2021-04-20 | 2021-10-26 | Centripetal Networks, Inc. | Methods and systems for efficient threat context-aware packet filtering for network protection |
US11349861B1 (en) | 2021-06-18 | 2022-05-31 | Extrahop Networks, Inc. | Identifying network entities based on beaconing activity |
CN113709017B (en) * | 2021-08-17 | 2022-10-04 | 中盈优创资讯科技有限公司 | Method and device for acquiring virtualization traffic |
CN113746837B (en) * | 2021-09-03 | 2023-07-21 | 北京百度网讯科技有限公司 | Information processing method and apparatus, electronic device, and computer readable medium |
US11296967B1 (en) | 2021-09-23 | 2022-04-05 | Extrahop Networks, Inc. | Combining passive network analysis and active probing |
KR102393183B1 (en) * | 2021-09-29 | 2022-05-02 | (주)로그스택 | Method, device and system for managing and processing log data of corporate server |
US11843606B2 (en) | 2022-03-30 | 2023-12-12 | Extrahop Networks, Inc. | Detecting abnormal data access based on data similarity |
Family Cites Families (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP3278865B2 (en) | 1991-06-28 | 2002-04-30 | 日本電気株式会社 | Traffic control method |
JP3141988B2 (en) | 1996-10-30 | 2001-03-07 | 三菱電機株式会社 | Problem analysis method for computer systems |
EP0883075A3 (en) * | 1997-06-05 | 1999-01-27 | Nortel Networks Corporation | A method and apparatus for forecasting future values of a time series |
US6243451B1 (en) | 1997-10-09 | 2001-06-05 | Alcatel Usa Sourcing, L.P. | Service management access point |
US20020120741A1 (en) | 2000-03-03 | 2002-08-29 | Webb Theodore S. | Systems and methods for using distributed interconnects in information management enviroments |
US7266595B1 (en) | 2000-05-20 | 2007-09-04 | Ciena Corporation | Accessing network device data through user profiles |
US7280529B1 (en) | 2000-05-20 | 2007-10-09 | Ciena Corporation | Providing network management access through user profiles |
US7020696B1 (en) | 2000-05-20 | 2006-03-28 | Ciena Corp. | Distributed user management information in telecommunications networks |
US7174566B2 (en) | 2002-02-01 | 2007-02-06 | Intel Corporation | Integrated network intrusion detection |
JP2004165761A (en) * | 2002-11-11 | 2004-06-10 | Nec Corp | Communication system |
US8560671B1 (en) | 2003-10-23 | 2013-10-15 | Netapp, Inc. | Systems and methods for path-based management of virtual servers in storage network environments |
WO2005093576A1 (en) | 2004-03-28 | 2005-10-06 | Robert Iakobashvili | Visualization of packet network performance, analysis and optimization for design |
US8584239B2 (en) | 2004-04-01 | 2013-11-12 | Fireeye, Inc. | Virtual machine with dynamic data flow analysis |
JP4400868B2 (en) * | 2004-04-05 | 2010-01-20 | 日本電信電話株式会社 | Unauthorized communication automatic setting intrusion detection device, method and recording medium |
US7522634B2 (en) | 2004-10-27 | 2009-04-21 | Qwest Communications International Inc. | User-to-user data relay systems and methods |
US8005483B2 (en) | 2004-10-27 | 2011-08-23 | Qwest Communications International Inc. | Mobile caching and data relay vectoring systems and methods |
US7849502B1 (en) | 2006-04-29 | 2010-12-07 | Ironport Systems, Inc. | Apparatus for monitoring network traffic |
US8125897B2 (en) | 2006-08-22 | 2012-02-28 | Embarq Holdings Company Lp | System and method for monitoring and optimizing network performance with user datagram protocol network performance information packets |
US8032317B2 (en) * | 2008-05-15 | 2011-10-04 | The Nielsen Company (Us), Llc | System and methods for metering and analyzing energy consumption of events within a portable device |
US20100031156A1 (en) * | 2008-07-31 | 2010-02-04 | Mazu Networks, Inc. | User Interface For Network Events and Tuning |
US8935382B2 (en) * | 2009-03-16 | 2015-01-13 | Microsoft Corporation | Flexible logging, such as for a web server |
US8458769B2 (en) * | 2009-12-12 | 2013-06-04 | Akamai Technologies, Inc. | Cloud based firewall system and service |
KR101400415B1 (en) | 2009-12-21 | 2014-05-28 | 한국기술교육대학교 산학협력단 | Network-based Flow Binding Method Through Terminal's Notification |
US8595843B1 (en) * | 2010-08-12 | 2013-11-26 | Amazon Technologies, Inc. | Techniques for identifying sources of unauthorized code |
JP2012099062A (en) | 2010-11-05 | 2012-05-24 | Hitachi Ltd | Service cooperation system and information processing system |
US9329886B2 (en) | 2010-12-10 | 2016-05-03 | Amazon Technologies, Inc. | Virtual machine morphing for heterogeneous migration environments |
US9460169B2 (en) * | 2011-01-12 | 2016-10-04 | International Business Machines Corporation | Multi-tenant audit awareness in support of cloud environments |
JP5659839B2 (en) * | 2011-02-10 | 2015-01-28 | 横河電機株式会社 | Illegal packet extractor |
JP2012173779A (en) | 2011-02-17 | 2012-09-10 | Ntt Docomo Inc | Distributed processing state visualization system, distributed processing state visualization device, distributed processing state visualization program, and distributed processing state visualization method |
US9319272B1 (en) * | 2011-09-21 | 2016-04-19 | Amazon Technologies, Inc. | Methods and apparatus for providing composed appliance services in virtualized private networks |
CN103428177B (en) * | 2012-05-18 | 2018-03-23 | 中兴通讯股份有限公司 | The configuration of cloud environment audit log and/or security incident, generation method and device |
WO2013186900A1 (en) * | 2012-06-14 | 2013-12-19 | 三菱電機株式会社 | Optical transmission system, station-side optical terminal apparatus, and communication line switching method |
US10203972B2 (en) | 2012-08-27 | 2019-02-12 | Vmware, Inc. | Framework for networking and security services in virtual networks |
JP2014081811A (en) | 2012-10-17 | 2014-05-08 | Hitachi Solutions Ltd | Log management system and log management method |
JP2014096675A (en) | 2012-11-08 | 2014-05-22 | Hitachi Ltd | Communication apparatus and setting method |
US8881259B2 (en) * | 2012-12-18 | 2014-11-04 | Verizon Patent And Licensing Inc. | Network security system with customizable rule-based analytics engine for identifying application layer violations |
CN103051710B (en) * | 2012-12-20 | 2016-04-13 | 中国科学院深圳先进技术研究院 | A kind of virtual cloud platform management system |
US9060025B2 (en) * | 2013-02-05 | 2015-06-16 | Fortinet, Inc. | Cloud-based security policy configuration |
EP2961111B1 (en) | 2013-02-21 | 2018-01-31 | Nippon Telegraph and Telephone Corporation | Network monitoring device, network monitoring method, and network monitoring program |
US10389608B2 (en) * | 2013-03-15 | 2019-08-20 | Amazon Technologies, Inc. | Network traffic mapping and performance analysis |
JP5894963B2 (en) * | 2013-04-30 | 2016-03-30 | 株式会社日立製作所 | Analysis server and analysis method |
US9049173B2 (en) * | 2013-06-05 | 2015-06-02 | Fortinet, Inc. | Cloud based logging service |
US9251344B2 (en) * | 2013-06-09 | 2016-02-02 | Tencent Technology (Shenzhen) Company Limited | Method, device and storage medium for processing virus |
US20150067171A1 (en) | 2013-08-30 | 2015-03-05 | Verizon Patent And Licensing Inc. | Cloud service brokering systems and methods |
CN104378387A (en) * | 2014-12-09 | 2015-02-25 | 浪潮电子信息产业股份有限公司 | Virtual platform information security protection method |
US9667656B2 (en) | 2015-03-30 | 2017-05-30 | Amazon Technologies, Inc. | Networking flow logs for multi-tenant environments |
-
2015
- 2015-03-30 US US14/673,516 patent/US9667656B2/en active Active
-
2016
- 2016-03-29 SG SG10201808502QA patent/SG10201808502QA/en unknown
- 2016-03-29 EP EP16715429.3A patent/EP3278534B1/en active Active
- 2016-03-29 CN CN202011004315.5A patent/CN112187764A/en active Pending
- 2016-03-29 CA CA2980583A patent/CA2980583C/en active Active
- 2016-03-29 WO PCT/US2016/024789 patent/WO2016160848A1/en active Application Filing
- 2016-03-29 CN CN201680019649.5A patent/CN107431712B/en active Active
- 2016-03-29 SG SG11201707777YA patent/SG11201707777YA/en unknown
- 2016-03-29 AU AU2016242813A patent/AU2016242813B2/en active Active
- 2016-03-29 JP JP2017549418A patent/JP6608948B2/en active Active
-
2017
- 2017-05-25 US US15/605,194 patent/US10187427B2/en active Active
-
2018
- 2018-11-16 US US16/193,876 patent/US10469536B2/en active Active
-
2019
- 2019-06-12 AU AU2019204090A patent/AU2019204090B2/en active Active
- 2019-10-24 JP JP2019193500A patent/JP6687799B2/en active Active
- 2019-11-04 US US16/673,696 patent/US11659004B2/en active Active
-
2020
- 2020-04-02 JP JP2020067091A patent/JP7211391B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US9667656B2 (en) | 2017-05-30 |
US11659004B2 (en) | 2023-05-23 |
CA2980583C (en) | 2021-11-23 |
JP6608948B2 (en) | 2019-11-20 |
JP2020039137A (en) | 2020-03-12 |
EP3278534B1 (en) | 2020-06-03 |
AU2019204090B2 (en) | 2020-05-14 |
AU2016242813B2 (en) | 2019-03-14 |
CA2980583A1 (en) | 2016-10-06 |
EP3278534A1 (en) | 2018-02-07 |
JP2018510576A (en) | 2018-04-12 |
AU2019204090A1 (en) | 2019-07-04 |
US20160294870A1 (en) | 2016-10-06 |
AU2016242813A1 (en) | 2017-10-19 |
JP2020114016A (en) | 2020-07-27 |
JP6687799B2 (en) | 2020-04-28 |
CN112187764A (en) | 2021-01-05 |
US10469536B2 (en) | 2019-11-05 |
WO2016160848A1 (en) | 2016-10-06 |
US20200220900A1 (en) | 2020-07-09 |
JP7211391B2 (en) | 2023-01-24 |
US20170359384A1 (en) | 2017-12-14 |
CN107431712A (en) | 2017-12-01 |
CN107431712B (en) | 2020-10-16 |
US20190104158A1 (en) | 2019-04-04 |
US10187427B2 (en) | 2019-01-22 |
SG11201707777YA (en) | 2017-10-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
SG10201808502QA (en) | Networking flow logs for multi-tenant environments | |
US20220377093A1 (en) | System and method for data compliance and prevention with threat detection and response | |
EP4271017A3 (en) | Secured home network | |
US20180121657A1 (en) | Security risk evaluation | |
MX2017003826A (en) | Distributed traffic management system and techniques. | |
Lee et al. | Toward the SIEM architecture for cloud-based security services | |
US20180137303A1 (en) | Intercepting sensitive data using hashed candidates | |
GB2531677A (en) | A network security system | |
US9112900B1 (en) | Distributed polymorphic transformation of served content | |
SG11201808421SA (en) | Method and device for generating logistics distribution network | |
US20160330215A1 (en) | Detection of potentially malicious web content by emulating user behavior and user environment | |
GB2555341A (en) | Systems and methods for utilizing webpage scripts to segment client sessions of a website | |
Creese et al. | Inadequacies of current risk controls for the cloud | |
JP2016525247A5 (en) | ||
TR201901051T4 (en) | Self service terminal service emergency method and site server | |
US10306465B2 (en) | Protecting sensitive data in a security area | |
Fetjah et al. | Toward a big data architecture for security events analytic | |
SG10201705700RA (en) | Digital asset tracking system and method | |
Fehér et al. | Cloud SaaS security issues and challenges | |
US20170124139A1 (en) | Privacy Enforcement of Data Query Results. | |
SG10201803964RA (en) | Systems and methods for authenticating network messages | |
Ell et al. | Quaternion algebra | |
Wang | Are enterprises really ready to move into the cloud | |
MY188883A (en) | Methods and systems for use in monitoring the operations of a business | |
Yamato et al. | Survey of public IaaS cloud computing API |