US20070113272A2 - Real-time vulnerability monitoring - Google Patents

Real-time vulnerability monitoring Download PDF

Info

Publication number
US20070113272A2
US20070113272A2 US10/882,852 US88285204A US2007113272A2 US 20070113272 A2 US20070113272 A2 US 20070113272A2 US 88285204 A US88285204 A US 88285204A US 2007113272 A2 US2007113272 A2 US 2007113272A2
Authority
US
United States
Prior art keywords
database
system
information
security
determination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US10/882,852
Other versions
US20060230441A2 (en
US20050005171A1 (en
Inventor
Brett Oliphant
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SecurityProfiling Inc
Original Assignee
SecurityProfiling Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
Priority to US48408503P priority Critical
Application filed by SecurityProfiling Inc filed Critical SecurityProfiling Inc
Priority to US10/882,852 priority patent/US20070113272A2/en
Assigned to SECURITYPROFILING, INC. reassignment SECURITYPROFILING, INC. ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: OLIPHANT, BETT M.
Publication of US20050005171A1 publication Critical patent/US20050005171A1/en
Publication of US20060230441A2 publication Critical patent/US20060230441A2/en
Publication of US20070113272A2 publication Critical patent/US20070113272A2/en
Priority claimed from US14/499,234 external-priority patent/US9350752B2/en
Priority claimed from US14/499,226 external-priority patent/US9118708B2/en
Priority claimed from US14/499,227 external-priority patent/US20150033348A1/en
Priority claimed from US14/499,237 external-priority patent/US8984644B2/en
Priority claimed from US14/499,230 external-priority patent/US9100431B2/en
Priority claimed from US14/499,236 external-priority patent/US9118709B2/en
Priority claimed from US14/499,235 external-priority patent/US20150033350A1/en
Priority claimed from US14/499,244 external-priority patent/US20150040233A1/en
Priority claimed from US14/499,241 external-priority patent/US20150033353A1/en
Priority claimed from US14/499,239 external-priority patent/US9118710B2/en
Priority claimed from US14/499,250 external-priority patent/US20150033323A1/en
Priority claimed from US14/499,246 external-priority patent/US9118711B2/en
Assigned to SECURITYPROFILING, LLC reassignment SECURITYPROFILING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: SECURITYPROFILING, INC.
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=33555662&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=US20070113272(A2) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application status is Abandoned legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management

Abstract

A security information management system is described, wherein client-side devices preferably collect and monitor information describing the operating system, software, and patches installed on the device(s), as well as configuration thereof. A database of this information is maintained, along with data describing vulnerabilities of available software and associated remediation techniques available for it. The system exposes an API to support security-related decisions by other applications. For example, an intrusion detection system (IDS) accesses the database to determine whether an actual threat exists and should be (or has been) blocked.

Description

    CROSS-REFERENCE TO RELATED APPLICATIONS
  • This application claims the benefit of U.S. Provisional Application No. 60/484,085. This application is also related to applications titled MULTIPLE-PATH REMEDIATION (Attorney Docket No. 36029-4), POLICY-PROTECTION PROXY (Attorney Docket No. 36029-5), VULNERABILITY AND REMEDIATION DATABASE (Attorney Docket No. 36029-6), AUTOMATED STAGED PATCH AND POLICY MANAGEMENT (Attorney Docket No. 36029-7), and CLIENT CAPTURE OF VULNERABILITY DATA (Attorney Docket 36029-8), all filed on even date herewith. All of these applications are hereby incorporated herein by reference as if fully set forth.
  • FIELD OF THE INVENTION
  • The present invention relates to computer systems, and more particularly to management of security of computing and network devices that are connected to other such devices.
  • BACKGROUND
  • With the growing popularity of the Internet and the increasing reliance by individuals and businesses on networked computers, network security management has become a critical function for many people. Furthermore, with computing systems themselves becoming more complex, security vulnerabilities in a product are often discovered long after the product is released into general distribution. Improved methods are needed, therefore, for managing updates and patches to software systems, and for managing configurations of those systems.
  • The security management problem is still more complex, though. Often techniques intended to remediate vulnerabilities (such as configuration changes, changes to policy settings, or application of patches) add additional problems. Sometimes patches to an operating system or application interfere with operation of other applications, and can inadvertently disable mission-critical services and applications of an enterprise. At other times, remediation steps open other vulnerabilities in software. There is, therefore, a need for improved security management techniques.
  • SUMMARY
  • One form of the present invention is a database of information about a plurality of devices, updated in real-time and used by an application to make a security-related decision. The database stores data indicating the installed operating system(s), installed software, patches that have been applied, system policies that are in place, and configuration information for each device. The database answers queries by one or more devices or applications attached by a network to facilitate security-related decision making. In one form of this embodiment, a firewall or router handles a connection request or maintenance of a connection based on the configuration information stored in the database that relates to one or both of the devices involved in the transmission.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • FIG. 1 is a block diagram of a networked system of computers in one embodiment of the present invention.
  • FIG. 2 is a block diagram showing components of several computing devices in the system of FIG. 1.
  • FIGS. 3 and 4 trace signals that travel through the system of FIGS. 1 and 2 and the present invention is applied to them.
  • DESCRIPTION
  • For the purpose of promoting an understanding of the principles of the present invention, reference will now be made to the embodiment illustrated in the drawings and specific language will be used to describe the same. It will, nevertheless, be understood that no limitation of the scope of the invention is thereby intended; any alterations and further modifications of the described or illustrated embodiments, and any further applications of the principles of the invention as illustrated therein are contemplated as would normally occur to one skilled in the art to which the invention relates.
  • Generally, the present invention in its preferred embodiment operates in the context of a network as shown in FIG. 1. System 100 includes a vulnerability and remediation database 110 connected by Internet 120 to subnet 130. In this exemplary embodiment, firewall 131 serves as the gateway between Internet 120 and the rest of subnet 130. Router 133 directs connections between computers 137 and each other and other devices on Internet 120. Server 135 collects certain information and provides certain data services that will be discussed in further detail herein.
  • In particular, security server 135 includes processor 142, and memory 144 encoded with programming instructions executable by processor 142 to perform several important security-related functions. For example, security server 135 collects data from devices 131, 133, 137, and 139, including the software installed on those devices, their configuration and policy settings, and patches that have been installed. Security server 135 also obtains from vulnerability and remediation database 110 a regularly updated list of security vulnerabilities in software for a wide variety of operating systems, and even in the operating systems themselves. Security server 135 also downloads a regularly updated list of remediation techniques that can be applied to protect a device from damage due to those vulnerabilities. In a preferred embodiment, each vulnerability in remediation database 110 is identified by a vulnerability identifier, and the vulnerability identifier can be used to retrieve remediation information from database 110 (and from database 146, discussed below in relation to FIG. 2).
  • In this preferred embodiment, computers 137 and 139 each comprise a processor 152, 162, memory 154, 164, and storage 156, 166. Computer 137 executes a client-side program (stored in storage 156, loaded into memory 154, and executed by processor 152) that maintains an up-to-date collection of information regarding the operating system, service pack (if applicable), software, and patches installed on computer 137, and the policies and configuration data (including configuration files, and elements that may be contained in files, such as *.ini and *.conf files and registry information, for example), and communicates that information on a substantially real- time basis to security server 135. In an alternative embodiment, the collection of information is not retained on computer 137, but is only communicated once to security server 135, then is updated in real time as changes to that collection occur.
  • Computer 139 stores, loads, and executes a similar software program that communicates configuration information pertaining to computer 139 to security server 135, also substantially in real time. Changes to the configuration registry in computer 139 are monitored, and selected changes are communicated to security server 135 so that relevant information is always available. Security server 135 may connect directly to and request software installation status and configuration information from firewall 131 and router 133, for embodiments wherein firewall 131 and router 133 do not have a software program executing on them to communicate this information directly.
  • This collection of information is made available at security server 135, and combined with the vulnerability and remediation data from source 110. The advanced functionality of system 100 is thereby enabled as discussed further herein.
  • Turning to FIG. 2, one sees additional details and components of the devices in subnet 130. Computers 137 and 139 are traditional client or server machines, each having a processor 152, 162, memory 154, 164, and storage 156, 166. Firewall 131 and router 133 also have processors 172, 182 and storage 174, 184, respectively, as is known in the art. In this embodiment, devices 137 and 139 each execute a client-side program that continuously monitors the software installation and configuration status for that device. Changes to that status are communicated in substantially real time to security server 135, which continuously maintains the information in database 146. Security server 135 connects directly to firewall 131 and router 133 to obtain software installation and configuration status for those devices in the absence of a client-side program running thereon.
  • Processors 142, 152, 162 may each be comprised of one or more components configured as a single unit. Alternatively, when of a multi-component form, processor 142, 152, 162 may each have one or more components located remotely relative to the others. One or more components of processor 142, 152, 162 may be of the electronic variety defining digital circuitry, analog circuitry, or both. In one embodiment, processor 142, 152, 162 are of a conventional, integrated circuit microprocessor arrangement, such as one or more PENTIUM 4 or XEON processors from INTEL Corporation of 2200 Mission College Boulevard, Santa Clara, Calif., 95052, USA, or ATHLON XP processors from Advanced Micro Devices, One AMD Place, Sunnyvale, Calif., 94088, USA.
  • Memories 144, 154, 164 may include one or more types of solid-state electronic memory, magnetic memory, or optical memory, just to name a few. By way of non-limiting example, memory 40b may include solid-state electronic Random Access Memory (RAM), Sequentially Accessible Memory (SAM) (such as the First-In, First-Out (FIFO) variety or the Last-In First-Out (LIFO) variety), Programmable Read Only Memory (PROM), Electrically Programmable Read Only Memory (EPROM), or Electrically Erasable Programmable Read Only Memory (EEPROM); an optical disc memory (such as a DVD or CD ROM); a magnetically encoded hard drive, floppy disk, tape, or cartridge media; or a combination of any of these memory types. Also, memories 144, 154, 164 may be volatile, nonvolatile, or a hybrid combination of volatile and nonvolatile varieties.
  • In this exemplary embodiment, storage 146, 156, 166 comprises one or more of the memory types just given for memories 144, 154, 164, preferably selected from the non-volatile types.
  • This collection of information is used by system 100 in a wide variety of ways. With reference to FIG. 3, assume for example that a connection request 211 arrives at firewall 131 requesting that data be transferred to computer 137. The payload of request 211 is, in this example, a probe request for a worm that takes advantage of a particular security vulnerability in a certain computer operating system. Based on characteristics of the connection request 211, firewall 131 sends a query 213 to security server 135. Query 213 includes information that security server 135 uses to determine (1) the intended destination of connection request 211, and (2) some characterization of the payload of connection request 211, such as a vulnerability identifier. Security server 135 uses this information to determine whether connection request 211 is attempting to take advantage of a particular known vulnerability of destination machine 137, and uses information from database 146 (see FIG. 2) to determine whether the destination computer 137 has the vulnerable software installed, and whether the vulnerability has been patched on computer 137, or whether computer 137 has been configured so as to be invulnerable to a particular attack.
  • Security server 135 sends result signal 217 back to firewall 131 with an indication of whether the connection request should be granted or rejected. If it is to be granted, firewall 131 passes the request to router 133 as request 219, and router 133 relays the request as request 221 to computer 137, as is understood in the art. If, on the other hand, signal 217 indicates that connection request 211 is to be rejected, firewall 133 drops or rejects the connection request 211 as is understood in the art.
  • Analogous operation can protect computers within subnet 130 from compromised devices within subnet 130 as well. For example, FIG. 4 illustrates subnet 130 with computer 137 compromised. Under the control of a virus or worm, for example, computer 137 sends connection attempt 231 to router 133 in an attempt to probe or take advantage of a potential vulnerability in computer 139. On receiving connection request 231, router 133 sends relevant information about request 231 in a query 233 to security server 135. Similarly to the operation discussed above in relation to FIG. 3, security server 135 determines whether connection request 231 poses any threat, and in particular any threat to software on computer 139. If so, security server 135 determines whether the vulnerability has been patched, and if not, it determines whether computer 139 has been otherwise configured to avoid damage due to that vulnerability. Security server 135 replies with signal 235 to query 233 with that answer. Router 133 uses response 235 to determine whether to allow the connection attempt.
  • In some embodiments, upon a determination by security server 135 that a connection attempt or other attack has occurred against a computer that is vulnerable (based on its current software, patch, policy, and configuration status), security server 135 selects one or more remediation techniques from database 146 that remediate the particular vulnerability. Based on a prioritization previously selected by an administrator or the system designer, the remediation technique(s) are applied (1) to the machine that was attacked, (2) to all devices subject to the same vulnerability (based on their real-time software, patch, policy, and configuration status), or (3) to all devices to which the selected remediation can be applied.
  • In various embodiments, remediation techniques include the closing of open ports on the device; installation of a patch that is known to correct the vulnerability; changing the device's configuration; stopping, disabling, or removing services; setting or modifying policies; and the like. Furthermore, in various embodiments, events and actions are logged (preferably in a non-volatile medium) for later analysis and review by system administrators. In these embodiments, the log also stores information describing whether the target device was vulnerable to the attack.
  • A real-time status database according to the present invention has many other applications as well. In some embodiments, the database 146 is made available to an administrative console running on security server 135 or other administrative terminal. When a vulnerability is newly discovered in software that exists in subnet 130, administrators can immediately see whether any devices in subnet 130 are vulnerable to it, and if so, which ones. If a means of remediation of the vulnerability is known, the remediation can be selectively applied to only those devices subject to the vulnerability.
  • In some embodiments, the database 146 is integrated into another device, such as firewall 131 or router 133, or an individual device on the network. While some of these embodiments might avoid some failures due to network instability, they substantially increase the complexity of the device itself. For this reason, as well as the complexity of maintaining security database functions when integrated with other functions, the network-attached device embodiment described above in relation to FIGS. 1-4 is preferred.
  • In a preferred embodiment, a software development kit (SDK) allows programmers to develop security applications that access the data collected in database 146. The applications developed with the SDK access information using a defined application programming interface (API) to retrieve vulnerability, remediation, and device status information available to the system. The applications then make security-related determinations and are enabled to take certain actions based on the available data.
  • In these exemplary systems, “configuration information” for each device may take the form of initialization files (often named *.ini or *.conf), configuration registry (such as the Windows Registry on Microsoft WINDOWS operating systems), or configuration data held in volatile or non-volatile memory. Such configuration information often determines what and how data is accepted from other devices, sent to other devices, processed, stored, or otherwise handled, and in many cases determines what routines and sub-routines are executed in a particular application or operating system.
  • All publications, prior applications, and other documents cited herein are hereby incorporated by reference in their entirety as if each had been individually incorporated by reference and fully set forth.
  • While the invention has been illustrated and described in detail in the drawings and foregoing description, the same is to be considered as illustrative and not restrictive in character, it being understood that only the preferred embodiments have been shown and described and that all changes and modifications that would occur to one skilled in the relevant art are desired to be protected.

Claims (39)

1. A system, comprising:
a plurality of computing devices, each comprising a processor and memory, wherein the memory is encoded with programming instructions executable by the processor;
a database of device status information that characterizes zero or more vulnerabilities to which each of the computing devices is subject, wherein the device status information is kept current in substantially real time; and
an application that
transmits a query signal to the database;
receives a result signal, responsive to the query signal, from the database; and
makes a security-related determination based on the result signal.
2. The system of claim 1, wherein the application is an intrusion detection system, and the security-related determination is whether to produce a signal indicating that an intrusion attempt has occurred.
3. The system of claim 1, wherein:
the application is selected from the group of applications consisting of a firewall, a proxy, and a router; and
the security-related determination is whether to allow a connection to pass.
4. The system of claim 1, wherein the security-related determination is selected from the group consisting of:
whether to block a connection attempt;
whether to pass a communication from one device to another through a network; and
whether to permit software to be installed.
5. The system of claim 4, wherein the connection attempt is a request from an external device to connect with at least one of the plurality of computing devices.
6. The system of claim 4, wherein the connection attempt is a request from one of the computing devices to connect with another of the computing devices.
7. The system of claim 1, wherein the query signal and the result signal are each transmitted over a network.
8. The system of claim 1, wherein for at least one of the plurality of computing devices, the device status information is kept current by a software agent executed by the processor of each of the at least one of the plurality of computing devices.
9. The system of claim 8, wherein:
a set of programming instructions for the software agent is encoded in the memory of the at least one computing device; and
the set of programming instructions is executed by the processor of the at least one computing device.
10. The system of claim 1, wherein a single computing device hosts the database of device status information and the application.
11. The system of claim 10, wherein the single computing device is not in the plurality of computing devices.
12. A method, comprising:
transferring data including device status information from at least one client computer to a server incorporating a database in substantially real time;
receiving a connection request at an application;
transmitting a query signal from the application to the server, the query signal including information characterizing the connection request;
transmitting a result signal, responsive to the query signal, from the server to the application; and
making and executing a security-related determination relating to the connection request, wherein the determination is made as a function of the information in the query signal and data in the database.
13. The method of claim 12, wherein the determination is to block the connection request.
14. The method of claim 12, wherein the determination is made by the application based on the result signal.
15. The method of claim 12, wherein:
the determination is made by the server;
the determination is reflected by information in the result signal; and
the executing is performed by the application.
16. The method of claim 12, wherein:
the application is an intrusion detection system; and
the determination is to produce a signal indicating that an intrusion attempt has occurred.
17. The method of claim 12, wherein for each of the at least one client computers, the database includes:
information that characterizes zero or more vulnerabilities to which the client computer is subject;
data identifying an operating system, software, and patches installed on the client computer;
software security information associated with the operating system, software, and patches; and
data characterizing the system policy settings and configuration data on the client computer.
18. The method of claim 12, further comprising transferring a data stream including vulnerability remediation information from at least one vulnerability remediation database to the server.
19. The method of claim 18, wherein the data stream includes:
data characterizing security vulnerabilities for one or more operating systems; and
vulnerability remediation information, the vulnerability remediation information including vulnerability remediation techniques for the security vulnerabilities.
20. The method of claim 19, further comprising:
selecting a remediation technique for a vulnerability of the at least one client computer; and
applying the selected vulnerability remediation technique, wherein the selecting is performed by the server, and the applying is performed by the at least one client computer.
21. The method of claim 12, wherein:
the at least one client computer is on a subnet; and
the connection request includes a request from a source that is not on the subnet to connect with the at least one client computer.
22. The method of claim 12, wherein:
the plurality of computing devices includes a first client computer and a second client computer; and
the connection request includes a request from the first client computer to connect with the second client computer.
23. The method of claim 12, wherein the connection request includes a request from an external source to install a software program on one of the at least one client computers.
24. An apparatus, comprising a device encoded with logic executable by one or more processors to communicate with a database of device status information to make a security-related determination, wherein:
the device status information includes information representing zero or more vulnerabilities of a client computer, updated in substantially real time; and
the determination is made as a function of the device status information.
25. The apparatus of claim 24, wherein the communication with the database includes:
the device transmitting a query signal to the database; and
the database transmitting a result signal, responsive to the query signal and containing information from the database, to the device.
26. The apparatus of claim 25, wherein the determination is made based on the result signal.
27. The apparatus of claim 24, wherein the determination is selected from the group consisting of:
whether to block a connection attempt;
whether to pass a communication from one device to another through a network; and
whether to permit software to be installed.
28. The apparatus of claim 24, wherein the device is an intrusion detection system, and the determination includes whether to produce a signal that indicates an intrusion attempt has occurred.
29. The apparatus of claim 24, wherein the device status information further includes information representing vulnerabilities and remediation techniques received from a vulnerability remediation database.
30. The apparatus of claim 29, wherein the determination includes:
selecting one or more remediation techniques; and remediating one or more vulnerabilities of the client computer according to the one or more selected techniques.
31. A method, comprising:
receiving device status information for one or more computing devices in substantially real time;
detecting one or more vulnerabilities of the one or more computing devices based on the device status information;
selecting one or more remediation techniques from a first database, the one or more remediation techniques corresponding to the one or more detected vulnerabilities; and
remediating the one or more detected vulnerabilities according to the one or more selected remediation techniques.
32. The method of claim 31, wherein the receiving, detecting, and selecting are performed by a server incorporating the first database.
33. The method of claim 31, wherein:
the remediation techniques are initially stored in a second database; and
the remediation techniques are periodically updated from the second database to the first database.
34. The method of claim 31, wherein for at least one of the plurality of computing devices, the device status information is updated in substantially real time by a software agent executed by a processor of the at least one computing device.
35. The method of claim 34, wherein:
a set of programming instructions for the software agent is encoded in a memory of the at least one computing device; and
the set of programming instructions is executed by a processor of the at least one computing device.
36. A system, comprising:
a plurality of computing devices, each comprising at least one processor and memory, wherein the memory is encoded with programming instructions executable by the processor;
a database of security information, wherein:
the security information includes device status information that characterizes zero or more vulnerabilities to which each of the computing devices is subject;
the security information also includes one or more remediation techniques;
the device status information is kept current in substantially real time; and
the system is operable to select remediation techniques as a function of the security information and remediate vulnerabilities to which the computing devices are subject according to the selected remediation techniques; and
an application that makes security-related determinations as a function of the security information.
37. The system of claim 36, wherein the application:
transmits a query signal to the database;
receives a result signal, responsive to the query signal, from the database; and
makes a security-related determination based on the result signal.
38. The system of claim 36, wherein:
the application is an intrusion detection system; and
the determination is whether to generate a signal indicating that an intrusion attempt has occurred.
39. The system of claim 36, wherein the application is selected from the group consisting of a firewall, a proxy, and a router.
US10/882,852 2003-07-01 2004-07-01 Real-time vulnerability monitoring Abandoned US20070113272A2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US48408503P true 2003-07-01 2003-07-01
US10/882,852 US20070113272A2 (en) 2003-07-01 2004-07-01 Real-time vulnerability monitoring

Applications Claiming Priority (21)

Application Number Priority Date Filing Date Title
US10/882,852 US20070113272A2 (en) 2003-07-01 2004-07-01 Real-time vulnerability monitoring
US14/138,014 US9117069B2 (en) 2003-07-01 2013-12-21 Real-time vulnerability monitoring
US14/499,234 US9350752B2 (en) 2003-07-01 2014-09-28 Anti-vulnerability system, method, and computer program product
US14/499,230 US9100431B2 (en) 2003-07-01 2014-09-28 Computer program product and apparatus for multi-path remediation
US14/499,226 US9118708B2 (en) 2003-07-01 2014-09-28 Multi-path remediation
US14/499,227 US20150033348A1 (en) 2003-07-01 2014-09-28 System, method, and computer program product for providing multiple remediation techniques
US14/499,237 US8984644B2 (en) 2003-07-01 2014-09-28 Anti-vulnerability system, method, and computer program product
US14/499,235 US20150033350A1 (en) 2003-07-01 2014-09-28 System, method, and computer program product with vulnerability and intrusion detection components
US14/499,236 US9118709B2 (en) 2003-07-01 2014-09-28 Anti-vulnerability system, method, and computer program product
US14/499,246 US9118711B2 (en) 2003-07-01 2014-09-29 Anti-vulnerability system, method, and computer program product
US14/499,244 US20150040233A1 (en) 2003-07-01 2014-09-29 Sdk-equipped anti-vulnerability system, method, and computer program product
US14/499,241 US20150033353A1 (en) 2003-07-01 2014-09-29 Operating system anti-vulnerability system, method, and computer program product
US14/499,239 US9118710B2 (en) 2003-07-01 2014-09-29 System, method, and computer program product for reporting an occurrence in different manners
US14/499,250 US20150033323A1 (en) 2003-07-01 2014-09-29 Virtual patching system, method, and computer program product
US14/659,280 US9225686B2 (en) 2003-07-01 2015-03-16 Anti-vulnerability system, method, and computer program product
US14/816,931 US10050988B2 (en) 2003-07-01 2015-08-03 Computer program product and apparatus for multi-path remediation
US14/816,960 US10021124B2 (en) 2003-07-01 2015-08-03 Computer program product and apparatus for multi-path remediation
US14/834,170 US20160094576A1 (en) 2003-07-01 2015-08-24 Anti-vulnerability system, method, and computer program product
US14/834,102 US10154055B2 (en) 2003-07-01 2015-08-24 Real-time vulnerability monitoring
US14/981,866 US10104110B2 (en) 2003-07-01 2015-12-28 Anti-vulnerability system, method, and computer program product
US15/608,984 US10075466B1 (en) 2003-07-01 2017-05-30 Real-time vulnerability monitoring

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/138,014 Continuation US9117069B2 (en) 2003-07-01 2013-12-21 Real-time vulnerability monitoring

Publications (3)

Publication Number Publication Date
US20050005171A1 US20050005171A1 (en) 2005-01-06
US20060230441A2 US20060230441A2 (en) 2006-10-12
US20070113272A2 true US20070113272A2 (en) 2007-05-17

Family

ID=33555662

Family Applications (4)

Application Number Title Priority Date Filing Date
US10/882,852 Abandoned US20070113272A2 (en) 2003-07-01 2004-07-01 Real-time vulnerability monitoring
US14/138,014 Active US9117069B2 (en) 2003-07-01 2013-12-21 Real-time vulnerability monitoring
US14/834,102 Active US10154055B2 (en) 2003-07-01 2015-08-24 Real-time vulnerability monitoring
US15/608,984 Active US10075466B1 (en) 2003-07-01 2017-05-30 Real-time vulnerability monitoring

Family Applications After (3)

Application Number Title Priority Date Filing Date
US14/138,014 Active US9117069B2 (en) 2003-07-01 2013-12-21 Real-time vulnerability monitoring
US14/834,102 Active US10154055B2 (en) 2003-07-01 2015-08-24 Real-time vulnerability monitoring
US15/608,984 Active US10075466B1 (en) 2003-07-01 2017-05-30 Real-time vulnerability monitoring

Country Status (1)

Country Link
US (4) US20070113272A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060185018A1 (en) * 2005-02-17 2006-08-17 Microsoft Corporation Systems and methods for shielding an identified vulnerability
US20130276089A1 (en) * 2012-04-12 2013-10-17 Ariel Tseitlin Method and system for improving security and reliability in a networked application environment
US8990942B2 (en) 2013-02-18 2015-03-24 Wipro Limited Methods and systems for API-level intrusion detection

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US20070113272A2 (en) * 2003-07-01 2007-05-17 Securityprofiling, Inc. Real-time vulnerability monitoring
US8402528B1 (en) * 2004-08-09 2013-03-19 Symantec Corporation Portable firewall adapter
GB2424291A (en) * 2005-03-17 2006-09-20 Itc Internetwise Ltd Blocking network attacks based on device vulnerability
GB2522032A (en) * 2014-01-10 2015-07-15 Ibm Controlling the configuration of computer systems
US9886581B2 (en) 2014-02-25 2018-02-06 Accenture Global Solutions Limited Automated intelligence graph construction and countermeasure deployment
US9369474B2 (en) * 2014-03-27 2016-06-14 Adobe Systems Incorporated Analytics data validation
KR101547999B1 (en) * 2014-09-02 2015-08-27 한국전자통신연구원 Apparatus and method for automatically detecting malicious links
US9438618B1 (en) * 2015-03-30 2016-09-06 Amazon Technologies, Inc. Threat detection and mitigation through run-time introspection and instrumentation
CN105337983A (en) * 2015-11-20 2016-02-17 南京未来网络产业创新有限公司 DoS attack defending method
CN105607978A (en) * 2015-12-14 2016-05-25 烟台南山学院 Computer security management system for desktop computer
KR101875438B1 (en) * 2016-06-16 2018-08-02 현대자동차주식회사 Communication control device, vehicle having the same and method for controlling the same

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6282546B1 (en) * 1998-06-30 2001-08-28 Cisco Technology, Inc. System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
US6298445B1 (en) * 1998-04-30 2001-10-02 Netect, Ltd. Computer security
US6324656B1 (en) * 1998-06-30 2001-11-27 Cisco Technology, Inc. System and method for rules-driven multi-phase network vulnerability assessment
US20020013811A1 (en) * 2000-07-26 2002-01-31 In-Gwang Kim Method and apparatus for controlling remote client computer
US20030145228A1 (en) * 2002-01-31 2003-07-31 Janne Suuronen System and method of providing virus protection at a gateway
US20050015382A1 (en) * 2003-06-30 2005-01-20 Aaron Jeffrey A. Electronic vulnerability and reliability assessment
US6966059B1 (en) * 2002-03-11 2005-11-15 Mcafee, Inc. System and method for providing automated low bandwidth updates of computer anti-virus application components
US7010696B1 (en) * 2001-03-30 2006-03-07 Mcafee, Inc. Method and apparatus for predicting the incidence of a virus
US7051365B1 (en) * 1999-06-30 2006-05-23 At&T Corp. Method and apparatus for a distributed firewall
US7159237B2 (en) * 2000-03-16 2007-01-02 Counterpane Internet Security, Inc. Method and system for dynamic network intrusion monitoring, detection and response

Family Cites Families (714)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6272632B1 (en) 1995-02-21 2001-08-07 Network Associates, Inc. System and method for controlling access to a user secret using a key recovery field
US5008814A (en) 1988-08-15 1991-04-16 Network Equipment Technologies, Inc. Method and apparatus for updating system software for a plurality of data processing units in a communication network
JPH087709B2 (en) 1989-05-15 1996-01-29 インターナシヨナル・ビジネス・マシーンズ・コーポレーシヨン Access privileges control method and system
US5210854A (en) 1989-06-14 1993-05-11 Digital Equipment Corporation System for updating program stored in eeprom by storing new version into new location and updating second transfer vector to contain starting address of new version
US5272754A (en) 1991-03-28 1993-12-21 Secure Computing Corporation Secure computer interface
US5253932A (en) 1991-12-05 1993-10-19 Nesovic Danilo N Modular countertop system
US5276735A (en) 1992-04-17 1994-01-04 Secure Computing Corporation Data enclave and trusted path system
US5253782A (en) 1992-05-20 1993-10-19 Paul A. Wiebel Article dispensing apparatus
US5596718A (en) 1992-07-10 1997-01-21 Secure Computing Corporation Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor
US5249705A (en) 1992-08-12 1993-10-05 Paul A. Wiebel Coupon dispenser
US5361359A (en) 1992-08-31 1994-11-01 Trusted Information Systems, Inc. System and method for controlling the use of a computer
US5624737A (en) 1993-02-18 1997-04-29 General Electric Company Method for adhering materials having differing expansion properties and articles produced therefrom
US5557765A (en) 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for data recovery
US5557346A (en) 1994-08-11 1996-09-17 Trusted Information Systems, Inc. System and method for key escrow encryption
US5864683A (en) 1994-10-12 1999-01-26 Secure Computing Corporartion System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
DE4444635C2 (en) 1994-12-15 1996-10-31 Daimler Benz Aerospace Ag Means for self-defense against missiles
DE4444637C2 (en) 1994-12-15 1996-09-26 Sepp Gunther Laser Weapon System
US5696907A (en) 1995-02-27 1997-12-09 General Electric Company System and method for performing risk and credit analysis of financial service applications
US5796836A (en) 1995-04-17 1998-08-18 Secure Computing Corporation Scalable key agile cryptography
US5819275A (en) 1995-06-07 1998-10-06 Trusted Information Systems, Inc. System and method for superimposing attributes on hierarchically organized file systems
US6321293B1 (en) 1995-11-14 2001-11-20 Networks Associates, Inc. Method for caching virtual memory paging and disk input/output requests
US5765153A (en) 1996-01-03 1998-06-09 International Business Machines Corporation Information handling system, method, and article of manufacture including object system authorization and registration
US5918018A (en) 1996-02-09 1999-06-29 Secure Computing Corporation System and method for achieving network separation
US5913024A (en) 1996-02-09 1999-06-15 Secure Computing Corporation Secure server utilizing separate protocol stacks
US5867647A (en) 1996-02-09 1999-02-02 Secure Computing Corporation System and method for securing compiled program code
US5950012A (en) 1996-03-08 1999-09-07 Texas Instruments Incorporated Single chip microprocessor circuits, systems, and methods for self-loading patch micro-operation codes and patch microinstruction codes
US6195352B1 (en) 1996-03-15 2001-02-27 Network Associates, Inc. System and method for automatically identifying and analyzing currently active channels in an ATM network
US6601091B1 (en) 1996-03-28 2003-07-29 Networks Associates Technology, Inc. Method for improving the perceived performance of a computer system
US6151643A (en) 1996-06-07 2000-11-21 Networks Associates, Inc. Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer
US5831987A (en) 1996-06-17 1998-11-03 Network Associates, Inc. Method for testing cache memory systems
US6298422B1 (en) 1996-06-17 2001-10-02 Network Associates, Inc. Method for reducing the memory requirements for an application program executing in a multi-tasking environment
US6134601A (en) 1996-06-17 2000-10-17 Networks Associates, Inc. Computer resource management system
US6064811A (en) 1996-06-17 2000-05-16 Network Associates, Inc. Computer memory conservation system
US5683638A (en) 1996-06-20 1997-11-04 Excelstone International, Inc. Seamless flush mounted countertop sink
US5872931A (en) 1996-08-13 1999-02-16 Veritas Software, Corp. Management agent automatically executes corrective scripts in accordance with occurrences of specified events regardless of conditions of management interface and management engine
US5819255A (en) 1996-08-23 1998-10-06 Tandem Computers, Inc. System and method for database query optimization
US5892903A (en) 1996-09-12 1999-04-06 Internet Security Systems, Inc. Method and apparatus for detecting and identifying security vulnerabilities in an open network computer communication system
US6003084A (en) 1996-09-13 1999-12-14 Secure Computing Corporation Secure network proxy for connecting entities
US6072942A (en) 1996-09-18 2000-06-06 Secure Computing Corporation System and method of electronic mail filtering using interconnected nodes
US5950195A (en) 1996-09-18 1999-09-07 Secure Computing Corporation Generalized security policy management system and method
US5983350A (en) 1996-09-18 1999-11-09 Secure Computing Corporation Secure firewall supporting different levels of authentication based on address or encryption status
US6144934A (en) 1996-09-18 2000-11-07 Secure Computing Corporation Binary filter using pattern recognition
US5951698A (en) 1996-10-02 1999-09-14 Trend Micro, Incorporated System, apparatus and method for the detection and removal of viruses in macros
US6119236A (en) 1996-10-07 2000-09-12 Shipley; Peter M. Intelligent network security device and method
US5991881A (en) 1996-11-08 1999-11-23 Harris Corporation Network surveillance system
US5796942A (en) 1996-11-21 1998-08-18 Computer Associates International, Inc. Method and apparatus for automated network-wide surveillance and security breach intervention
US6208999B1 (en) 1996-12-12 2001-03-27 Network Associates, Inc. Recoverable computer file system with a signature area containing file integrity information located in the storage blocks
US5915087A (en) 1996-12-12 1999-06-22 Secure Computing Corporation Transparent security proxy for unreliable message exchange protocols
US5987611A (en) 1996-12-31 1999-11-16 Zone Labs, Inc. System and methodology for managing internet access on a per application basis for client computers connected to the internet
US5968133A (en) 1997-01-10 1999-10-19 Secure Computing Corporation Enhanced security network time synchronization device and method
US6122657A (en) 1997-02-04 2000-09-19 Networks Associates, Inc. Internet computer system with methods for dynamic filtering of hypertext tags and content
US5960170A (en) 1997-03-18 1999-09-28 Trend Micro, Inc. Event triggered iterative virus detection
AU746459B2 (en) 1997-03-24 2002-05-02 Visa International Service Association A system and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card
US6084510A (en) 1997-04-18 2000-07-04 Lemelson; Jerome H. Danger warning and emergency response system and method
US5922051A (en) 1997-05-14 1999-07-13 Ncr Corporation System and method for traffic management in a network management system
US6314190B1 (en) 1997-06-06 2001-11-06 Networks Associates Technology, Inc. Cryptographic system with methods for user-controlled message recovery
US5822750A (en) 1997-06-30 1998-10-13 International Business Machines Corporation Optimization of correlated SQL queries in a relational database management system
US6341267B1 (en) 1997-07-02 2002-01-22 Enhancement Of Human Potential, Inc. Methods, systems and apparatuses for matching individuals with behavioral requirements and for managing providers of services to evaluate or increase individuals' behavioral capabilities
US6073172A (en) 1997-07-14 2000-06-06 Freegate Corporation Initializing and reconfiguring a secure network interface
US5987473A (en) 1997-09-09 1999-11-16 Beologic A/S Interactive configuration via network
US5983348A (en) 1997-09-10 1999-11-09 Trend Micro Incorporated Computer network malicious code scanner
US5991856A (en) 1997-09-30 1999-11-23 Network Associates, Inc. System and method for computer operating system protection
US6041347A (en) 1997-10-24 2000-03-21 Unified Access Communications Computer system and computer-implemented process for simultaneous configuration and monitoring of a computer network
US6119165A (en) 1997-11-17 2000-09-12 Trend Micro, Inc. Controlled distribution of application programs in a computer network
US5999179A (en) 1997-11-17 1999-12-07 Fujitsu Limited Platform independent computer network management client
US6044466A (en) 1997-11-25 2000-03-28 International Business Machines Corp. Flexible and dynamic derivation of permissions
US7055173B1 (en) 1997-12-19 2006-05-30 Avaya Technology Corp. Firewall pooling in a network flowswitch
US6029256A (en) 1997-12-31 2000-02-22 Network Associates, Inc. Method and system for allowing computer programs easy access to features of a virus scanning engine
US6006035A (en) 1997-12-31 1999-12-21 Network Associates Method and system for custom computer software installation
US6035423A (en) 1997-12-31 2000-03-07 Network Associates, Inc. Method and system for providing automated updating and upgrading of antivirus applications using a computer network
US6088804A (en) 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US5987610A (en) 1998-02-12 1999-11-16 Ameritech Corporation Computer virus screening methods and systems
US6357010B1 (en) 1998-02-17 2002-03-12 Secure Computing Corporation System and method for controlling access to documents stored on an internal network
US6131163A (en) 1998-02-17 2000-10-10 Cisco Technology, Inc. Network gateway mechanism having a protocol stack proxy
US6321336B1 (en) 1998-03-13 2001-11-20 Secure Computing Corporation System and method for redirecting network traffic to provide secure communication
US6279113B1 (en) 1998-03-16 2001-08-21 Internet Tools, Inc. Dynamic signature inspection-based network intrusion detection
US6182226B1 (en) 1998-03-18 2001-01-30 Secure Computing Corporation System and method for controlling interactions between networks
US6453419B1 (en) 1998-03-18 2002-09-17 Secure Computing Corporation System and method for implementing a security policy
US6345361B1 (en) 1998-04-06 2002-02-05 Microsoft Corporation Directional set operations for permission based security in a computer system
US6249585B1 (en) 1998-04-08 2001-06-19 Network Associates, Inc Publicly verifiable key recovery
WO1999056196A1 (en) 1998-04-30 1999-11-04 Bindview Development Corporation Computer security
US6408391B1 (en) 1998-05-06 2002-06-18 Prc Inc. Dynamic system defense for information warfare
US6275942B1 (en) 1998-05-20 2001-08-14 Network Associates, Inc. System, method and computer program product for automatic response to computer system misuse using active response modules
AU4568299A (en) 1998-06-15 2000-01-05 Dmw Worldwide, Inc. Method and apparatus for assessing the security of a computer system
US6185689B1 (en) * 1998-06-24 2001-02-06 Richard S. Carson & Assoc., Inc. Method for network self security assessment
US6442686B1 (en) 1998-07-02 2002-08-27 Networks Associates Technology, Inc. System and methodology for messaging server-based management and enforcement of crypto policies
US6336186B1 (en) 1998-07-02 2002-01-01 Networks Associates Technology, Inc. Cryptographic system and methodology for creating and managing crypto policy on certificate servers
US6321334B1 (en) 1998-07-15 2001-11-20 Microsoft Corporation Administering permissions associated with a security zone in a computer system security model
US6473800B1 (en) 1998-07-15 2002-10-29 Microsoft Corporation Declarative permission requests in a computer system
US6209101B1 (en) 1998-07-17 2001-03-27 Secure Computing Corporation Adaptive security system having a hierarchy of security servers
US6711127B1 (en) 1998-07-31 2004-03-23 General Dynamics Government Systems Corporation System for intrusion detection and vulnerability analysis in a telecommunications signaling network
US6343362B1 (en) 1998-09-01 2002-01-29 Networks Associates, Inc. System and method providing custom attack simulation language for testing networks
US6219786B1 (en) 1998-09-09 2001-04-17 Surfcontrol, Inc. Method and system for monitoring and controlling network access
US6301658B1 (en) 1998-09-09 2001-10-09 Secure Computing Corporation Method and system for authenticating digital certificates issued by an authentication hierarchy
US6418554B1 (en) 1998-09-21 2002-07-09 Microsoft Corporation Software implementation installer mechanism
US6523166B1 (en) 1998-09-21 2003-02-18 Microsoft Corporation Method and system for on-demand installation of software implementations
US6402689B1 (en) 1998-09-30 2002-06-11 Sicel Technologies, Inc. Methods, systems, and associated implantable devices for dynamic monitoring of physiological and biological properties of tumors
US6728885B1 (en) 1998-10-09 2004-04-27 Networks Associates Technology, Inc. System and method for network access control using adaptive proxies
US6560611B1 (en) 1998-10-13 2003-05-06 Netarx, Inc. Method, apparatus, and article of manufacture for a network monitoring system
US6230288B1 (en) 1998-10-29 2001-05-08 Network Associates, Inc. Method of treating whitespace during virus detection
US6028514A (en) 1998-10-30 2000-02-22 Lemelson Jerome H. Personal emergency, safety warning system and method
US6321338B1 (en) 1998-11-09 2001-11-20 Sri International Network surveillance
US6820202B1 (en) 1998-11-09 2004-11-16 First Data Corporation Account authority digital signature (AADS) system
US6285997B1 (en) 1998-11-16 2001-09-04 International Business Machines Corporation Query optimization with deferred update and autonomous sources
US6530024B1 (en) 1998-11-20 2003-03-04 Centrax Corporation Adaptive feedback security system and method
EP1006690B1 (en) 1998-11-30 2005-04-27 Concord Communications, Inc. Method and programe storage device for updating a list of network elements
US6499109B1 (en) 1998-12-08 2002-12-24 Networks Associates Technology, Inc. Method and apparatus for securing software distributed over a network
US6266774B1 (en) 1998-12-08 2001-07-24 Mcafee.Com Corporation Method and system for securing, managing or optimizing a personal computer
US6550012B1 (en) 1998-12-11 2003-04-15 Network Associates, Inc. Active firewall system and methodology
US6226372B1 (en) 1998-12-11 2001-05-01 Securelogix Corporation Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities
US6415321B1 (en) 1998-12-29 2002-07-02 Cisco Technology, Inc. Domain mapping method and system
US6499107B1 (en) 1998-12-29 2002-12-24 Cisco Technology, Inc. Method and system for adaptive network security using intelligent packet analysis
US6301668B1 (en) 1998-12-29 2001-10-09 Cisco Technology, Inc. Method and system for adaptive network security using network vulnerability assessment
US6205552B1 (en) 1998-12-31 2001-03-20 Mci Worldcom, Inc. Method and apparatus for checking security vulnerability of networked devices
US6173180B1 (en) 1999-01-04 2001-01-09 Ericsson Inc. System and method of providing preferential access to subscribers of localized service areas in a radio telecommunications network
US6477651B1 (en) 1999-01-08 2002-11-05 Cisco Technology, Inc. Intrusion detection system and method having dynamically loaded signatures
US6353446B1 (en) 1999-01-25 2002-03-05 Network Associates, Inc. Method and system for integrated network management applications
US6658571B1 (en) 1999-02-09 2003-12-02 Secure Computing Corporation Security framework for dynamically wrapping software applications executing in a computing system
US6725377B1 (en) 1999-03-12 2004-04-20 Networks Associates Technology, Inc. Method and system for updating anti-intrusion software
US6405318B1 (en) 1999-03-12 2002-06-11 Psionic Software, Inc. Intrusion detection system
US6477550B1 (en) 1999-03-16 2002-11-05 Mcafee.Com Corporation Method and system for processing events related to a first type of browser from a second type of browser
US6301699B1 (en) 1999-03-18 2001-10-09 Corekt Security Systems, Inc. Method for detecting buffer overflow for computer security
US7779406B2 (en) 1999-04-16 2010-08-17 Microsoft Corporation Method and system for managing lifecycles of deployed applications
US8121874B1 (en) 1999-05-27 2012-02-21 Accenture Global Services Limited Phase delivery of components of a system required for implementation technology
US6484176B1 (en) 1999-06-25 2002-11-19 Baynet World, Inc. System and process for providing remote interactive access to a real estate information database using a portable computing device
US6201908B1 (en) 1999-07-02 2001-03-13 Blaze Network Products, Inc. Optical wavelength division multiplexer/demultiplexer having preformed passively aligned optics
US6684329B1 (en) 1999-07-13 2004-01-27 Networks Associates Technology, Inc. System and method for increasing the resiliency of firewall systems
US6584508B1 (en) 1999-07-13 2003-06-24 Networks Associates Technology, Inc. Advanced data guard having independently wrapped components
US6842860B1 (en) 1999-07-23 2005-01-11 Networks Associates Technology, Inc. System and method for selectively authenticating data
US6915426B1 (en) 1999-07-23 2005-07-05 Networks Associates Technology, Inc. System and method for enabling authentication at different authentication strength-performance levels
US6845449B1 (en) 1999-07-23 2005-01-18 Networks Associates Technology, Inc. System and method for fast nested message authentication codes and error correction codes
US6976168B1 (en) 1999-07-23 2005-12-13 Mcafee, Inc. System and method for adaptive cryptographically synchronized authentication
US7346929B1 (en) 1999-07-29 2008-03-18 International Business Machines Corporation Method and apparatus for auditing network security
US6526513B1 (en) 1999-08-03 2003-02-25 International Business Machines Corporation Architecture for dynamic permissions in java
US7073198B1 (en) 1999-08-26 2006-07-04 Ncircle Network Security, Inc. Method and system for detecting a vulnerability in a network
US7181769B1 (en) 2000-08-25 2007-02-20 Ncircle Network Security, Inc. Network security system having a device profiler communicatively coupled to a traffic monitor
US7085931B1 (en) 1999-09-03 2006-08-01 Secure Computing Corporation Virtual smart card system and method
US6523023B1 (en) 1999-09-22 2003-02-18 Networks Associates Technology, Inc. Method system and computer program product for distributed internet information search and retrieval
US6687833B1 (en) 1999-09-24 2004-02-03 Networks Associates, Inc. System and method for providing a network host decoy using a pseudo network protocol stack implementation
US6789202B1 (en) 1999-10-15 2004-09-07 Networks Associates Technology, Inc. Method and apparatus for providing a policy-driven intrusion detection system
US6449624B1 (en) 1999-10-18 2002-09-10 Fisher-Rosemount Systems, Inc. Version control and audit trail in a process control system
US6654782B1 (en) 1999-10-28 2003-11-25 Networks Associates, Inc. Modular framework for dynamically processing network events using action sets in a distributed computing environment
US6493756B1 (en) 1999-10-28 2002-12-10 Networks Associates, Inc. System and method for dynamically sensing an asynchronous network event within a modular framework for network event processing
US6611869B1 (en) 1999-10-28 2003-08-26 Networks Associates, Inc. System and method for providing trustworthy network security concern communication in an active security management environment
US6470384B1 (en) 1999-10-28 2002-10-22 Networks Associates, Inc. Modular framework for configuring action sets for use in dynamically processing network events in a distributed computing environment
US6230199B1 (en) 1999-10-29 2001-05-08 Mcafee.Com, Inc. Active marketing based on client computer configurations
US6453347B1 (en) 1999-10-29 2002-09-17 Mcafee.Com, Inc. Active marketing based on client computer configurations
US7783545B2 (en) 1999-11-01 2010-08-24 Accenture Global Services Gmbh Automated coaching for a financial modeling and counseling system
US6882795B1 (en) 1999-11-01 2005-04-19 Sonic Solutions, Inc. Image mastering API
US7281268B2 (en) 1999-11-14 2007-10-09 Mcafee, Inc. System, method and computer program product for detection of unwanted processes
US6823460B1 (en) 1999-11-14 2004-11-23 Networks Associates Technology, Inc. Method and system for intercepting an application program interface
US6707794B1 (en) 1999-11-15 2004-03-16 Networks Associates Technology, Inc. Method, system and computer program product for physical link layer handshake protocol analysis
US6990591B1 (en) 1999-11-18 2006-01-24 Secureworks, Inc. Method and system for remotely configuring and monitoring a communication device
US6721727B2 (en) 1999-12-02 2004-04-13 International Business Machines Corporation XML documents stored as column data
WO2001041039A2 (en) 1999-12-02 2001-06-07 Secure Computing Corporation Security management system in an heterogenous network environment
US7231327B1 (en) 1999-12-03 2007-06-12 Digital Sandbox Method and apparatus for risk management
US6385458B1 (en) 1999-12-10 2002-05-07 Ericsson Inc. Priority handling of location services in a mobile communications network
US6587888B1 (en) 1999-12-15 2003-07-01 Networks Associates Technology, Inc. Dynamic software wrapper
US6697950B1 (en) 1999-12-22 2004-02-24 Networks Associates Technology, Inc. Method and apparatus for detecting a macro computer virus using static analysis
US7076650B1 (en) 1999-12-24 2006-07-11 Mcafee, Inc. System and method for selective communication scanning at a firewall and a network node
US6608817B1 (en) 1999-12-28 2003-08-19 Networks Associates Technology, Inc. Method and apparatus for connection-oriented multiplexing and switching network analysis, management, and troubleshooting
US6393424B1 (en) 1999-12-29 2002-05-21 Networks Associates, Inc. Method and apparatus for using a static metadata object to reduce database accesses
US6701440B1 (en) 2000-01-06 2004-03-02 Networks Associates Technology, Inc. Method and system for protecting a computer using a remote e-mail scanning device
US6779120B1 (en) 2000-01-07 2004-08-17 Securify, Inc. Declarative language for specifying a security policy
US8074256B2 (en) 2000-01-07 2011-12-06 Mcafee, Inc. Pdstudio design system and method
US6957348B1 (en) 2000-01-10 2005-10-18 Ncircle Network Security, Inc. Interoperability of vulnerability and intrusion detection systems
US6763466B1 (en) 2000-01-11 2004-07-13 Networks Associates Technology, Inc. Fast virus scanning
US7308702B1 (en) 2000-01-14 2007-12-11 Secure Computing Corporation Locally adaptable central security management in a heterogeneous network environment
US7315801B1 (en) 2000-01-14 2008-01-01 Secure Computing Corporation Network security modeling system and method
JP2001273388A (en) 2000-01-20 2001-10-05 Hitachi Ltd System and method for security management
US6697870B1 (en) 2000-01-28 2004-02-24 Networks Associates Technology, Inc. Method and apparatus for real-time protocol analysis using an auto-throttling front end process
US6931546B1 (en) 2000-01-28 2005-08-16 Network Associates, Inc. System and method for providing application services with controlled access into privileged processes
US6782527B1 (en) 2000-01-28 2004-08-24 Networks Associates, Inc. System and method for efficient distribution of application services to a plurality of computing appliances organized as subnets
US6510448B1 (en) 2000-01-31 2003-01-21 Networks Associates Technology, Inc. System, method and computer program product for increasing the performance of a proxy server
US7185361B1 (en) 2000-01-31 2007-02-27 Secure Computing Corporation System, method and computer program product for authenticating users using a lightweight directory access protocol (LDAP) directory server
US6535227B1 (en) 2000-02-08 2003-03-18 Harris Corporation System and method for assessing the security posture of a network and having a graphical user interface
US6267039B1 (en) 2000-02-09 2001-07-31 The United States Of America As Represented By The Secretary Of The Air Force Aircraft missile-hit survivability using infrared lamp and sacrificial support structure
US6851061B1 (en) 2000-02-16 2005-02-01 Networks Associates, Inc. System and method for intrusion detection data collection using a network protocol stack multiplexor
US6925572B1 (en) 2000-02-28 2005-08-02 Microsoft Corporation Firewall with two-phase filtering
US6377097B1 (en) 2000-03-13 2002-04-23 The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration Method and apparatus for reducing the vulnerability of latches to single event upsets
US6775780B1 (en) 2000-03-16 2004-08-10 Networks Associates Technology, Inc. Detecting malicious software by analyzing patterns of system calls generated during emulation
US6842861B1 (en) 2000-03-24 2005-01-11 Networks Associates Technology, Inc. Method and system for detecting viruses on handheld computers
IL146762D0 (en) 2000-03-27 2002-07-25 Network Security Systems Inc Internet/network security method and system for checking security of a client from a remote facility
GB2366640B (en) 2000-03-30 2004-12-29 Ibm Distribution of activation information
US6567808B1 (en) 2000-03-31 2003-05-20 Networks Associates, Inc. System and process for brokering a plurality of security applications using a modular framework in a distributed computing environment
US6553377B1 (en) 2000-03-31 2003-04-22 Network Associates, Inc. System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment
US6785237B1 (en) 2000-03-31 2004-08-31 Networks Associates Technology, Inc. Method and system for passive quality of service monitoring of a network
US6748534B1 (en) 2000-03-31 2004-06-08 Networks Associates, Inc. System and method for partitioned distributed scanning of a large dataset for viruses and other malware
US6553378B1 (en) 2000-03-31 2003-04-22 Network Associates, Inc. System and process for reporting network events with a plurality of hierarchically-structured databases in a distributed computing environment
US6789215B1 (en) 2000-04-21 2004-09-07 Sprint Communications Company, L.P. System and method for remediating a computer
US6925443B1 (en) 2000-04-26 2005-08-02 Safeoperations, Inc. Method, system and computer program product for assessing information security
IL152502D0 (en) 2000-04-28 2003-05-29 Internet Security Systems Inc Method and system for managing computer security information
US7574740B1 (en) 2000-04-28 2009-08-11 International Business Machines Corporation Method and system for intrusion detection in a computer network
US20060265746A1 (en) 2001-04-27 2006-11-23 Internet Security Systems, Inc. Method and system for managing computer security information
AU5740001A (en) 2000-04-28 2001-11-12 Internet Security Systems Inc System and method for managing security events on a network
US7738688B2 (en) 2000-05-03 2010-06-15 Aperio Technologies, Inc. System and method for viewing virtual slides
US6735629B1 (en) 2000-05-04 2004-05-11 Networks Associates Technology, Inc. Method and apparatus for real-time protocol analysis using an active and adaptive auto-throtting CPU allocation front end process
US6742124B1 (en) 2000-05-08 2004-05-25 Networks Associates Technology, Inc. Sequence-based anomaly detection using a distance matrix
US6735703B1 (en) 2000-05-08 2004-05-11 Networks Associates Technology, Inc. Multi-platform sequence-based anomaly detection wrapper
US6950933B1 (en) 2000-05-19 2005-09-27 Networks Associates Technology, Inc. Method and system for management and notification of electronic certificate changes
US6922776B2 (en) 2000-05-19 2005-07-26 Networks Associates Technology, Inc. Scalable system and method for management and notification of electronic certificate changes
KR20020000225A (en) 2000-05-20 2002-01-05 김활중 A system and method for performing remote security management of multiple computer systems
US7051097B1 (en) 2000-05-20 2006-05-23 Ciena Corporation Embedded database for computer system management
US7536715B2 (en) 2001-05-25 2009-05-19 Secure Computing Corporation Distributed firewall system and method
US6973577B1 (en) 2000-05-26 2005-12-06 Mcafee, Inc. System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state
US6584504B1 (en) 2000-05-26 2003-06-24 Networks Associates Technology, Inc. Method and apparatus for monitoring internet traffic on an internet web page
US7426551B1 (en) 2000-05-31 2008-09-16 Mcafee, Inc. System, method and computer program product for dynamic system adaptation using contracts
US6931540B1 (en) 2000-05-31 2005-08-16 Networks Associates Technology, Inc. System, method and computer program product for selecting virus detection actions based on a process by which files are being accessed
US6757822B1 (en) 2000-05-31 2004-06-29 Networks Associates Technology, Inc. System, method and computer program product for secure communications using a security service provider manager
US6973578B1 (en) 2000-05-31 2005-12-06 Networks Associates Technology, Inc. System, method and computer program product for process-based selection of virus detection actions
US6907396B1 (en) 2000-06-01 2005-06-14 Networks Associates Technology, Inc. Detecting computer viruses or malicious software by patching instructions into an emulator
US6611925B1 (en) 2000-06-13 2003-08-26 Networks Associates Technology, Inc. Single point of entry/origination item scanning within an enterprise or workgroup
US7024694B1 (en) 2000-06-13 2006-04-04 Mcafee, Inc. Method and apparatus for content-based instrusion detection using an agile kernel-based auditor
US7917647B2 (en) 2000-06-16 2011-03-29 Mcafee, Inc. Method and apparatus for rate limiting
US20030061506A1 (en) 2001-04-05 2003-03-27 Geoffrey Cooper System and method for security policy
US6950947B1 (en) 2000-06-20 2005-09-27 Networks Associates Technology, Inc. System for sharing network state to enhance network throughput
DE60110792T2 (en) 2000-06-30 2006-02-23 British Telecommunications P.L.C. The packet communication system
US6668054B1 (en) 2000-06-30 2003-12-23 Networks Associates Technology, Inc. Service desk system architecture for a mobile service workforce
US6907531B1 (en) 2000-06-30 2005-06-14 Internet Security Systems, Inc. Method and system for identifying, fixing, and updating security vulnerabilities
US6671368B1 (en) 2000-06-30 2003-12-30 Networks Associates Technology, Inc. Service desk system for allowing easily changeable associations for data retrieval and display
US7162649B1 (en) 2000-06-30 2007-01-09 Internet Security Systems, Inc. Method and apparatus for network assessment and authentication
US7991917B1 (en) 2000-07-05 2011-08-02 Mcafee, Inc. High performance packet processing using a general purpose processor
US6678887B1 (en) 2000-07-11 2004-01-13 Networks Associates Technology, Inc. Customizing business logic and data sources by modifying methods defined within an API
US6851058B1 (en) 2000-07-26 2005-02-01 Networks Associates Technology, Inc. Priority-based virus scanning with priorities based at least in part on heuristic prediction of scanning risk
US7085934B1 (en) 2000-07-27 2006-08-01 Mcafee, Inc. Method and system for limiting processor utilization by a virus scanner
US7086050B2 (en) 2000-08-04 2006-08-01 Mcafee, Inc. Updating computer files
US6874018B2 (en) 2000-08-07 2005-03-29 Networks Associates Technology, Inc. Method and system for playing associated audible advertisement simultaneously with the display of requested content on handheld devices and sending a visual warning when the audio channel is off
US7380270B2 (en) 2000-08-09 2008-05-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance
US6993448B2 (en) 2000-08-09 2006-01-31 Telos Corporation System, method and medium for certifying and accrediting requirements compliance
US6901346B2 (en) 2000-08-09 2005-05-31 Telos Corporation System, method and medium for certifying and accrediting requirements compliance
AU9411001A (en) 2000-08-18 2002-02-25 Camelot Information Technologi Permission level generation based on adaptive learning
US6708292B1 (en) 2000-08-18 2004-03-16 Network Associates, Inc. System, method and software for protocol analyzer remote buffer management
US6799197B1 (en) 2000-08-29 2004-09-28 Networks Associates Technology, Inc. Secure method and system for using a public network or email to administer to software on a plurality of client computers
US7089302B1 (en) 2000-08-30 2006-08-08 Mcafee, Inc. Method and system for maintaining a communications protocol session
WO2002019642A1 (en) 2000-08-30 2002-03-07 Citibank, N.A. Method and system for internet hosting and security
US6772334B1 (en) 2000-08-31 2004-08-03 Networks Associates, Inc. System and method for preventing a spoofed denial of service attack in a networked computing environment
US6898715B1 (en) 2000-09-12 2005-05-24 Networks Associates Technology, Inc. Response to a computer virus outbreak
US6886099B1 (en) 2000-09-12 2005-04-26 Networks Associates Technology, Inc. Computer virus detection
US6826698B1 (en) 2000-09-15 2004-11-30 Networks Associates Technology, Inc. System, method and computer program product for rule based network security policies
US6928555B1 (en) 2000-09-18 2005-08-09 Networks Associates Technology, Inc. Method and apparatus for minimizing file scanning by anti-virus programs
US7178166B1 (en) 2000-09-19 2007-02-13 Internet Security Systems, Inc. Vulnerability assessment and authentication of a computer by a local scanner
WO2002025438A1 (en) 2000-09-22 2002-03-28 Patchlink.Com Corporation Non-invasive automatic offsite patch fingerprinting and updating system and method
US20040003266A1 (en) 2000-09-22 2004-01-01 Patchlink Corporation Non-invasive automatic offsite patch fingerprinting and updating system and method
US20070192863A1 (en) 2005-07-01 2007-08-16 Harsh Kapoor Systems and methods for processing data flows
US6757830B1 (en) 2000-10-03 2004-06-29 Networks Associates Technology, Inc. Detecting unwanted properties in received email messages
US6766458B1 (en) 2000-10-03 2004-07-20 Networks Associates Technology, Inc. Testing a computer system
US6968461B1 (en) 2000-10-03 2005-11-22 Networks Associates Technology, Inc. Providing break points in a malware scanning operation
US7013330B1 (en) 2000-10-03 2006-03-14 Networks Associates Technology, Inc. Downloading a computer file from a source computer to a target computer
US6971023B1 (en) 2000-10-03 2005-11-29 Mcafee, Inc. Authorizing an additional computer program module for use with a core computer program
US6802012B1 (en) 2000-10-03 2004-10-05 Networks Associates Technology, Inc. Scanning computer files for unwanted properties
US7496960B1 (en) 2000-10-30 2009-02-24 Trend Micro, Inc. Tracking and reporting of computer virus information
US6834301B1 (en) 2000-11-08 2004-12-21 Networks Associates Technology, Inc. System and method for configuration, management, and monitoring of a computer network using inheritance
US6983486B1 (en) 2000-11-14 2006-01-03 Mcafee, Inc. Method and apparatus for establishing security scanner attributes in a computer system
US6934857B1 (en) 2000-11-27 2005-08-23 Networks Associates Technology, Inc. Security system and method for handheld computers
US7155487B2 (en) 2000-11-30 2006-12-26 Intel Corporation Method, system and article of manufacture for data distribution over a network
US6622150B1 (en) 2000-12-18 2003-09-16 Networks Associates Technology, Inc. System and method for efficiently managing computer virus definitions using a structured virus database
US7231440B1 (en) 2000-12-18 2007-06-12 Mcafee, Inc. System and method for distributing portable computer virus definition records with binary file conversion
US7412721B2 (en) 2000-12-20 2008-08-12 Fujitsu Limited Method of and system for managing information, and computer product
US6779033B1 (en) 2000-12-28 2004-08-17 Networks Associates Technology, Inc. System and method for transacting a validated application session in a networked computing environment
US6775704B1 (en) 2000-12-28 2004-08-10 Networks Associates Technology, Inc. System and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment
US6983325B1 (en) 2000-12-28 2006-01-03 Mcafee, Inc. System and method for negotiating multi-path connections through boundary controllers in a networked computing environment
MXPA03006024A (en) 2001-01-02 2005-02-14 Trusecure Corp Object-oriented method, system and medium for risk management by creating inter-dependency between objects, criteria and metrics.
FR2819322A1 (en) 2001-01-08 2002-07-12 Verisec Method for assessing and managing security of computer system of certain configuration by performing comparative analysis between first and second databases to assess possible problems that might affect computer system
US6732950B2 (en) 2001-01-16 2004-05-11 Rain Bird Corporation Gear drive sprinkler
US6868069B2 (en) 2001-01-16 2005-03-15 Networks Associates Technology, Inc. Method and apparatus for passively calculating latency for a network appliance
US20030051026A1 (en) 2001-01-19 2003-03-13 Carter Ernst B. Network surveillance and security system
US6745311B2 (en) 2001-01-24 2004-06-01 Networks Associates Technology, Inc. Method of allocating clusters of computer readable medium to a file while minimizing fragmentation of the computer readable medium
US7168093B2 (en) 2001-01-25 2007-01-23 Solutionary, Inc. Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures
US7039721B1 (en) 2001-01-26 2006-05-02 Mcafee, Inc. System and method for protecting internet protocol addresses
AU2002244083A1 (en) 2001-01-31 2002-08-12 Timothy David Dodd Method and system for calculating risk in association with a security audit of a computer network
US7171681B1 (en) 2001-01-31 2007-01-30 Secure Computing Corporation System and method for providing expandable proxy firewall services
JP2005503047A (en) 2001-02-06 2005-01-27 エン ガルデ システムズ、インコーポレイテッド Apparatus and method for providing a secure network
US6983380B2 (en) 2001-02-06 2006-01-03 Networks Associates Technology, Inc. Automatically generating valid behavior specifications for intrusion detection
US6477041B2 (en) 2001-02-13 2002-11-05 Intel Corporation Computer assembly with captivated screw carrier
US6964014B1 (en) 2001-02-15 2005-11-08 Networks Associates Technology, Inc. Method and system for localizing Web pages
US6904521B1 (en) 2001-02-16 2005-06-07 Networks Associates Technology, Inc. Non-repudiation of e-mail messages
US7281267B2 (en) 2001-02-20 2007-10-09 Mcafee, Inc. Software audit system
US6721847B2 (en) 2001-02-20 2004-04-13 Networks Associates Technology, Inc. Cache hints for computer file access
US6898712B2 (en) 2001-02-20 2005-05-24 Networks Associates Technology, Inc. Test driver ordering
US8219620B2 (en) 2001-02-20 2012-07-10 Mcafee, Inc. Unwanted e-mail filtering system including voting feedback
US6938161B2 (en) 2001-02-20 2005-08-30 Networks Associates Technology, Inc. Test driver selection
US7272724B2 (en) 2001-02-20 2007-09-18 Mcafee, Inc. User alerts in an anti computer virus system
US20020120558A1 (en) 2001-02-27 2002-08-29 Reid William Joseph System for managing risks by combining risk insurance policy investments with risk prevention computer-based technology investments using common measurement methods
US7185232B1 (en) 2001-02-28 2007-02-27 Cenzic, Inc. Fault injection methods and apparatus
US7240193B2 (en) * 2001-03-01 2007-07-03 Invicta Networks, Inc. Systems and methods that provide external network access from a protected network
US7284267B1 (en) 2001-03-08 2007-10-16 Mcafee, Inc. Automatically configuring a computer firewall based on network connection
US6965928B1 (en) 2001-03-09 2005-11-15 Networks Associates Technology, Inc. System and method for remote maintenance of handheld computers
US7013395B1 (en) 2001-03-13 2006-03-14 Sandra Corporation Method and tool for network vulnerability analysis
US7882555B2 (en) 2001-03-16 2011-02-01 Kavado, Inc. Application layer security method and system
US7302584B2 (en) 2001-03-16 2007-11-27 Mcafee, Inc. Mechanisms for banning computer programs from use
US7313822B2 (en) 2001-03-16 2007-12-25 Protegrity Corporation Application-layer security method and system
US6920493B1 (en) 2001-03-19 2005-07-19 Networks Associates Technology, Inc. System and method for communicating coalesced rule parameters in a distributed computing environment
US6871279B2 (en) 2001-03-20 2005-03-22 Networks Associates Technology, Inc. Method and apparatus for securely and dynamically managing user roles in a distributed system
US6920558B2 (en) 2001-03-20 2005-07-19 Networks Associates Technology, Inc. Method and apparatus for securely and dynamically modifying security policy configurations in a distributed system
US6782421B1 (en) 2001-03-21 2004-08-24 Bellsouth Intellectual Property Corporation System and method for evaluating the performance of a computer application
US7150037B2 (en) 2001-03-21 2006-12-12 Intelliden, Inc. Network configuration manager
US6751718B1 (en) 2001-03-26 2004-06-15 Networks Associates Technology, Inc. Method, system and computer program product for using an instantaneous memory deficit metric to detect and reduce excess paging operations in a computer system
US7987510B2 (en) 2001-03-28 2011-07-26 Rovi Solutions Corporation Self-protecting digital content
WO2002079907A2 (en) 2001-03-29 2002-10-10 Accenture Llp Overall risk in a system
US7674298B1 (en) 2001-03-30 2010-03-09 Mcafee, Inc. Method and apparatus for implementing a handheld security system
US7188367B1 (en) 2001-03-30 2007-03-06 Moafee, Inc. Virus scanning prioritization using pre-processor checking
US7080000B1 (en) 2001-03-30 2006-07-18 Mcafee, Inc. Method and system for bi-directional updating of antivirus database
US6945780B2 (en) 2001-04-02 2005-09-20 United Defense, L.P. Integrated performance simulation system for military weapon systems
US6775675B1 (en) 2001-04-04 2004-08-10 Sagemetrics Corporation Methods for abstracting data from various data structures and managing the presentation of the data
US6983326B1 (en) 2001-04-06 2006-01-03 Networks Associates Technology, Inc. System and method for distributed function discovery in a peer-to-peer network environment
US7055036B2 (en) 2001-04-06 2006-05-30 Mcafee, Inc. System and method to verify trusted status of peer in a peer-to-peer network environment
US7721110B2 (en) 2001-04-06 2010-05-18 Mcafee, Inc. System and method for secure and verified sharing of resources in a peer-to-peer network environment
US7181506B1 (en) 2001-04-06 2007-02-20 Mcafee, Inc. System and method to securely confirm performance of task by a peer in a peer-to-peer network environment
US7062555B1 (en) 2001-04-06 2006-06-13 Networks Associates Technology, Inc. System and method for automatic selection of service provider for efficient use of bandwidth and resources in a peer-to-peer network environment
US7010807B1 (en) 2001-04-13 2006-03-07 Sonicwall, Inc. System and method for network virus protection
WO2002087152A1 (en) 2001-04-18 2002-10-31 Caveo Technology, Llc Universal, customizable security system for computers and other devices
US7043024B1 (en) 2001-04-18 2006-05-09 Mcafee, Inc. System and method for key distribution in a hierarchical tree
US7590247B1 (en) 2001-04-18 2009-09-15 Mcafee, Inc. System and method for reusable efficient key distribution
US7210041B1 (en) 2001-04-30 2007-04-24 Mcafee, Inc. System and method for identifying a macro virus family using a macro virus definitions database
US6947986B1 (en) 2001-05-08 2005-09-20 Networks Associates Technology, Inc. System and method for providing web-based remote security application client administration in a distributed computing environment
US6868413B1 (en) 2001-05-10 2005-03-15 Networks Associates Technology, Inc. System and method for customizing and processing business logic rules in a business process system
US6768991B2 (en) 2001-05-15 2004-07-27 Networks Associates Technology, Inc. Searching for sequences of character data
US7043634B2 (en) 2001-05-15 2006-05-09 Mcafee, Inc. Detecting malicious alteration of stored computer files
US7228565B2 (en) 2001-05-15 2007-06-05 Mcafee, Inc. Event reporting between a reporting computer and a receiving computer
US7325252B2 (en) 2001-05-18 2008-01-29 Achilles Guard Inc. Network security testing
US20030028803A1 (en) 2001-05-18 2003-02-06 Bunker Nelson Waldo Network vulnerability assessment system and method
US20030056116A1 (en) 2001-05-18 2003-03-20 Bunker Nelson Waldo Reporter
US7562388B2 (en) 2001-05-31 2009-07-14 International Business Machines Corporation Method and system for implementing security devices in a network
US6693888B2 (en) 2001-06-06 2004-02-17 Networks Associates Technology, Inc. Method and apparatus for filtering that specifies the types of frames to be captured and to be displayed for an IEEE802.11 wireless LAN
US7350234B2 (en) 2001-06-11 2008-03-25 Research Triangle Institute Intrusion tolerant communication networks and associated methods
US7076801B2 (en) 2001-06-11 2006-07-11 Research Triangle Institute Intrusion tolerant server system
JP2002366525A (en) 2001-06-12 2002-12-20 Needs Creator Kk Security policy maintenance system
US7644352B2 (en) 2001-06-13 2010-01-05 Mcafee, Inc. Content scanning of copied data
US7418737B2 (en) 2001-06-13 2008-08-26 Mcafee, Inc. Encrypted data file transmission
US7624444B2 (en) 2001-06-13 2009-11-24 Mcafee, Inc. Method and apparatus for detecting intrusions on a computer system
US7069594B1 (en) 2001-06-15 2006-06-27 Mcafee, Inc. File system level integrity verification and validation
US7043758B2 (en) 2001-06-15 2006-05-09 Mcafee, Inc. Scanning computer files for specified content
WO2003001468A2 (en) 2001-06-21 2003-01-03 Crisis Technologies, Inc. Method and system for emergency planning and management of a facility
US20020199122A1 (en) 2001-06-22 2002-12-26 Davis Lauren B. Computer security vulnerability analysis methodology
US6959418B1 (en) 2001-06-27 2005-10-25 Networks Associates Technology, Inc. System and method for facilitating editing of codes such as HTML and XML codes by scripts
US7146642B1 (en) 2001-06-29 2006-12-05 Mcafee, Inc. System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device
US7096503B1 (en) 2001-06-29 2006-08-22 Mcafee, Inc. Network-based risk-assessment tool for remotely detecting local computer vulnerabilities
US6851113B2 (en) 2001-06-29 2005-02-01 International Business Machines Corporation Secure shell protocol access control
US7124181B1 (en) 2001-06-29 2006-10-17 Mcafee, Inc. System, method and computer program product for improved efficiency in network assessment utilizing variable timeout values
US6981280B2 (en) 2001-06-29 2005-12-27 Mcafee, Inc. Intelligent network scanning system and method
US6513122B1 (en) 2001-06-29 2003-01-28 Networks Associates Technology, Inc. Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities
US7003561B1 (en) 2001-06-29 2006-02-21 Mcafee, Inc. System, method and computer program product for improved efficiency in network assessment utilizing a port status pre-qualification procedure
US7231665B1 (en) 2001-07-05 2007-06-12 Mcafee, Inc. Prevention of operating system identification through fingerprinting techniques
US7069330B1 (en) 2001-07-05 2006-06-27 Mcafee, Inc. Control of interaction between client computer applications and network resources
US8200818B2 (en) 2001-07-06 2012-06-12 Check Point Software Technologies, Inc. System providing internet access management with router-based policy enforcement
US7228566B2 (en) 2001-07-10 2007-06-05 Core Sdi, Incorporated Automated computer system security compromise
US6789082B2 (en) 2001-07-13 2004-09-07 Networks Associates Technology, Inc. Method and apparatus to facilitate fast network management protocol replies in large tables
US7047297B2 (en) 2001-07-17 2006-05-16 Mcafee, Inc. Hierarchically organizing network data collected from full time recording machines and efficiently filtering the same
US7149189B2 (en) 2001-07-17 2006-12-12 Mcafee, Inc. Network data retrieval and filter systems and methods
US7277957B2 (en) 2001-07-17 2007-10-02 Mcafee, Inc. Method of reconstructing network communications
US7162698B2 (en) 2001-07-17 2007-01-09 Mcafee, Inc. Sliding window packet management systems
US7296080B2 (en) 2001-07-17 2007-11-13 Mcafee, Inc. Method of simulating network communications
US7315894B2 (en) 2001-07-17 2008-01-01 Mcafee, Inc. Network data retrieval and filter systems and methods
US6751627B2 (en) 2001-07-23 2004-06-15 Networks Associates Technology, Inc. Method and apparatus to facilitate accessing data in network management protocol tables
US7243373B2 (en) 2001-07-25 2007-07-10 Mcafee, Inc. On-access malware scanning
US6769016B2 (en) 2001-07-26 2004-07-27 Networks Associates Technology, Inc. Intelligent SPAM detection system using an updateable neural analysis engine
US7647376B1 (en) 2001-07-26 2010-01-12 Mcafee, Inc. SPAM report generation system and method
US6944775B2 (en) 2001-07-26 2005-09-13 Networks Associates Technology, Inc. Scanner API for executing multiple scanning engines
US7673343B1 (en) 2001-07-26 2010-03-02 Mcafee, Inc. Anti-virus scanning co-processor
US7016939B1 (en) 2001-07-26 2006-03-21 Mcafee, Inc. Intelligent SPAM detection system using statistical analysis
US6963978B1 (en) 2001-07-26 2005-11-08 Mcafee, Inc. Distributed system and method for conducting a comprehensive search for malicious code in software
US7000250B1 (en) 2001-07-26 2006-02-14 Mcafee, Inc. Virtual opened share mode system with virus protection
US6980992B1 (en) 2001-07-26 2005-12-27 Mcafee, Inc. Tree pattern system and method for multiple virus signature recognition
US7673342B2 (en) 2001-07-26 2010-03-02 Mcafee, Inc. Detecting e-mail propagated malware
US7310817B2 (en) 2001-07-26 2007-12-18 Mcafee, Inc. Centrally managed malware scanning
US7665137B1 (en) 2001-07-26 2010-02-16 Mcafee, Inc. System, method and computer program product for anti-virus scanning in a storage subsystem
US7421587B2 (en) 2001-07-26 2008-09-02 Mcafee, Inc. Detecting computer programs within packed computer files
US7231637B1 (en) 2001-07-26 2007-06-12 Mcafee, Inc. Security and software testing of pre-release anti-virus updates on client and transmitting the results to the server
US7023861B2 (en) 2001-07-26 2006-04-04 Mcafee, Inc. Malware scanning using a network bridge
US7181015B2 (en) 2001-07-31 2007-02-20 Mcafee, Inc. Method and apparatus for cryptographic key establishment using an identity based symmetric keying technique
US6792543B2 (en) 2001-08-01 2004-09-14 Networks Associates Technology, Inc. Virus scanning on thin client devices using programmable assembly language
US7096368B2 (en) 2001-08-01 2006-08-22 Mcafee, Inc. Platform abstraction layer for a wireless malware scanning engine
US7024432B2 (en) 2001-08-01 2006-04-04 Mcafee, Inc. Updating computer files on wireless data processing devices
US6718469B2 (en) 2001-08-01 2004-04-06 Networks Associates Technology, Inc. System and method for executing computer virus definitions containing general purpose programming language extensions
US7461403B1 (en) 2001-08-03 2008-12-02 Mcafee, Inc. System and method for providing passive screening of transient messages in a distributed computing environment
US7089259B1 (en) 2001-08-03 2006-08-08 Mcafee, Inc. System and method for providing a framework for network appliance management in a distributed computing environment
US6745192B1 (en) 2001-08-03 2004-06-01 Networks Associates Technology Inc. System and method for providing a multi-tiered hierarchical transient message store accessed using multiply hashed unique filenames
US7146155B2 (en) 2001-08-03 2006-12-05 Mcafee, Inc. System and method for providing telephonic content security service in a wireless network environment
US6993660B1 (en) 2001-08-03 2006-01-31 Mcafee, Inc. System and method for performing efficient computer virus scanning of transient messages using checksums in a distributed computing environment
US7240102B1 (en) 2001-08-03 2007-07-03 Mcafee, Inc. System and method for providing web browser-based secure remote network appliance configuration in a distributed computing environment
US7117533B1 (en) 2001-08-03 2006-10-03 Mcafee, Inc. System and method for providing dynamic screening of transient messages in a distributed computing environment
US7050923B2 (en) 2001-08-15 2006-05-23 National Instruments Corporation Network-based system for configuring a measurement system using configuration information generated based on a user specification
US7120252B1 (en) 2001-08-16 2006-10-10 Mcafee, Inc. System and method for automatically protecting private video content using cryptographic security for legacy systems
US20030037258A1 (en) 2001-08-17 2003-02-20 Izchak Koren Information security system and method`
US7263561B1 (en) 2001-08-24 2007-08-28 Mcafee, Inc. Systems and methods for making electronic files that have been converted to a safe format available for viewing by an intended recipient
US7590859B2 (en) 2001-08-24 2009-09-15 Secure Computing Corporation System and method for accomplishing two-factor user authentication using the internet
US6769292B2 (en) 2001-08-24 2004-08-03 Symyx Technologies, Inc High throughput rheological testing of materials
US7640361B1 (en) 2001-08-24 2009-12-29 Mcafee, Inc. Systems and methods for converting infected electronic files to a safe format
US7543334B2 (en) 2001-08-27 2009-06-02 Mcafee, Inc. Update status alerting for a malware scanner
US7007302B1 (en) 2001-08-31 2006-02-28 Mcafee, Inc. Efficient management and blocking of malicious code and hacking attempts in a network environment
US7269649B1 (en) 2001-08-31 2007-09-11 Mcafee, Inc. Protocol layer-level system and method for detecting virus activity
US6986160B1 (en) 2001-08-31 2006-01-10 Mcafee, Inc. Security scanning system and method utilizing generic IP addresses
US7302706B1 (en) 2001-08-31 2007-11-27 Mcafee, Inc Network-based file scanning and solution delivery in real time
US6836860B2 (en) 2001-09-04 2004-12-28 Networks Associates Technology, Inc. Data scanning for updatable predefined properties
US6978454B2 (en) 2001-09-05 2005-12-20 Mcafee, Inc. Checking computer program installation
US7234167B2 (en) 2001-09-06 2007-06-19 Mcafee, Inc. Automatic builder of detection and cleaning routines for computer viruses
US7331061B1 (en) 2001-09-07 2008-02-12 Secureworks, Inc. Integrated computer security management system and method
US6976068B2 (en) 2001-09-13 2005-12-13 Mcafee, Inc. Method and apparatus to facilitate remote software management by applying network address-sorting rules on a hierarchical directory structure
US20030051163A1 (en) 2001-09-13 2003-03-13 Olivier Bidaud Distributed network architecture security system
US6697337B1 (en) 2001-09-17 2004-02-24 Networks Associates Technology, Inc. Method and apparatus for capture, analysis and display of packet information sent in an IEEE 802.11 wireless network
US6674738B1 (en) 2001-09-17 2004-01-06 Networks Associates Technology, Inc. Decoding and detailed analysis of captured frames in an IEEE 802.11 wireless LAN
US7302469B2 (en) 2001-09-17 2007-11-27 Ricoh Company, Ltd. System, method, and computer program product for transferring remote device support data to a monitor using e-mail
US8621077B2 (en) 2001-09-21 2013-12-31 Mcafee, Inc. Distribution of security policies for small to medium-sized organizations
US7107618B1 (en) 2001-09-25 2006-09-12 Mcafee, Inc. System and method for certifying that data received over a computer network has been checked for viruses
US7266844B2 (en) 2001-09-27 2007-09-04 Mcafee, Inc. Heuristic detection of polymorphic computer viruses based on redundancy in viral code
US7043756B2 (en) 2001-09-27 2006-05-09 Mcafee, Inc. Method and apparatus for detecting denial-of-service attacks using kernel execution profiles
US7134140B2 (en) 2001-09-27 2006-11-07 Mcafee, Inc. Token-based authentication for network connection
US6757727B1 (en) 2001-09-28 2004-06-29 Networks Associates Technology, Inc. Top-down network analysis system and method with adaptive filtering capabilities
US6892241B2 (en) 2001-09-28 2005-05-10 Networks Associates Technology, Inc. Anti-virus policy enforcement system and method
US7278161B2 (en) 2001-10-01 2007-10-02 International Business Machines Corporation Protecting a data processing system from attack by a vandal who uses a vulnerability scanner
US8776230B1 (en) 2001-10-02 2014-07-08 Mcafee, Inc. Master security policy server
JP3984895B2 (en) 2001-10-03 2007-10-03 キヤノン株式会社 The information processing apparatus and the server apparatus and driver updating method and computer-readable storage medium, and program
US6907430B2 (en) 2001-10-04 2005-06-14 Booz-Allen Hamilton, Inc. Method and system for assessing attacks on computer networks using Bayesian networks
US7069581B2 (en) 2001-10-04 2006-06-27 Mcafee, Inc. Method and apparatus to facilitate cross-domain push deployment of software in an enterprise environment
US7107617B2 (en) 2001-10-15 2006-09-12 Mcafee, Inc. Malware scanning of compressed computer files
US7340774B2 (en) 2001-10-15 2008-03-04 Mcafee, Inc. Malware scanning as a low priority task
US7210168B2 (en) 2001-10-15 2007-04-24 Mcafee, Inc. Updating malware definition data for mobile data processing devices
US6654751B1 (en) 2001-10-18 2003-11-25 Networks Associates Technology, Inc. Method and apparatus for a virus information patrol
US7237122B2 (en) 2001-10-19 2007-06-26 Mcafee, Inc. Method and apparatus to facilitate software installation using embedded user credentials
US7310818B1 (en) 2001-10-25 2007-12-18 Mcafee, Inc. System and method for tracking computer viruses
WO2003036549A1 (en) 2001-10-25 2003-05-01 Kla-Tencor Technologies Corporation Apparatus and methods for managing reliability of semiconductor devices
US6768721B1 (en) 2001-10-26 2004-07-27 Networks Associates Technology, Inc. Method and apparatus for monitoring different channels in an IEEE 802.11 wireless LAN
US7917444B1 (en) 2001-10-29 2011-03-29 Mcafee, Inc. Secure single-use transaction numbers
US20030101353A1 (en) 2001-10-31 2003-05-29 Tarquini Richard Paul Method, computer-readable medium, and node for detecting exploits based on an inbound signature of the exploit and an outbound signature in response thereto
US20030159060A1 (en) 2001-10-31 2003-08-21 Gales George S. System and method of defining the security condition of a computer system
US7444679B2 (en) 2001-10-31 2008-10-28 Hewlett-Packard Development Company, L.P. Network, method and computer readable medium for distributing security updates to select nodes on a network
US20030135749A1 (en) * 2001-10-31 2003-07-17 Gales George S. System and method of defining the security vulnerabilities of a computer system
US20030083831A1 (en) 2001-11-01 2003-05-01 International Business Machines Corporation System and method for evaluating electromagnetic emanation vulnerabilities of computing systems
US6609908B2 (en) 2001-11-13 2003-08-26 Ets Schaefer Corporation Replaceable heater cover
CA2363795A1 (en) 2001-11-26 2003-05-26 Cloakware Corporation Computer system protection by communication diversity
US8266703B1 (en) 2001-11-30 2012-09-11 Mcafee, Inc. System, method and computer program product for improving computer network intrusion detection by risk prioritization
US6546493B1 (en) 2001-11-30 2003-04-08 Networks Associates Technology, Inc. System, method and computer program product for risk assessment scanning based on detected anomalous events
US7080408B1 (en) 2001-11-30 2006-07-18 Mcafee, Inc. Delayed-delivery quarantining of network communications having suspicious contents
US20030105973A1 (en) 2001-12-04 2003-06-05 Trend Micro Incorporated Virus epidemic outbreak command system and method using early warning monitors in a network environment
US7346781B2 (en) 2001-12-06 2008-03-18 Mcafee, Inc. Initiating execution of a computer program from an encrypted version of a computer program
US7150042B2 (en) 2001-12-06 2006-12-12 Mcafee, Inc. Techniques for performing malware scanning of files stored within a file storage device of a computer network
US7093002B2 (en) 2001-12-06 2006-08-15 Mcafee, Inc. Handling of malware scanning of files stored within a file storage device of a computer network
US7159036B2 (en) 2001-12-10 2007-01-02 Mcafee, Inc. Updating data from a source computer to groups of destination computers
US6604139B1 (en) 2001-12-14 2003-08-05 Networks Associates Technology, Inc. Voice protocol filtering system and method
US7058975B2 (en) 2001-12-14 2006-06-06 Mcafee, Inc. Method and system for delayed write scanning for detecting computer malwares
US6814842B1 (en) 2001-12-14 2004-11-09 Networks Associates Technology, Inc. System and method for organizing objects of a voice call in a tree representation
US6970823B1 (en) 2001-12-14 2005-11-29 Networks Associates Technology, Inc. System, method and computer program product for monitoring voice application calls over a network
US7340775B1 (en) 2001-12-20 2008-03-04 Mcafee, Inc. System, method and computer program product for precluding writes to critical files
US8185943B1 (en) 2001-12-20 2012-05-22 Mcafee, Inc. Network adapter firewall system and method
US6789201B2 (en) 2001-12-20 2004-09-07 Networks Associates Technology, Inc. Anti-virus toolbar system and method for use with a network browser
US7036147B1 (en) 2001-12-20 2006-04-25 Mcafee, Inc. System, method and computer program product for eliminating disk read time during virus scanning
US7761605B1 (en) 2001-12-20 2010-07-20 Mcafee, Inc. Embedded anti-virus scanner for a network adapter
US7373659B1 (en) 2001-12-20 2008-05-13 Mcafee, Inc. System, method and computer program product for applying prioritized security policies with predetermined limitations
US6892227B1 (en) 2001-12-21 2005-05-10 Networks Associates Technology, Inc. Enterprise network analyzer host controller/zone controller interface system and method
US6754705B2 (en) 2001-12-21 2004-06-22 Networks Associates Technology, Inc. Enterprise network analyzer architecture framework
US7840663B1 (en) 2001-12-21 2010-11-23 Mcafee, Inc. Desktop security in peer-to-peer networks
US7154857B1 (en) 2001-12-21 2006-12-26 Mcafee, Inc. Enterprise network analyzer zone controller system and method
US6789117B1 (en) 2001-12-21 2004-09-07 Networks Associates Technology, Inc. Enterprise network analyzer host controller/agent interface system and method
US6961783B1 (en) 2001-12-21 2005-11-01 Networks Associates Technology, Inc. DNS server access control system and method
US7065790B1 (en) 2001-12-21 2006-06-20 Mcafee, Inc. Method and system for providing computer malware names from multiple anti-virus scanners
US6941358B1 (en) 2001-12-21 2005-09-06 Networks Associates Technology, Inc. Enterprise interface for network analysis reporting
US7062783B1 (en) 2001-12-21 2006-06-13 Mcafee, Inc. Comprehensive enterprise network analyzer, scanner and intrusion detection framework
US7401359B2 (en) 2001-12-21 2008-07-15 Mcafee, Inc. Generating malware definition data for mobile computing devices
US6714513B1 (en) 2001-12-21 2004-03-30 Networks Associates Technology, Inc. Enterprise network analyzer agent system and method
US7016948B1 (en) 2001-12-21 2006-03-21 Mcafee, Inc. Method and apparatus for detailed protocol analysis of frames captured in an IEEE 802.11 (b) wireless LAN
US7483861B1 (en) 2001-12-21 2009-01-27 Mcafee, Inc. System, method and computer program product for a network analyzer business model
US7096500B2 (en) 2001-12-21 2006-08-22 Mcafee, Inc. Predictive malware scanning of internet data
US7266843B2 (en) 2001-12-26 2007-09-04 Mcafee, Inc. Malware scanning to create clean storage locations
US7114185B2 (en) 2001-12-26 2006-09-26 Mcafee, Inc. Identifying malware containing computer files using embedded text
US7035544B1 (en) 2001-12-27 2006-04-25 Mcafee, Inc. Identification of related communications channels in a wavelength division multiplexed optical network
US7415726B2 (en) 2001-12-28 2008-08-19 Mcafee, Inc. Controlling access to suspicious files
BR0215388A (en) 2001-12-31 2004-12-07 Citadel Security Software Inc Method and system to resolve vulnerabilities in a computer, and computer-readable medium
US7269851B2 (en) 2002-01-07 2007-09-11 Mcafee, Inc. Managing malware protection upon a computer network
US6633835B1 (en) 2002-01-10 2003-10-14 Networks Associates Technology, Inc. Prioritized data capture, classification and filtering in a network monitoring environment
US7093121B2 (en) 2002-01-10 2006-08-15 Mcafee, Inc. Transferring data via a secure network connection
US7640335B1 (en) 2002-01-11 2009-12-29 Mcafee, Inc. User-configurable network analysis digest system and method
US7140042B2 (en) 2002-01-14 2006-11-21 Mcafee, Inc. System and method for preventing software piracy
EP1466248A1 (en) 2002-01-15 2004-10-13 Foundstone, Inc. System and method for network vulnerability detection and reporting
US7257630B2 (en) 2002-01-15 2007-08-14 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7152105B2 (en) 2002-01-15 2006-12-19 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7664845B2 (en) 2002-01-15 2010-02-16 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7243148B2 (en) 2002-01-15 2007-07-10 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7543056B2 (en) 2002-01-15 2009-06-02 Mcafee, Inc. System and method for network vulnerability detection and reporting
JP4190765B2 (en) 2002-01-18 2008-12-03 株式会社コムスクエア Security level information providing method and system
JP4152108B2 (en) 2002-01-18 2008-09-17 株式会社コムスクエア Vulnerability monitoring method and system
US8256002B2 (en) 2002-01-18 2012-08-28 Alcatel Lucent Tool, method and apparatus for assessing network security
US7222366B2 (en) 2002-01-28 2007-05-22 International Business Machines Corporation Intrusion event filtering
US6665269B1 (en) 2002-01-30 2003-12-16 Networks Associates Technology, Inc. Method and apparatus for filtering network traffic based on the correct channel in an IEEE 802.11(b) wireless lan
US7587759B1 (en) 2002-02-04 2009-09-08 Mcafee, Inc. Intrusion prevention for active networked applications
US8090816B1 (en) 2002-02-07 2012-01-03 Mcafee, Inc. System and method for real-time triggered event upload
AU2003210900A1 (en) 2002-02-07 2003-09-02 Empirix Inc. Automated security threat testing of web pages
US7383556B1 (en) 2002-02-08 2008-06-03 Mcafee, Inc. Extractor system, method and computer program product for managing network access on a per-application basis
US6839852B1 (en) 2002-02-08 2005-01-04 Networks Associates Technology, Inc. Firewall system and method with network mapping capabilities
US6801756B1 (en) 2002-02-08 2004-10-05 Networks Associates Technology, Inc. Method and system for dynamic evaluation of a wireless network with a portable computing device
US6879812B2 (en) 2002-02-08 2005-04-12 Networks Associates Technology Inc. Portable computing device and associated method for analyzing a wireless local area network
US7093292B1 (en) 2002-02-08 2006-08-15 Mcafee, Inc. System, method and computer program product for monitoring hacker activities
US7237258B1 (en) 2002-02-08 2007-06-26 Mcafee, Inc. System, method and computer program product for a firewall summary interface
US6760845B1 (en) 2002-02-08 2004-07-06 Networks Associates Technology, Inc. Capture file format system and method for a network analyzer
US6772345B1 (en) 2002-02-08 2004-08-03 Networks Associates Technology, Inc. Protocol-level malware scanner
US7257773B1 (en) 2002-02-14 2007-08-14 Mcafee, Inc. Method and system for identifying unsolicited mail utilizing checksums
US20030154269A1 (en) 2002-02-14 2003-08-14 Nyanchama Matunda G. Method and system for quantitatively assessing computer network vulnerability
US7069316B1 (en) 2002-02-19 2006-06-27 Mcafee, Inc. Automated Internet Relay Chat malware monitoring and interception
US6826608B1 (en) 2002-03-01 2004-11-30 Networks Associates Technology, Inc. System, method and computer program product for translating SNMP (ASN.1) protocol decodes
US6754488B1 (en) 2002-03-01 2004-06-22 Networks Associates Technologies, Inc. System and method for detecting and locating access points in a wireless network
US7493659B1 (en) 2002-03-05 2009-02-17 Mcafee, Inc. Network intrusion detection and analysis system and method
US7424744B1 (en) 2002-03-05 2008-09-09 Mcafee, Inc. Signature based network intrusion detection system and method
US7546629B2 (en) 2002-03-06 2009-06-09 Check Point Software Technologies, Inc. System and methodology for security policy arbitration
US7328234B1 (en) 2002-03-07 2008-02-05 Mcafee, Inc. Agent architecture for triggering remotely initiated data processing operations
US7107574B1 (en) 2002-03-07 2006-09-12 Mcafee, Inc. Managing computer program configuration data
US7237222B1 (en) 2002-03-07 2007-06-26 Mcafee, Inc. Protocol for controlling an execution process on a destination computer from a source computer
US8132250B2 (en) 2002-03-08 2012-03-06 Mcafee, Inc. Message profiling systems and methods
US7694128B2 (en) 2002-03-08 2010-04-06 Mcafee, Inc. Systems and methods for secure communication delivery
US6941467B2 (en) 2002-03-08 2005-09-06 Ciphertrust, Inc. Systems and methods for adaptive message interrogation through multiple queues
US20030172291A1 (en) 2002-03-08 2003-09-11 Paul Judge Systems and methods for automated whitelisting in monitored communications
US8561167B2 (en) 2002-03-08 2013-10-15 Mcafee, Inc. Web reputation scoring
US8578480B2 (en) 2002-03-08 2013-11-05 Mcafee, Inc. Systems and methods for identifying potentially malicious messages
US20060015942A1 (en) 2002-03-08 2006-01-19 Ciphertrust, Inc. Systems and methods for classification of messaging entities
US7870203B2 (en) 2002-03-08 2011-01-11 Mcafee, Inc. Methods and systems for exposing messaging reputation to an end user
US7903549B2 (en) 2002-03-08 2011-03-08 Secure Computing Corporation Content-based policy compliance systems and methods
US7693947B2 (en) 2002-03-08 2010-04-06 Mcafee, Inc. Systems and methods for graphically displaying messaging traffic
US7458098B2 (en) 2002-03-08 2008-11-25 Secure Computing Corporation Systems and methods for enhancing electronic communication security
US7124438B2 (en) 2002-03-08 2006-10-17 Ciphertrust, Inc. Systems and methods for anomaly detection in patterns of monitored communications
US7376842B1 (en) 2002-03-13 2008-05-20 Mcafee, Inc. Malware scanning messages containing multiple data records
US6715084B2 (en) 2002-03-26 2004-03-30 Bellsouth Intellectual Property Corporation Firewall system and method via feedback from broad-scope monitoring for intrusion detection
US20030196123A1 (en) 2002-03-29 2003-10-16 Rowland Craig H. Method and system for analyzing and addressing alarms from network intrusion detection systems
US20030188194A1 (en) 2002-03-29 2003-10-02 David Currie Method and apparatus for real-time security verification of on-line services
US7841007B2 (en) 2002-03-29 2010-11-23 Scanalert Method and apparatus for real-time security verification of on-line services
US6785820B1 (en) 2002-04-02 2004-08-31 Networks Associates Technology, Inc. System, method and computer program product for conditionally updating a security program
US8656502B2 (en) 2002-04-04 2014-02-18 Mcafee, Inc. Controlling use of a computer program installed on a computer
US7810091B2 (en) 2002-04-04 2010-10-05 Mcafee, Inc. Mechanism to check the malicious alteration of malware scanner
US7660731B2 (en) 2002-04-06 2010-02-09 International Business Machines Corporation Method and apparatus for technology resource management
US7080141B1 (en) 2002-04-12 2006-07-18 Cisco Technology, Inc. Arrangement for automated fault detection and fault resolution of a network device
US6675042B2 (en) 2002-04-15 2004-01-06 Charles D. Swerdlow Defibrillation shock strength determination technology
US7440471B1 (en) 2002-04-17 2008-10-21 Mcafee, Inc. System and method for facilitating IPv6 protocol usage by an application program
US7552480B1 (en) 2002-04-23 2009-06-23 Citibank, N.A. Method and system of assessing risk using a one-dimensional risk assessment model
US7178144B2 (en) 2002-04-23 2007-02-13 Secure Resolutions, Inc. Software distribution via stages
US7590844B1 (en) 2002-04-26 2009-09-15 Mcafee, Inc. Decryption system and method for network analyzers and security programs
US7039702B1 (en) 2002-04-26 2006-05-02 Mcafee, Inc. Network analyzer engine system and method
US7590855B2 (en) 2002-04-30 2009-09-15 Tippingpoint Technologies, Inc. Steganographically authenticated packet traffic
US20030212779A1 (en) 2002-04-30 2003-11-13 Boyter Brian A. System and Method for Network Security Scanning
US7359962B2 (en) 2002-04-30 2008-04-15 3Com Corporation Network security system integration
US6959393B2 (en) 2002-04-30 2005-10-25 Threat Guard, Inc. System and method for secure message-oriented network communications
US7237008B1 (en) 2002-05-10 2007-06-26 Mcafee, Inc. Detecting malware carried by an e-mail message
US20050240756A1 (en) 2003-01-12 2005-10-27 Yaron Mayer System and method for improving the efficiency, comfort, and/or reliability in Operating Systems, such as for example Windows.
US8140642B1 (en) 2002-05-17 2012-03-20 Mcafee, Inc. Network connection-independent updating system and method
EP1512075A1 (en) 2002-05-22 2005-03-09 Lucid Security Corporation Adaptive intrusion detection system
US8065725B2 (en) 2003-05-30 2011-11-22 Yuliang Zheng Systems and methods for enhanced network security
US7308493B2 (en) 2002-06-05 2007-12-11 Trend Micro Incorporated Task-based automatic network management system with distributed control and management information base
US7203963B1 (en) 2002-06-13 2007-04-10 Mcafee, Inc. Method and apparatus for adaptively classifying network traffic
US7904955B1 (en) 2002-06-13 2011-03-08 Mcafee, Inc. Method and apparatus for detecting shellcode
US7788718B1 (en) 2002-06-13 2010-08-31 Mcafee, Inc. Method and apparatus for detecting a distributed denial of service attack
BR0215761A (en) 2002-06-18 2006-11-28 Computer Ass Think Inc methods and systems for managing enterprise resources
US20040006704A1 (en) 2002-07-02 2004-01-08 Dahlstrom Dale A. System and method for determining security vulnerabilities
US20040015338A1 (en) 2002-07-19 2004-01-22 Lawrence William Richard Method and apparatus for automated signal integrity checking
US20040015737A1 (en) 2002-07-19 2004-01-22 Martin Robert J. Method and apparatus for automated signal integrity checking based on storage device functionality
US7350203B2 (en) 2002-07-23 2008-03-25 Alfred Jahn Network security software
US8393001B1 (en) 2002-07-26 2013-03-05 Mcafee, Inc. Secure signature server system and associated method
US8260906B1 (en) 2002-07-26 2012-09-04 Mcafee, Inc. System and method for heuristic determination of network protocols
US20040021889A1 (en) 2002-07-30 2004-02-05 Mcafee David A. Method of transmitting information from a document to a remote location, and a computer peripheral device
US6922462B2 (en) 2002-07-31 2005-07-26 Ge Medical Systems Global Technology Company, Llc Method, system and computer product for plaque characterization
US6663000B1 (en) 2002-08-01 2003-12-16 Networks Associates Technology, Inc. Validating components of a malware scanner
US20040024781A1 (en) 2002-08-01 2004-02-05 The Regents Of The University Of California Method of comparing version strings
US7305005B1 (en) 2002-08-05 2007-12-04 Mcafee, Inc. Correlation system and method for monitoring high-speed networks
US7412722B1 (en) 2002-08-08 2008-08-12 Verizon Laboratories Inc. Detection of softswitch attacks
US7421266B1 (en) 2002-08-12 2008-09-02 Mcafee, Inc. Installation and configuration process for wireless network
WO2004015958A2 (en) 2002-08-12 2004-02-19 Wireless Security Corporation Fine grained access control for wireless networks
US7418733B2 (en) 2002-08-26 2008-08-26 International Business Machines Corporation Determining threat level associated with network activity
WO2004021114A2 (en) 2002-08-27 2004-03-11 Td Security, Inc., Dba Trust Digital, Llc Enterprise-wide security system for computer devices
US7114183B1 (en) 2002-08-28 2006-09-26 Mcafee, Inc. Network adaptive baseline monitoring system and method
US6742128B1 (en) 2002-08-28 2004-05-25 Networks Associates Technology Threat assessment orchestrator system and method
US7231664B2 (en) 2002-09-04 2007-06-12 Secure Computing Corporation System and method for transmitting and receiving secure data in a virtual private group
US7334222B2 (en) 2002-09-11 2008-02-19 International Business Machines Corporation Methods and apparatus for dependency-based impact simulation and vulnerability analysis
US7370092B2 (en) 2002-09-12 2008-05-06 Computer Sciences Corporation System and method for enhanced software updating and revision
US7234163B1 (en) 2002-09-16 2007-06-19 Cisco Technology, Inc. Method and apparatus for preventing spoofing of network addresses
US7216343B2 (en) 2002-09-20 2007-05-08 International Business Machines Corporation Method and apparatus for automatic updating and testing of software
US20040064731A1 (en) 2002-09-26 2004-04-01 Nguyen Timothy Thien-Kiem Integrated security administrator
US8069480B1 (en) 2002-09-30 2011-11-29 Mcafee, Inc. Method and system for defining a safe storage area for use in recovering a computer system
US7472421B2 (en) 2002-09-30 2008-12-30 Electronic Data Systems Corporation Computer model of security risks
US20040064726A1 (en) 2002-09-30 2004-04-01 Mario Girouard Vulnerability management and tracking system (VMTS)
US8407798B1 (en) 2002-10-01 2013-03-26 Skybox Secutiry Inc. Method for simulation aided security event management
US8359650B2 (en) 2002-10-01 2013-01-22 Skybox Secutiry Inc. System, method and computer readable medium for evaluating potential attacks of worms
US6952779B1 (en) 2002-10-01 2005-10-04 Gideon Cohen System and method for risk detection and analysis in a computer network
US20040064722A1 (en) 2002-10-01 2004-04-01 Dinesh Neelay System and method for propagating patches to address vulnerabilities in computers
US7440403B2 (en) 2002-10-10 2008-10-21 P-Cube Ltd. Method and software for calculating rate constraints
US20050033988A1 (en) 2002-10-18 2005-02-10 Neoscale Systems, Inc. Method and system for transparent encryption and authentication of file data protocols over internet protocol
US20040153171A1 (en) 2002-10-21 2004-08-05 Brandt David D. System and methodology providing automation security architecture in an industrial controller environment
US8909926B2 (en) 2002-10-21 2014-12-09 Rockwell Automation Technologies, Inc. System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
AU2003273085A1 (en) 2002-10-22 2004-05-13 Unho Choi Integrated emergency response system in information infrastructure and operating method therefor
US8046835B2 (en) 2002-10-23 2011-10-25 Frederick S. M. Herz Distributed computer network security activity model SDI-SCAM
US7308706B2 (en) 2002-10-28 2007-12-11 Secure Computing Corporation Associative policy model
US7603711B2 (en) 2002-10-31 2009-10-13 Secnap Networks Security, LLC Intrusion detection system
US8230497B2 (en) 2002-11-04 2012-07-24 Hewlett-Packard Development Company, L.P. Method of identifying software vulnerabilities on a computer system
US7278019B2 (en) 2002-11-04 2007-10-02 Hewlett-Packard Development Company, L.P. Method of hindering the propagation of a computer virus
US7353539B2 (en) 2002-11-04 2008-04-01 Hewlett-Packard Development Company, L.P. Signal level propagation mechanism for distribution of a payload to vulnerable systems
US7343626B1 (en) 2002-11-12 2008-03-11 Microsoft Corporation Automated detection of cross site scripting vulnerabilities
US7991827B1 (en) 2002-11-13 2011-08-02 Mcafee, Inc. Network analysis system and method utilizing collected metadata
US6980927B2 (en) 2002-11-27 2005-12-27 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing continuous risk assessment
US6983221B2 (en) 2002-11-27 2006-01-03 Telos Corporation Enhanced system, method and medium for certifying and accrediting requirements compliance utilizing robust risk assessment model
US7249187B2 (en) 2002-11-27 2007-07-24 Symantec Corporation Enforcement of compliance with network security policies
US7827607B2 (en) 2002-11-27 2010-11-02 Symantec Corporation Enhanced client compliancy using database of security sensor data
US7650638B1 (en) 2002-12-02 2010-01-19 Arcsight, Inc. Network security monitoring system employing bi-directional communication
US20040107274A1 (en) 2002-12-03 2004-06-03 Mastrianni Steven J. Policy-based connectivity
US7941854B2 (en) 2002-12-05 2011-05-10 International Business Machines Corporation Method and system for responding to a computer intrusion
US7428300B1 (en) 2002-12-09 2008-09-23 Verizon Laboratories Inc. Diagnosing fault patterns in telecommunication networks
US8122498B1 (en) 2002-12-12 2012-02-21 Mcafee, Inc. Combined multiple-application alert system and method
US8312535B1 (en) 2002-12-12 2012-11-13 Mcafee, Inc. System, method, and computer program product for interfacing a plurality of related applications
WO2004056069A2 (en) 2002-12-13 2004-07-01 Computer Associates Think, Inc. Content management system
US8380791B1 (en) 2002-12-13 2013-02-19 Mcafee, Inc. Anti-spam system, method, and computer program product
US8990723B1 (en) 2002-12-13 2015-03-24 Mcafee, Inc. System, method, and computer program product for managing a plurality of applications via a single interface
US6732157B1 (en) 2002-12-13 2004-05-04 Networks Associates Technology, Inc. Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages
US8239941B1 (en) 2002-12-13 2012-08-07 Mcafee, Inc. Push alert system, method, and computer program product
US7418730B2 (en) 2002-12-17 2008-08-26 International Business Machines Corporation Automatic client responses to worm or hacker attacks
US6859793B1 (en) 2002-12-19 2005-02-22 Networks Associates Technology, Inc. Software license reporting and control system and method
US7412723B2 (en) 2002-12-31 2008-08-12 International Business Machines Corporation Method and system for morphing honeypot with computer security incident correlation
US7296293B2 (en) 2002-12-31 2007-11-13 Symantec Corporation Using a benevolent worm to assess and correct computer security vulnerabilities
US7383578B2 (en) 2002-12-31 2008-06-03 International Business Machines Corporation Method and system for morphing honeypot
JP2006518062A (en) 2003-01-15 2006-08-03 ブラッコ イメージング ソチエタ ペル アチオニBracco Imaging S.P.A. The system and method of the database optimization of the training and testing of the prediction algorithm
US7793346B1 (en) 2003-01-17 2010-09-07 Mcafee, Inc. System, method, and computer program product for preventing trojan communication
US20050195975A1 (en) 2003-01-21 2005-09-08 Kevin Kawakita Digital media distribution cryptography using media ticket smart cards
US7913303B1 (en) 2003-01-21 2011-03-22 International Business Machines Corporation Method and system for dynamically protecting a computer system from attack
US7900254B1 (en) 2003-01-24 2011-03-01 Mcafee, Inc. Identifying malware infected reply messages
US20040148520A1 (en) 2003-01-29 2004-07-29 Rajesh Talpade Mitigating denial of service attacks
US20040158545A1 (en) 2003-02-12 2004-08-12 Symantec Corporation System and method for an expert architecture
US7627891B2 (en) 2003-02-14 2009-12-01 Preventsys, Inc. Network audit and policy assurance system
US8561175B2 (en) 2003-02-14 2013-10-15 Preventsys, Inc. System and method for automated policy audit and remediation management
JP4346326B2 (en) 2003-02-27 2009-10-21 富士通株式会社 Security system, information management system, encryption support systems, and computer program
US7555749B2 (en) 2003-03-10 2009-06-30 Microsoft Corporation Software updating system and method
FR2852413B1 (en) 2003-03-12 2005-05-20 Peripheral Secure Tamper and forgery resistant for storing computer data authenticated and dated a legal or statutory value
US8042178B1 (en) 2003-03-13 2011-10-18 Mcafee, Inc. Alert message control of security mechanisms in data processing systems
US7398272B2 (en) 2003-03-24 2008-07-08 Bigfix, Inc. Enterprise console
US20040193918A1 (en) 2003-03-28 2004-09-30 Kenneth Green Apparatus and method for network vulnerability detection and compliance assessment
US6898632B2 (en) 2003-03-31 2005-05-24 Finisar Corporation Network security tap for use with intrusion detection system
US7218891B2 (en) 2003-03-31 2007-05-15 Nortel Networks Limited Multi-hop intelligent relaying method and apparatus for use in a frequency division duplexing based wireless access network
US8171551B2 (en) 2003-04-01 2012-05-01 Mcafee, Inc. Malware detection using external call characteristics
US8127359B2 (en) 2003-04-11 2012-02-28 Samir Gurunath Kelekar Systems and methods for real-time network-based vulnerability assessment
US7941855B2 (en) 2003-04-14 2011-05-10 New Mexico Technical Research Foundation Computationally intelligent agents for distributed intrusion detection system and method of practicing same
US8122499B2 (en) 2003-04-16 2012-02-21 Hobnob, Inc. Network security apparatus and method
CA2464430A1 (en) 2003-04-16 2004-10-16 Wms Gaming Inc. Layered security methods and apparatus in a gaming system environment
CA2465151A1 (en) 2003-04-16 2004-10-16 Novadigm, Inc. Method and system for patch management
US6987963B2 (en) 2003-04-17 2006-01-17 Ntt Docomo, Inc. System, method and computer program product for content/context sensitive scanning utilizing a mobile communication device
US7254811B2 (en) 2003-04-17 2007-08-07 Ntt Docomo, Inc. Update system and method for updating a scanning subsystem in a mobile communication framework
US8291505B2 (en) 2003-04-17 2012-10-16 Mcafee, Inc. Detecting computer data containing compressed video data as banned computer data
US7392043B2 (en) 2003-04-17 2008-06-24 Ntt Docomo, Inc. API system, method and computer program product for accessing content/security analysis functionality in a mobile communication framework
US6970697B2 (en) 2003-04-17 2005-11-29 Ntt Docomo, Inc. Platform-independent scanning subsystem API for use in a mobile communication framework
EP1627303A4 (en) 2003-04-18 2009-01-14 Ounce Labs Inc Method ans system for detecting vulnerabilities in source code
US7418734B2 (en) 2003-04-18 2008-08-26 Ounce Labs, Inc. Method and system for detecting privilege escalation vulnerabilities in source code
US20040250115A1 (en) 2003-04-21 2004-12-09 Trend Micro Incorporated. Self-contained mechanism for deploying and controlling data security services via a web browser platform
JP4222184B2 (en) 2003-04-24 2009-02-12 日本電気株式会社 Security management support system, security management support method, and program
US20040221176A1 (en) 2003-04-29 2004-11-04 Cole Eric B. Methodology, system and computer readable medium for rating computer system vulnerabilities
US7451488B2 (en) 2003-04-29 2008-11-11 Securify, Inc. Policy-based vulnerability assessment
US7885190B1 (en) 2003-05-12 2011-02-08 Sourcefire, Inc. Systems and methods for determining characteristics of a network based on flow analysis
US20040243603A1 (en) 2003-05-28 2004-12-02 Nec Corporation Configuration setting apparatus, configuration setting method, and configuration setting program product
US20040250128A1 (en) 2003-06-03 2004-12-09 Bush Stephen F. System and method for network security analysis
US8010387B2 (en) 2003-06-04 2011-08-30 California Institute Of Technology Method, computer program product, and system for risk management
US8068441B1 (en) 2003-06-05 2011-11-29 Mcafee, Inc. Automated discovery of access points in wireless computer networks
US8019082B1 (en) 2003-06-05 2011-09-13 Mcafee, Inc. Methods and systems for automated configuration of 802.1x clients
US8555344B1 (en) 2003-06-05 2013-10-08 Mcafee, Inc. Methods and systems for fallback modes of operation within wireless computer networks
US7437763B2 (en) 2003-06-05 2008-10-14 Microsoft Corporation In-context security advisor in a computing environment
US7673146B2 (en) 2003-06-05 2010-03-02 Mcafee, Inc. Methods and systems of remote authentication for computer networks
US7926113B1 (en) 2003-06-09 2011-04-12 Tenable Network Security, Inc. System and method for managing network vulnerability analysis systems
GB2424811B (en) 2003-06-17 2006-12-06 Accenture Global Services Gmbh Method and system for selectively distributing data to a set of network devices
US8024076B2 (en) 2003-06-27 2011-09-20 Intelilcon, Inc. Voltage collapse diagnostic and ATC system
US7409593B2 (en) 2003-06-30 2008-08-05 At&T Delaware Intellectual Property, Inc. Automated diagnosis for computer networks
US7051077B2 (en) 2003-06-30 2006-05-23 Mx Logic, Inc. Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers
US6843190B1 (en) 2003-06-30 2005-01-18 Lapierre-Mcafee Florence L. Free motion sewing methods and mechanisms
US20050005152A1 (en) 2003-07-01 2005-01-06 Navjot Singh Security vulnerability monitor
US9118708B2 (en) * 2003-07-01 2015-08-25 Securityprofiling, Llc Multi-path remediation
US7590725B1 (en) 2003-07-01 2009-09-15 Mcafee, Inc. Network analyzer system, method and computer program product for multi-dimensional analysis of network tunnels
US20070113272A2 (en) * 2003-07-01 2007-05-17 Securityprofiling, Inc. Real-time vulnerability monitoring
US8984644B2 (en) 2003-07-01 2015-03-17 Securityprofiling, Llc Anti-vulnerability system, method, and computer program product
US9100431B2 (en) 2003-07-01 2015-08-04 Securityprofiling, Llc Computer program product and apparatus for multi-path remediation
US7640586B1 (en) 2003-07-07 2009-12-29 Mcafee, Inc. Reducing HTTP malware scanner latency using HTTP range queries for random access
US8634309B2 (en) 2003-07-10 2014-01-21 Mcafee, Inc. Security network processor system and method
US7035107B2 (en) 2003-07-11 2006-04-25 Intel Corporation High serviceability heatsink retainer method and apparatus
US8117273B1 (en) 2003-07-11 2012-02-14 Mcafee, Inc. System, device and method for dynamically securing instant messages
US7424706B2 (en) 2003-07-16 2008-09-09 Microsoft Corporation Automatic detection and patching of vulnerable files
US7257842B2 (en) 2003-07-21 2007-08-14 Mcafee, Inc. Pre-approval of computer files during a malware detection
US20050022021A1 (en) 2003-07-22 2005-01-27 Bardsley Jeffrey S. Systems, methods and data structures for generating computer-actionable computer security threat management information
US8225407B1 (en) 2003-08-21 2012-07-17 Symantec Corporation Incident prioritization and adaptive response recommendations
US8539063B1 (en) 2003-08-29 2013-09-17 Mcafee, Inc. Method and system for containment of networked application client software by explicit human input
US7464408B1 (en) 2003-08-29 2008-12-09 Solidcore Systems, Inc. Damage containment by translation
US20050097199A1 (en) 2003-10-10 2005-05-05 Keith Woodard Method and system for scanning network devices
US7814543B2 (en) 2004-02-13 2010-10-12 Microsoft Corporation System and method for securing a computer system connected to a network from attacks
US20050216957A1 (en) 2004-03-25 2005-09-29 Banzhof Carl E Method and apparatus for protecting a remediated computer network from entry of a vulnerable computer system thereinto
US8201257B1 (en) 2004-03-31 2012-06-12 Mcafee, Inc. System and method of managing network security risks
US7383271B2 (en) 2004-04-06 2008-06-03 Microsoft Corporation Centralized configuration data management for distributed clients
US7519954B1 (en) 2004-04-08 2009-04-14 Mcafee, Inc. System and method of operating system identification
US20050267954A1 (en) 2004-04-27 2005-12-01 Microsoft Corporation System and methods for providing network quarantine
US7084760B2 (en) 2004-05-04 2006-08-01 International Business Machines Corporation System, method, and program product for managing an intrusion detection system
US7698275B2 (en) 2004-05-21 2010-04-13 Computer Associates Think, Inc. System and method for providing remediation management
US20050273853A1 (en) 2004-05-24 2005-12-08 Toshiba America Research, Inc. Quarantine networking
US7509676B2 (en) 2004-07-30 2009-03-24 Electronic Data Systems Corporation System and method for restricting access to an enterprise network
US20060041936A1 (en) 2004-08-19 2006-02-23 International Business Machines Corporation Method and apparatus for graphical presentation of firewall security policy
US7353390B2 (en) 2004-08-20 2008-04-01 Microsoft Corporation Enabling network devices within a virtual network to communicate while the networks's communications are restricted due to security threats
US7761920B2 (en) 2004-09-03 2010-07-20 Fortinet, Inc. Data structure for policy-based remediation selection
US20060085852A1 (en) 2004-10-20 2006-04-20 Caleb Sima Enterprise assessment management
US20060101517A1 (en) 2004-10-28 2006-05-11 Banzhof Carl E Inventory management-based computer vulnerability resolution system
US20060101518A1 (en) 2004-11-05 2006-05-11 Schumaker Troy T Method to generate a quantitative measurement of computer security vulnerabilities
US7610610B2 (en) 2005-01-10 2009-10-27 Mcafee, Inc. Integrated firewall, IPS, and virus scanner system and method
US8250654B1 (en) 2005-01-27 2012-08-21 Science Applications International Corporation Systems and methods for implementing and scoring computer network defense exercises
US8266320B1 (en) 2005-01-27 2012-09-11 Science Applications International Corporation Computer network defense
US7278163B2 (en) 2005-02-22 2007-10-02 Mcafee, Inc. Security risk analysis system and method
US20080047016A1 (en) 2006-08-16 2008-02-21 Cybrinth, Llc CCLIF: A quantified methodology system to assess risk of IT architectures and cyber operations
KR100862187B1 (en) 2006-10-27 2008-10-09 한국전자통신연구원 A Method and a Device for Network-Based Internet Worm Detection With The Vulnerability Analysis and Attack Modeling
US8966619B2 (en) 2006-11-08 2015-02-24 Verizon Patent And Licensing Inc. Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using return routability check filtering
US9473529B2 (en) 2006-11-08 2016-10-18 Verizon Patent And Licensing Inc. Prevention of denial of service (DoS) attacks on session initiation protocol (SIP)-based systems using method vulnerability filtering
US8392997B2 (en) 2007-03-12 2013-03-05 University Of Southern California Value-adaptive security threat modeling and vulnerability ranking
US9026394B2 (en) 2007-10-08 2015-05-05 Wurldtech Security Technologies Testing and mitigation framework for networked devices
US8181173B2 (en) 2007-10-12 2012-05-15 International Business Machines Corporation Determining priority for installing a patch into multiple patch recipients of a network
US8185930B2 (en) 2007-11-06 2012-05-22 Mcafee, Inc. Adjusting filter or classification control settings
US20100218256A1 (en) 2009-02-26 2010-08-26 Network Security Systems plus, Inc. System and method of integrating and managing information system assessments
US20100241478A1 (en) 2009-03-20 2010-09-23 Mehmet Sahinoglu Method of automating security risk assessment and management with a cost-optimized allocation plan
US9077609B2 (en) 2009-12-07 2015-07-07 Verizon Patent And Licensing Inc. Scalable reusable scanning of application networks/systems
US8610368B2 (en) 2009-12-21 2013-12-17 Top Victory Investments Ltd. Serial-type light-emitting diode (LED) device
US9607155B2 (en) 2010-10-29 2017-03-28 Hewlett Packard Enterprise Development Lp Method and system for analyzing an environment
WO2012109633A2 (en) 2011-02-11 2012-08-16 Achilles Guard, Inc. D/B/A Critical Watch Security countermeasure management platform
US8650637B2 (en) 2011-08-24 2014-02-11 Hewlett-Packard Development Company, L.P. Network security risk assessment
US9083736B2 (en) 2013-01-28 2015-07-14 Hewlett-Packard Development Company, L.P. Monitoring and mitigating client-side exploitation of application flaws
WO2014182738A1 (en) 2013-05-06 2014-11-13 Staples, Inc. It vulnerability management system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6298445B1 (en) * 1998-04-30 2001-10-02 Netect, Ltd. Computer security
US6282546B1 (en) * 1998-06-30 2001-08-28 Cisco Technology, Inc. System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
US6324656B1 (en) * 1998-06-30 2001-11-27 Cisco Technology, Inc. System and method for rules-driven multi-phase network vulnerability assessment
US7051365B1 (en) * 1999-06-30 2006-05-23 At&T Corp. Method and apparatus for a distributed firewall
US7159237B2 (en) * 2000-03-16 2007-01-02 Counterpane Internet Security, Inc. Method and system for dynamic network intrusion monitoring, detection and response
US20020013811A1 (en) * 2000-07-26 2002-01-31 In-Gwang Kim Method and apparatus for controlling remote client computer
US7010696B1 (en) * 2001-03-30 2006-03-07 Mcafee, Inc. Method and apparatus for predicting the incidence of a virus
US20030145228A1 (en) * 2002-01-31 2003-07-31 Janne Suuronen System and method of providing virus protection at a gateway
US6966059B1 (en) * 2002-03-11 2005-11-15 Mcafee, Inc. System and method for providing automated low bandwidth updates of computer anti-virus application components
US20050015382A1 (en) * 2003-06-30 2005-01-20 Aaron Jeffrey A. Electronic vulnerability and reliability assessment

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060185018A1 (en) * 2005-02-17 2006-08-17 Microsoft Corporation Systems and methods for shielding an identified vulnerability
US20130276089A1 (en) * 2012-04-12 2013-10-17 Ariel Tseitlin Method and system for improving security and reliability in a networked application environment
US9027141B2 (en) * 2012-04-12 2015-05-05 Netflix, Inc. Method and system for improving security and reliability in a networked application environment
US20150235035A1 (en) * 2012-04-12 2015-08-20 Netflix, Inc Method and system for improving security and reliability in a networked application environment
US9953173B2 (en) * 2012-04-12 2018-04-24 Netflix, Inc. Method and system for improving security and reliability in a networked application environment
US8990942B2 (en) 2013-02-18 2015-03-24 Wipro Limited Methods and systems for API-level intrusion detection

Also Published As

Publication number Publication date
US20160088010A1 (en) 2016-03-24
US20140109230A1 (en) 2014-04-17
US10154055B2 (en) 2018-12-11
US20060230441A2 (en) 2006-10-12
US9117069B2 (en) 2015-08-25
US20050005171A1 (en) 2005-01-06
US10075466B1 (en) 2018-09-11

Similar Documents

Publication Publication Date Title
Bace et al. NIST special publication on intrusion detection systems
US7574740B1 (en) Method and system for intrusion detection in a computer network
US7353533B2 (en) Administration of protection of data accessible by a mobile device
US7895641B2 (en) Method and system for dynamic network intrusion monitoring, detection and response
US7827607B2 (en) Enhanced client compliancy using database of security sensor data
US8955135B2 (en) Malicious code infection cause-and-effect analysis
US7150044B2 (en) Secure self-organizing and self-provisioning anomalous event detection systems
US9237514B2 (en) System and method for filtering access points presented to a user and locking onto an access point
US7748040B2 (en) Attack correlation using marked information
US8020192B2 (en) Administration of protection of data accessible by a mobile device
CN103283202B (en) System and method for network level protection against malicious software
US8122111B2 (en) System and method for server configuration control and management
US7478420B2 (en) Administration of protection of data accessible by a mobile device
US9660960B2 (en) Real-time reconfigurable web application firewall for a distributed platform
US8291498B1 (en) Computer virus detection and response in a wide area network
AU2011283160B2 (en) System and method for local protection against malicious software
US8272058B2 (en) Centralized timed analysis in a network security system
US8782800B2 (en) Parametric content control in a network security system
US7895651B2 (en) Content tracking in a network security system
Kent et al. Guide to computer security log management
US7197762B2 (en) Method, computer readable medium, and node for a three-layered intrusion prevention system for detecting network exploits
US8819762B2 (en) System and method for auditing a security policy
EP1591868A1 (en) Method and apparatus for providing network security based on device security status
US20040193943A1 (en) Multiparameter network fault detection system using probabilistic and aggregation analysis
US8984636B2 (en) Content extractor and analysis system

Legal Events

Date Code Title Description
AS Assignment

Owner name: SECURITYPROFILING, INC., INDIANA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OLIPHANT, BETT M.;REEL/FRAME:015544/0311

Effective date: 20040701

Owner name: SECURITYPROFILING, INC.,INDIANA

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OLIPHANT, BETT M.;REEL/FRAME:015544/0311

Effective date: 20040701

STCB Information on status: application discontinuation

Free format text: ABANDONED -- AFTER EXAMINER'S ANSWER OR BOARD OF APPEALS DECISION

AS Assignment

Owner name: SECURITYPROFILING, LLC, TEXAS

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SECURITYPROFILING, INC.;REEL/FRAME:033857/0956

Effective date: 20140923