WO2005038598B1 - Policy-based network security management - Google Patents

Policy-based network security management

Info

Publication number
WO2005038598B1
WO2005038598B1 PCT/US2004/033828 US2004033828W WO2005038598B1 WO 2005038598 B1 WO2005038598 B1 WO 2005038598B1 US 2004033828 W US2004033828 W US 2004033828W WO 2005038598 B1 WO2005038598 B1 WO 2005038598B1
Authority
WO
WIPO (PCT)
Prior art keywords
network
data
user
level
alert
Prior art date
Application number
PCT/US2004/033828
Other languages
French (fr)
Other versions
WO2005038598A2 (en
WO2005038598A3 (en
Filing date
Publication date
Priority claimed from US10/688,051 external-priority patent/US7237267B2/en
Application filed filed Critical
Priority to EP04795046A priority Critical patent/EP1678615A4/en
Priority to AU2004282937A priority patent/AU2004282937B2/en
Priority to CA002541934A priority patent/CA2541934A1/en
Publication of WO2005038598A2 publication Critical patent/WO2005038598A2/en
Publication of WO2005038598A3 publication Critical patent/WO2005038598A3/en
Publication of WO2005038598B1 publication Critical patent/WO2005038598B1/en

Links

Abstract

A policy-based network security management system is disclosed. In one embodiment, the system comprises a security management controller comprising one or more processors; a computer-readable medium carrying one or more sequences of instructions for policy controller comprising one or more processors; a computer-readable medium carrying one or more sequences of instructions for policy-based network security management, wherein execution of the one or more sequences of instructions by the one or more processors cause the one or more processor to perform the steps of receiving a set of data regarding a user (209) of a computer network; automatically deciding on a course of action based on the set of data (214), wherein the course of action may be adverse to the user although the set of data is insufficient to establish whether the user is performing a malicious action; and sending signals to one or more network elements in the computer network to implement the decision (224).

Claims

AMENDED CLAIMS [ received by the International Bureau on 16 February 2006 (16.02.2006) ]
1. A policy-based network security management system, the system comprising: a security management controller comprising one or more processors; a computer-readable medium carrying one or more sequences of instructions for policy-based network security management, wherein execution of the one or more sequences of instructions by the one or more processors causes the one or more processors to perform the steps of: receiving a set of data regarding a user of a network, wherein the set of data is a first set of data that is collected over a first duration of lime; receiving a second set of data that is collected over a second duration of time, wherein the first duration of time is shorter than the second duration of time; assessing a risk level of the user harming the network based on the second set of data, wherein the second duration of time is sufficient to collect historical data regarding past malicious activities of the user; assessing a current alert level based on the first set of data, wherein the first duration of time is of a length appropriate for assessing current activities of the user; automatically deciding on a course of action based on at least one of the risk level and the current alert level, wherein the course of action may be adverse to the user although the current alert level is insufficient to establish whether the user is performing a malicious action; and sending signals to one or more network elements in the network to implement the course of action.
2. The system of Claim 1, wherein the set of data includes at least one or more alerts related to the user.
3. The system, of Claim 1 , wherein the signals include multiple alerts generated by multiple users; and the system further comprising sequences of instructions for correlating the multiple alerts to the multiple users.
4. The system of Claim 1, further comprising sequences of instructions for performing the steps of: receiving signals related to an external source including at least an alert assessment relevant to the network as a whole; and creating and storing a current alert level value based on the alert assessment.
5. The system of Claim 1, further comprising sequences of instructions for performing the steps of: receiving signals carrying performance information related to a health level of the network; and determining the course of action based at least in part on the set of data and the performance information.
6. The system of Claim 1 further comprising; a plurality of routers for routing information sent by users and servers to a variety of destinations; a subscriber management system for managing a network; a controller for executing the sequences of instructions; a network element for generating input for the set of data; and sequences of instructions for sending signals to the network elements,
7. A computer-readable medium carrying one or more sequences of instructions for providing policy-based network security management, wherein execution of the one or more sequences of instructions by one or more processors causes the one or more processors to perform the steps of: receiving signals carrying network performance information regarding health of a network and resource performance information regarding health of resources used by a network; assessing a health level based on the network performance information and the resource performance information; and sending signals carrying information affecting use of the network based on at least the health level.
8. A computer-readable medium as recited in Claim 7, further comprising the steps of: receiving signals related to one or more alerts; associating with the user at least the one or more alerts within a current alert dataset that establishes a current alert level for the user.
9. A computer-readable medium as recited in Claim 7, further comprising the step of establishing a user alert.
10. A computer-readable medium as recited in Claim 7, further comprising the steps of: receiving signals related to one or more alerts; associating with a user at least the one or more alerts within a historical dataset of alert related information that establishes a user risk level for the user.
11. A computer-readable medium as recited in Claim 7, wherein the step of sending signals further comprises the steps of: deciding on a course of action based on at least a user risk level, a current alert level, and the health level, wherein the information affecting the use of the network is based on at least the course of action.
12. A computer-readable medium as recited in Claim 11, wherein the deciding step includes at least: determining the user risk level and determining the current alert level, wherein the information affecting the use of the network is based on at least the user risk level, the current alert level, and the health level.
13. A policy-based network security management system, the system comprising: a security management controller comprising one or more processors; and the computer readable medium of Claim 7.
14. A method of providing policy-based network security management, comprising the steps of; receiving a set of data regarding a user of a network, wherein the set of data is a first set of data that is collected over a first duration of time; receiving a second set of data that is collected over a second duration of time, wherein the first duration of time is shorter than the second duration of time; assessing a risk level of the user harming the network based on the second set of data, wherein the second duration of time is sufficient to collect historical data regarding past malicious activities of the user; assessing a current alert level based on the first set of data, wherein the first duration of time is of a length appropriate for assessing current activities of the user; automatically deciding on a course of action based on at least one of the risk level and the current alert level, wherein the course of action may be adverse to the user although the current alert level is insufficient to establish whether the user is performing a malicious action; and sending signals to one or more network elements in the network to implement the course of action.
15. The method of Claim 14 wherein the set of data includes at least one or more alerts related to the user.
16. The method of Claim 14, wherein the signals include multiple alerts generated by multiple users, and the method further comprises correlating the multiple alerts to the multiple users.
17. The method of Claim 14 further comprising receiving signals related to an external source including an alert assessment relevant to the network as a whole, wherein the current alert level is also based on the alert assessment.
18. The method of Claim 14 further comprising receiving signals carrying performance information related to a health level of the network, wherein the course of action is based on the set of data and the performance information.
19. A method of policy-based network security management, comprising the computer- implemented steps of: receiving one or more signals carrying network performance information regarding health of one or more network devices in a network, and resource performance information regarding health of one or more resources used by the network; assessing an overall network health level based on the network performance information and the resource performance information; and sending signals carrying information affecting use of the network based on the overall network health level.
20. The method of Claim 19 further comprising: receiving signals related to one or more alerts; including at least the one or more alerts within a historical dataset of alert related information that establishes a user risk level for a user; and including at least the one or more alerts within a current alert dataset that establishes a current alert level.
21. The method of Claim 19, wherein the sending step further comprising the steps of: deciding on a course of action based on at least a user risk level, a current alert level, and the overall network health level, and the information affecting the use of the network includes at least information for carrying out the course of action,
22. The method of Claim 21 , wherein the deciding step includes at least the steps of: determining the user risk level; determining the current alert level; and determining the overall network health level; wherein the information affecting the use of the network is based on at least the user risk level, the current alert level, and the overall network health level.
23. A method of policy-based network security management, comprising the computer- implemented steps of: collecting network performance statistics related to an overall health of a network and individual performance statistics of one or more individual units of the network, the collecting being performed by a performance management system; sending the network performance statistics to a controller for analysis; computing an overall health state based on the network performance statistics and the individual performance statistics, using the controller; reading external alert data from an external alert source, using the controller; collecting security event data from the network; sending the security event data to a fault management system; using the fault management system for checking for duplications in the security event data, and deduplicating duplicate security events in the security event data; calculating an alert state based on the security event data from the fault management system and the external alert data; obtaining user information from a subscriber management system; correlating the security event data from the fault management system with the user information to form correlated security event data; reading external user risk data from an external user risk source into the controller; calculating a user risk state based on the correlated security event data and the external user risk data, using the controller; calculating a decision regarding whether to take corrective action based on the overall health state, the alert state, and the user risk state, using the controller; sending the decision from the controller to the subscriber management system; and sending directives, related to the decision, from the subscriber management system to the network.
24. A system comprising: a fault management system that receives network security data and deduplicates duplicate indications of security events in the network security data to form deduplicated security event data; a subscriber management system that manages subscribers using a network, wherein the subscriber management system stores subscriber information about individual users and is capable of sending directives to the individual users based on a decision to take corrective action toward the individual users; wherein the deduplicated security event data from the fault management system is correlated to the subscriber information to form correlated network security data; a performance management system that receives overall performance data related to an overall health of the network and individual performance data related to a health of one or more individual units of the network; and a controller that: receives external alert data from an external alert source, external user risk data from an external user risk source, the deduplicated security event data, the correlated network security data, the overall performance data, and the individual performance data; computes an alert state based on at least the external alert data and the deduplicated security event data, a user risk state based on at least the external user risk data and the correlated network security data, and a health state based on at least the overall performance data and the individual performance data; makes the decision whether to take corrective action based on at least the alert state, the user risk state, and the health state; and causes directives that implement the decision to be sent to the network.
25. An apparatus for providing policy-based network security management, comprising: means for receiving a set of data regarding a user of a network, wherein the set of data is a first set of data that is collected over a first duration of time; means for receiving a second set of data that is collected over a second duration of time, wherein the first duration of time is shorter than the second duration of time; means for assessing a risk level of the user harming the network based on the second set of data, wherein the second duration of time is sufficient to collect historical data regarding past malicious activities of the user; means for assessing a current alert level based on the first set of data, wherein the first duration of time is of a length appropriate for assessing current activities of the user; means for automatically deciding on a course of action based on at least one of the risk level and the current alert level, wherein the course of action may be adverse to the user although the current alert level is insufficient to establish whether the user is performing a malicious action; and means for sending signals to one or more network elements in the network to implement the course of action,
26. An apparatus for providing policy-based network security management, comprising: means for receiving signals carrying network performance information regarding health of a network and resource performance information regarding health of resources used by the network; means for assessing a health level based on the network performance information and the resource performance information; and means for sending signals carrying information affecting use of the network based on at least the health level.
PCT/US2004/033828 2003-10-16 2004-10-13 Policy-based network security management WO2005038598A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP04795046A EP1678615A4 (en) 2003-10-16 2004-10-13 Policy-based network security management
AU2004282937A AU2004282937B2 (en) 2003-10-16 2004-10-13 Policy-based network security management
CA002541934A CA2541934A1 (en) 2003-10-16 2004-10-13 Policy-based network security management

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/688,051 US7237267B2 (en) 2003-10-16 2003-10-16 Policy-based network security management
US10/688,051 2003-10-16

Publications (3)

Publication Number Publication Date
WO2005038598A2 WO2005038598A2 (en) 2005-04-28
WO2005038598A3 WO2005038598A3 (en) 2006-03-02
WO2005038598B1 true WO2005038598B1 (en) 2006-04-27

Family

ID=34465565

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/033828 WO2005038598A2 (en) 2003-10-16 2004-10-13 Policy-based network security management

Country Status (6)

Country Link
US (1) US7237267B2 (en)
EP (1) EP1678615A4 (en)
CN (1) CN100421086C (en)
AU (1) AU2004282937B2 (en)
CA (1) CA2541934A1 (en)
WO (1) WO2005038598A2 (en)

Families Citing this family (282)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7606898B1 (en) * 2000-10-24 2009-10-20 Microsoft Corporation System and method for distributed management of shared computers
US7113900B1 (en) * 2000-10-24 2006-09-26 Microsoft Corporation System and method for logical modeling of distributed computer systems
US6886038B1 (en) * 2000-10-24 2005-04-26 Microsoft Corporation System and method for restricting data transfers and managing software components of distributed computers
US7673335B1 (en) 2004-07-01 2010-03-02 Novell, Inc. Computer-implemented method and system for security event correlation
US6658091B1 (en) 2002-02-01 2003-12-02 @Security Broadband Corp. LIfestyle multimedia security system
US8661498B2 (en) 2002-09-18 2014-02-25 Symantec Corporation Secure and scalable detection of preselected data embedded in electronically transmitted messages
US8041719B2 (en) 2003-05-06 2011-10-18 Symantec Corporation Personal computing device-based mechanism to detect preselected data
US7472114B1 (en) * 2002-09-18 2008-12-30 Symantec Corporation Method and apparatus to define the scope of a search for information from a tabular data source
US7673344B1 (en) 2002-09-18 2010-03-02 Symantec Corporation Mechanism to search information content for preselected data
US7886359B2 (en) * 2002-09-18 2011-02-08 Symantec Corporation Method and apparatus to report policy violations in messages
US8225371B2 (en) 2002-09-18 2012-07-17 Symantec Corporation Method and apparatus for creating an information security policy based on a pre-configured template
US7437760B2 (en) * 2002-10-10 2008-10-14 International Business Machines Corporation Antiviral network system
JP4400059B2 (en) * 2002-10-17 2010-01-20 株式会社日立製作所 Policy setting support tool
US7401360B2 (en) * 2002-12-03 2008-07-15 Tekelec Methods and systems for identifying and mitigating telecommunications network security threats
US7890543B2 (en) * 2003-03-06 2011-02-15 Microsoft Corporation Architecture for distributed computing system and automated design, deployment, and management of distributed applications
US8122106B2 (en) 2003-03-06 2012-02-21 Microsoft Corporation Integrating design, deployment, and management phases for systems
US7689676B2 (en) 2003-03-06 2010-03-30 Microsoft Corporation Model-based policy application
US7567504B2 (en) * 2003-06-30 2009-07-28 Microsoft Corporation Network load balancing with traffic routing
US7613822B2 (en) * 2003-06-30 2009-11-03 Microsoft Corporation Network load balancing with session information
US7512969B2 (en) * 2003-11-21 2009-03-31 Time Warner Cable, A Division Of Time Warner Entertainment Company, L.P. System and method for detecting and reporting cable network devices with duplicate media access control addresses
US7430598B2 (en) * 2003-11-25 2008-09-30 Microsoft Corporation Systems and methods for health monitor alert management for networked systems
US7613804B2 (en) * 2003-11-25 2009-11-03 Microsoft Corporation Systems and methods for state management of networked systems
US7590726B2 (en) * 2003-11-25 2009-09-15 Microsoft Corporation Systems and methods for unifying and/or utilizing state information for managing networked systems
US7533407B2 (en) 2003-12-16 2009-05-12 Microsoft Corporation System and methods for providing network quarantine
US8561154B2 (en) 2003-12-22 2013-10-15 International Business Machines Corporation Method for providing network perimeter security assessment
US20050198242A1 (en) * 2004-01-05 2005-09-08 Viascope Int. System and method for detection/interception of IP collision
US20050182834A1 (en) * 2004-01-20 2005-08-18 Black Chuck A. Network and network device health monitoring
US7778422B2 (en) 2004-02-27 2010-08-17 Microsoft Corporation Security associations for devices
US7607021B2 (en) 2004-03-09 2009-10-20 Cisco Technology, Inc. Isolation approach for network users associated with elevated risk
US11368327B2 (en) 2008-08-11 2022-06-21 Icontrol Networks, Inc. Integrated cloud system for premises automation
US9609003B1 (en) 2007-06-12 2017-03-28 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US8963713B2 (en) 2005-03-16 2015-02-24 Icontrol Networks, Inc. Integrated security network with security alarm signaling system
US8988221B2 (en) * 2005-03-16 2015-03-24 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11201755B2 (en) 2004-03-16 2021-12-14 Icontrol Networks, Inc. Premises system management using status signal
US10721087B2 (en) 2005-03-16 2020-07-21 Icontrol Networks, Inc. Method for networked touchscreen with integrated interfaces
US10237237B2 (en) 2007-06-12 2019-03-19 Icontrol Networks, Inc. Communication protocols in integrated systems
US11113950B2 (en) 2005-03-16 2021-09-07 Icontrol Networks, Inc. Gateway integrated with premises security system
US7711796B2 (en) 2006-06-12 2010-05-04 Icontrol Networks, Inc. Gateway registry methods and systems
US11159484B2 (en) 2004-03-16 2021-10-26 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US10382452B1 (en) 2007-06-12 2019-08-13 Icontrol Networks, Inc. Communication protocols in integrated systems
US10313303B2 (en) 2007-06-12 2019-06-04 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US9531593B2 (en) 2007-06-12 2016-12-27 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US8996665B2 (en) 2005-03-16 2015-03-31 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US8473619B2 (en) 2005-03-16 2013-06-25 Icontrol Networks, Inc. Security network integrated with premise security system
US20160065414A1 (en) 2013-06-27 2016-03-03 Ken Sundermeyer Control system user interface
US10375253B2 (en) 2008-08-25 2019-08-06 Icontrol Networks, Inc. Security system with networked touchscreen and gateway
US10444964B2 (en) 2007-06-12 2019-10-15 Icontrol Networks, Inc. Control system user interface
US11677577B2 (en) 2004-03-16 2023-06-13 Icontrol Networks, Inc. Premises system management using status signal
US9172553B2 (en) 2005-03-16 2015-10-27 Icontrol Networks, Inc. Security system with networked touchscreen and gateway
US10200504B2 (en) 2007-06-12 2019-02-05 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US11343380B2 (en) 2004-03-16 2022-05-24 Icontrol Networks, Inc. Premises system automation
US20050216302A1 (en) 2004-03-16 2005-09-29 Icontrol Networks, Inc. Business method for premises management
US11811845B2 (en) 2004-03-16 2023-11-07 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US9191228B2 (en) 2005-03-16 2015-11-17 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US11368429B2 (en) 2004-03-16 2022-06-21 Icontrol Networks, Inc. Premises management configuration and control
US11582065B2 (en) 2007-06-12 2023-02-14 Icontrol Networks, Inc. Systems and methods for device communication
US8612591B2 (en) 2005-03-16 2013-12-17 Icontrol Networks, Inc. Security system with networked touchscreen
US9141276B2 (en) 2005-03-16 2015-09-22 Icontrol Networks, Inc. Integrated interface for mobile device
US11916870B2 (en) 2004-03-16 2024-02-27 Icontrol Networks, Inc. Gateway registry methods and systems
US11277465B2 (en) 2004-03-16 2022-03-15 Icontrol Networks, Inc. Generating risk profile using data of home monitoring and security system
US10522026B2 (en) 2008-08-11 2019-12-31 Icontrol Networks, Inc. Automation system user interface with three-dimensional display
US9729342B2 (en) 2010-12-20 2017-08-08 Icontrol Networks, Inc. Defining and implementing sensor triggered response rules
US20090077623A1 (en) 2005-03-16 2009-03-19 Marc Baum Security Network Integrating Security System and Network Devices
US10339791B2 (en) 2007-06-12 2019-07-02 Icontrol Networks, Inc. Security network integrated with premise security system
US11489812B2 (en) 2004-03-16 2022-11-01 Icontrol Networks, Inc. Forming a security network including integrated security system components and network devices
US11316958B2 (en) 2008-08-11 2022-04-26 Icontrol Networks, Inc. Virtual device systems and methods
US11244545B2 (en) 2004-03-16 2022-02-08 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US8635350B2 (en) 2006-06-12 2014-01-21 Icontrol Networks, Inc. IP device discovery systems and methods
US10142392B2 (en) 2007-01-24 2018-11-27 Icontrol Networks, Inc. Methods and systems for improved system performance
US10156959B2 (en) 2005-03-16 2018-12-18 Icontrol Networks, Inc. Cross-client sensor user interface in an integrated security network
US7657623B2 (en) * 2004-03-24 2010-02-02 Nortel Networks Limited Method and apparatus for collecting management information on a communication network
US7996024B2 (en) 2004-04-14 2011-08-09 Tekelec Method for preventing the delivery of short message service message spam
US20050267954A1 (en) * 2004-04-27 2005-12-01 Microsoft Corporation System and methods for providing network quarantine
US20050246529A1 (en) * 2004-04-30 2005-11-03 Microsoft Corporation Isolated persistent identity storage for authentication of computing devies
US20060080738A1 (en) * 2004-10-08 2006-04-13 Bezilla Daniel B Automatic criticality assessment
US20060085850A1 (en) * 2004-10-14 2006-04-20 Microsoft Corporation System and methods for providing network quarantine using IPsec
CA2594020C (en) * 2004-12-22 2014-12-09 Wake Forest University Method, systems, and computer program products for implementing function-parallel network firewall
US20060150238A1 (en) * 2005-01-04 2006-07-06 Symbol Technologies, Inc. Method and apparatus of adaptive network policy management for wireless mobile computers
US7979889B2 (en) * 2005-01-07 2011-07-12 Cisco Technology, Inc. Methods and apparatus providing security to computer systems and networks
US9306809B2 (en) 2007-06-12 2016-04-05 Icontrol Networks, Inc. Security system with networked touchscreen
US8713132B2 (en) 2005-03-16 2014-04-29 Icontrol Networks, Inc. Device for data routing in networks
US20120324566A1 (en) 2005-03-16 2012-12-20 Marc Baum Takeover Processes In Security Network Integrated With Premise Security System
US20110128378A1 (en) 2005-03-16 2011-06-02 Reza Raji Modular Electronic Display Platform
US11700142B2 (en) 2005-03-16 2023-07-11 Icontrol Networks, Inc. Security network integrating security system and network devices
US8819178B2 (en) 2005-03-16 2014-08-26 Icontrol Networks, Inc. Controlling data routing in integrated security systems
US9059863B2 (en) 2005-03-16 2015-06-16 Icontrol Networks, Inc. Method for data routing in networks
US20170180198A1 (en) 2008-08-11 2017-06-22 Marc Baum Forming a security network including integrated security system components
US9450776B2 (en) 2005-03-16 2016-09-20 Icontrol Networks, Inc. Forming a security network including integrated security system components
US11615697B2 (en) 2005-03-16 2023-03-28 Icontrol Networks, Inc. Premise management systems and methods
US8825871B2 (en) 2005-03-16 2014-09-02 Icontrol Networks, Inc. Controlling data routing among networks
US10999254B2 (en) 2005-03-16 2021-05-04 Icontrol Networks, Inc. System for data routing in networks
US11496568B2 (en) 2005-03-16 2022-11-08 Icontrol Networks, Inc. Security system with networked touchscreen
WO2006105093A2 (en) * 2005-03-28 2006-10-05 Wake Forest University Methods, systems, and computer program products for network firewall policy optimization
US9547780B2 (en) * 2005-03-28 2017-01-17 Absolute Software Corporation Method for determining identification of an electronic device
US8046834B2 (en) * 2005-03-30 2011-10-25 Alcatel Lucent Method of polymorphic detection
US8489728B2 (en) * 2005-04-15 2013-07-16 Microsoft Corporation Model-based system monitoring
US7802144B2 (en) * 2005-04-15 2010-09-21 Microsoft Corporation Model-based system monitoring
US7774849B2 (en) * 2005-04-15 2010-08-10 Tekelec Methods, systems, and computer program products for detecting and mitigating denial of service attacks in a telecommunications signaling network
US7797147B2 (en) * 2005-04-15 2010-09-14 Microsoft Corporation Model-based system monitoring
KR100694108B1 (en) * 2005-05-03 2007-03-12 삼성전자주식회사 Method and apparatus for securing information in a wireless network printing system
US7788723B2 (en) * 2005-05-17 2010-08-31 Computer Associates Think, Inc. Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning
US8549513B2 (en) 2005-06-29 2013-10-01 Microsoft Corporation Model-based virtual system provisioning
US7926099B1 (en) * 2005-07-15 2011-04-12 Novell, Inc. Computer-implemented method and system for security event transport using a message bus
US7526677B2 (en) 2005-10-31 2009-04-28 Microsoft Corporation Fragility handling
US7941309B2 (en) 2005-11-02 2011-05-10 Microsoft Corporation Modeling IT operations/policies
US8082586B2 (en) 2005-11-22 2011-12-20 International Business Machines Corporation Snoop echo response extractor
US7827545B2 (en) * 2005-12-15 2010-11-02 Microsoft Corporation Dynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy
US8495743B2 (en) * 2005-12-16 2013-07-23 Cisco Technology, Inc. Methods and apparatus providing automatic signature generation and enforcement
US7882560B2 (en) * 2005-12-16 2011-02-01 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US8413245B2 (en) * 2005-12-16 2013-04-02 Cisco Technology, Inc. Methods and apparatus providing computer and network security for polymorphic attacks
US9286469B2 (en) 2005-12-16 2016-03-15 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US8510596B1 (en) * 2006-02-09 2013-08-13 Virsec Systems, Inc. System and methods for run time detection and correction of memory corruption
US20070198525A1 (en) * 2006-02-13 2007-08-23 Microsoft Corporation Computer system with update-based quarantine
US8024804B2 (en) * 2006-03-08 2011-09-20 Imperva, Inc. Correlation engine for detecting network attacks and detection method
AU2007227214A1 (en) * 2006-03-20 2007-09-27 Absolute Software Corporation Method for determining identification of an electronic device
US7793096B2 (en) * 2006-03-31 2010-09-07 Microsoft Corporation Network access protection
US8151322B2 (en) 2006-05-16 2012-04-03 A10 Networks, Inc. Systems and methods for user access authentication based on network access point
US10079839B1 (en) 2007-06-12 2018-09-18 Icontrol Networks, Inc. Activation of gateway device
US8086732B1 (en) * 2006-06-30 2011-12-27 Cisco Technology, Inc. Method and apparatus for rate limiting client requests
US9715675B2 (en) 2006-08-10 2017-07-25 Oracle International Corporation Event-driven customizable automated workflows for incident remediation
US8424061B2 (en) * 2006-09-12 2013-04-16 International Business Machines Corporation Method, system and program product for authenticating a user seeking to perform an electronic service request
US7832008B1 (en) * 2006-10-11 2010-11-09 Cisco Technology, Inc. Protection of computer resources
US7716378B2 (en) 2006-10-17 2010-05-11 A10 Networks, Inc. System and method to associate a private user identity with a public user identity
US8312507B2 (en) 2006-10-17 2012-11-13 A10 Networks, Inc. System and method to apply network traffic policy to an application session
US7647635B2 (en) * 2006-11-02 2010-01-12 A10 Networks, Inc. System and method to resolve an identity interactively
US7908659B2 (en) * 2006-11-10 2011-03-15 Microsoft Corporation Extensible framework for system security state reporting and remediation
US7984452B2 (en) * 2006-11-10 2011-07-19 Cptn Holdings Llc Event source management using a metadata-driven framework
JP2008158686A (en) * 2006-12-21 2008-07-10 Toshiba Corp Program verification device and method, signature system based on program verification
US11706279B2 (en) 2007-01-24 2023-07-18 Icontrol Networks, Inc. Methods and systems for data communication
US20080201780A1 (en) * 2007-02-20 2008-08-21 Microsoft Corporation Risk-Based Vulnerability Assessment, Remediation and Network Access Protection
US7633385B2 (en) 2007-02-28 2009-12-15 Ucontrol, Inc. Method and system for communicating with and controlling an alarm system from a remote server
US8310923B1 (en) 2007-03-27 2012-11-13 Amazon Technologies, Inc. Monitoring a network site to detect adverse network conditions
US8451986B2 (en) 2007-04-23 2013-05-28 Icontrol Networks, Inc. Method and system for automatically providing alternate network access for telecommunications
US11601810B2 (en) 2007-06-12 2023-03-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US11218878B2 (en) 2007-06-12 2022-01-04 Icontrol Networks, Inc. Communication protocols in integrated systems
US10498830B2 (en) 2007-06-12 2019-12-03 Icontrol Networks, Inc. Wi-Fi-to-serial encapsulation in systems
US10389736B2 (en) 2007-06-12 2019-08-20 Icontrol Networks, Inc. Communication protocols in integrated systems
US10616075B2 (en) 2007-06-12 2020-04-07 Icontrol Networks, Inc. Communication protocols in integrated systems
US10666523B2 (en) 2007-06-12 2020-05-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US10423309B2 (en) 2007-06-12 2019-09-24 Icontrol Networks, Inc. Device integration framework
US11089122B2 (en) 2007-06-12 2021-08-10 Icontrol Networks, Inc. Controlling data routing among networks
US11646907B2 (en) 2007-06-12 2023-05-09 Icontrol Networks, Inc. Communication protocols in integrated systems
US11316753B2 (en) 2007-06-12 2022-04-26 Icontrol Networks, Inc. Communication protocols in integrated systems
US11237714B2 (en) 2007-06-12 2022-02-01 Control Networks, Inc. Control system user interface
US11423756B2 (en) 2007-06-12 2022-08-23 Icontrol Networks, Inc. Communication protocols in integrated systems
US11212192B2 (en) 2007-06-12 2021-12-28 Icontrol Networks, Inc. Communication protocols in integrated systems
US10523689B2 (en) 2007-06-12 2019-12-31 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US10051078B2 (en) 2007-06-12 2018-08-14 Icontrol Networks, Inc. WiFi-to-serial encapsulation in systems
CN101094236B (en) 2007-07-20 2011-08-10 华为技术有限公司 Method for processing message in address resolution protocol, communication system, and forwarding planar process portion
US10223903B2 (en) 2010-09-28 2019-03-05 Icontrol Networks, Inc. Integrated security system with parallel processing architecture
US11831462B2 (en) 2007-08-24 2023-11-28 Icontrol Networks, Inc. Controlling data routing in premises management systems
US9225684B2 (en) * 2007-10-29 2015-12-29 Microsoft Technology Licensing, Llc Controlling network access
US8959624B2 (en) * 2007-10-31 2015-02-17 Bank Of America Corporation Executable download tracking system
US11916928B2 (en) 2008-01-24 2024-02-27 Icontrol Networks, Inc. Communication protocols over internet protocol (IP) networks
US9516460B2 (en) * 2008-03-28 2016-12-06 Securitypoint Holdings Llc Systems and methods for security checkpoint condition information and sharing
US7996374B1 (en) 2008-03-28 2011-08-09 Symantec Corporation Method and apparatus for automatically correlating related incidents of policy violations
US8185488B2 (en) 2008-04-17 2012-05-22 Emc Corporation System and method for correlating events in a pluggable correlation architecture
US8086905B2 (en) * 2008-05-27 2011-12-27 Hitachi, Ltd. Method of collecting information in system network
US20170185278A1 (en) 2008-08-11 2017-06-29 Icontrol Networks, Inc. Automation system user interface
US8312033B1 (en) 2008-06-26 2012-11-13 Experian Marketing Solutions, Inc. Systems and methods for providing an integrated identifier
US11258625B2 (en) 2008-08-11 2022-02-22 Icontrol Networks, Inc. Mobile premises automation platform
US11729255B2 (en) 2008-08-11 2023-08-15 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US10530839B2 (en) 2008-08-11 2020-01-07 Icontrol Networks, Inc. Integrated cloud system with lightweight gateway for premises automation
US11758026B2 (en) 2008-08-11 2023-09-12 Icontrol Networks, Inc. Virtual device systems and methods
US11792036B2 (en) 2008-08-11 2023-10-17 Icontrol Networks, Inc. Mobile premises automation platform
US8612751B1 (en) * 2008-08-20 2013-12-17 Cisco Technology, Inc. Method and apparatus for entitled data transfer over the public internet
US8023504B2 (en) * 2008-08-27 2011-09-20 Cisco Technology, Inc. Integrating security server policies with optimized routing control
US8826443B1 (en) 2008-09-18 2014-09-02 Symantec Corporation Selective removal of protected content from web requests sent to an interactive website
US20100073160A1 (en) * 2008-09-25 2010-03-25 Microsoft Corporation Alerting users using a multiple state status icon
JP5237034B2 (en) 2008-09-30 2013-07-17 株式会社日立製作所 Root cause analysis method, device, and program for IT devices that do not acquire event information.
US8245141B1 (en) 2008-10-29 2012-08-14 Cisco Technology, Inc. Hierarchical collaboration policies in a shared workspace environment
EP2354948A4 (en) * 2008-10-30 2012-04-04 Ibm Device for supporting detection of failure event, method for supporting detection of failure event, and computer program
US9628440B2 (en) 2008-11-12 2017-04-18 Icontrol Networks, Inc. Takeover processes in security network integrated with premise security system
US8613040B2 (en) * 2008-12-22 2013-12-17 Symantec Corporation Adaptive data loss prevention policies
US10057285B2 (en) * 2009-01-30 2018-08-21 Oracle International Corporation System and method for auditing governance, risk, and compliance using a pluggable correlation architecture
US8935752B1 (en) 2009-03-23 2015-01-13 Symantec Corporation System and method for identity consolidation
US8638211B2 (en) 2009-04-30 2014-01-28 Icontrol Networks, Inc. Configurable controller and interface for home SMA, phone and multimedia
US8694624B2 (en) * 2009-05-19 2014-04-08 Symbol Technologies, Inc. Systems and methods for concurrent wireless local area network access and sensing
US8495725B2 (en) * 2009-08-28 2013-07-23 Great Wall Systems Methods, systems, and computer readable media for adaptive packet filtering
US9742778B2 (en) 2009-09-09 2017-08-22 International Business Machines Corporation Differential security policies in email systems
US8793789B2 (en) 2010-07-22 2014-07-29 Bank Of America Corporation Insider threat correlation tool
US9038187B2 (en) * 2010-01-26 2015-05-19 Bank Of America Corporation Insider threat correlation tool
US8782209B2 (en) * 2010-01-26 2014-07-15 Bank Of America Corporation Insider threat correlation tool
US8800034B2 (en) 2010-01-26 2014-08-05 Bank Of America Corporation Insider threat correlation tool
US8782794B2 (en) 2010-04-16 2014-07-15 Bank Of America Corporation Detecting secure or encrypted tunneling in a computer network
US8544100B2 (en) 2010-04-16 2013-09-24 Bank Of America Corporation Detecting secure or encrypted tunneling in a computer network
WO2011137458A1 (en) 2010-04-30 2011-11-03 Icontrol Networks, Inc. Power and data solution for remote low-power devices
AU2011250886A1 (en) 2010-05-10 2013-01-10 Icontrol Networks, Inc Control system user interface
CN103039037B (en) * 2010-06-21 2016-08-24 德国电信股份公司 For effectively managing the method and system of the connection between communication network and this communication network and customer rs premise equipment
US8931058B2 (en) 2010-07-01 2015-01-06 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
US8744956B1 (en) 2010-07-01 2014-06-03 Experian Information Solutions, Inc. Systems and methods for permission arbitrated transaction services
US8836467B1 (en) 2010-09-28 2014-09-16 Icontrol Networks, Inc. Method, system and apparatus for automated reporting of account and sensor zone information to a central station
US9147042B1 (en) 2010-11-22 2015-09-29 Experian Information Solutions, Inc. Systems and methods for data verification
US11750414B2 (en) 2010-12-16 2023-09-05 Icontrol Networks, Inc. Bidirectional security sensor communication for a premises security system
US9147337B2 (en) 2010-12-17 2015-09-29 Icontrol Networks, Inc. Method and system for logging security event data
JP5610530B2 (en) * 2010-12-27 2014-10-22 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Resource protection processing program, resource protection processing device, and resource protection processing method
US9607336B1 (en) 2011-06-16 2017-03-28 Consumerinfo.Com, Inc. Providing credit inquiry alerts
US9253197B2 (en) * 2011-08-15 2016-02-02 Bank Of America Corporation Method and apparatus for token-based real-time risk updating
US9055053B2 (en) 2011-08-15 2015-06-09 Bank Of America Corporation Method and apparatus for token-based combining of risk ratings
US9106691B1 (en) 2011-09-16 2015-08-11 Consumerinfo.Com, Inc. Systems and methods of identity protection and management
CN103188090B (en) * 2011-12-28 2016-05-25 中国移动通信集团江苏有限公司 A kind of recognition methods and device of transport network rubbish time slot
WO2013115807A1 (en) * 2012-01-31 2013-08-08 Hewlett-Packard Development Company, L.P. Determination of spoofing of a unique machine identifier
US9537879B2 (en) * 2012-06-21 2017-01-03 Avocent Huntsville, Llc Cyber security monitoring system and method for data center components
US9565213B2 (en) 2012-10-22 2017-02-07 Centripetal Networks, Inc. Methods and systems for protecting a secured network
US9137205B2 (en) 2012-10-22 2015-09-15 Centripetal Networks, Inc. Methods and systems for protecting a secured network
US20140143010A1 (en) * 2012-11-16 2014-05-22 SPF, Inc. System and Method for Assessing Interaction Risks Potentially Associated with Transactions Between a Client and a Provider
US10366360B2 (en) 2012-11-16 2019-07-30 SPF, Inc. System and method for identifying potential future interaction risks between a client and a provider
US8856894B1 (en) 2012-11-28 2014-10-07 Consumerinfo.Com, Inc. Always on authentication
EP2929666B1 (en) * 2012-12-06 2021-03-31 The Boeing Company Context aware network security monitoring for threat detection
CN103905265B (en) * 2012-12-27 2018-03-23 中国移动通信集团公司 The detection method and device of newly added equipment in a kind of network
US9203806B2 (en) 2013-01-11 2015-12-01 Centripetal Networks, Inc. Rule swapping in a packet network
US9124552B2 (en) 2013-03-12 2015-09-01 Centripetal Networks, Inc. Filtering network data transfers
US9928975B1 (en) 2013-03-14 2018-03-27 Icontrol Networks, Inc. Three-way switch
US9287727B1 (en) 2013-03-15 2016-03-15 Icontrol Networks, Inc. Temporal voltage adaptive lithium battery charger
US10664936B2 (en) 2013-03-15 2020-05-26 Csidentity Corporation Authentication systems and methods for on-demand products
US9094445B2 (en) 2013-03-15 2015-07-28 Centripetal Networks, Inc. Protecting networks from cyber attacks and overloading
US9633322B1 (en) 2013-03-15 2017-04-25 Consumerinfo.Com, Inc. Adjustment of knowledge-based authentication
US9867143B1 (en) 2013-03-15 2018-01-09 Icontrol Networks, Inc. Adaptive Power Modulation
US9721147B1 (en) 2013-05-23 2017-08-01 Consumerinfo.Com, Inc. Digital identity
US20140359694A1 (en) * 2013-06-03 2014-12-04 eSentire, Inc. System and method for computer system security
US9122853B2 (en) 2013-06-24 2015-09-01 A10 Networks, Inc. Location determination for user authentication
WO2015021469A2 (en) 2013-08-09 2015-02-12 Icontrol Networks Canada Ulc System, method and apparatus for remote monitoring
CA2923231C (en) 2013-09-12 2020-06-02 Virsec Systems, Inc. Automated runtime detection of malware
US20150089566A1 (en) * 2013-09-24 2015-03-26 Radware, Ltd. Escalation security method for use in software defined networks
KR101401168B1 (en) * 2013-09-27 2014-05-29 플러스기술주식회사 Device and method for network security using ip address
US11165770B1 (en) 2013-12-06 2021-11-02 A10 Networks, Inc. Biometric verification of a human internet user
CN103745092B (en) * 2013-12-24 2017-01-11 新浪网技术(中国)有限公司 Evaluation method and evaluation system for utilization ratio of server
US11405463B2 (en) 2014-03-03 2022-08-02 Icontrol Networks, Inc. Media content management
US11146637B2 (en) 2014-03-03 2021-10-12 Icontrol Networks, Inc. Media content management
US10373240B1 (en) 2014-04-25 2019-08-06 Csidentity Corporation Systems, methods and computer-program products for eligibility verification
WO2015200511A1 (en) 2014-06-24 2015-12-30 Virsec Systems, Inc. System and methods for automated detection of input and output validation and resource management vulnerability
AU2015279920B2 (en) 2014-06-24 2018-03-29 Virsec Systems, Inc. Automated root cause analysis of single or N-TIERED applications
US9838431B2 (en) 2014-11-28 2017-12-05 International Business Machines Corporation Context-based cloud security assurance system
US9264370B1 (en) 2015-02-10 2016-02-16 Centripetal Networks, Inc. Correlating packets in communications networks
US9866576B2 (en) * 2015-04-17 2018-01-09 Centripetal Networks, Inc. Rule-based network-threat detection
EP3104563B1 (en) 2015-06-10 2019-10-16 Nokia Solutions and Networks GmbH & Co. KG Sdn security
US9762616B2 (en) 2015-08-08 2017-09-12 International Business Machines Corporation Application-based security rights in cloud environments
US9917856B2 (en) 2015-12-23 2018-03-13 Centripetal Networks, Inc. Rule-based network-threat detection for encrypted communications
US11729144B2 (en) 2016-01-04 2023-08-15 Centripetal Networks, Llc Efficient packet capture for cyber threat analysis
US10187354B2 (en) * 2016-01-22 2019-01-22 Cisco Technology, Inc. DHCP client lease time based threat detection for authorised users
JP6949951B2 (en) 2016-06-16 2021-10-13 ヴァーセック システムズ,インコーポレイテッド Systems and methods for repairing memory corruption in computer applications
WO2018023338A1 (en) 2016-08-01 2018-02-08 华为技术有限公司 Network-function management method and network-function management device
US10122750B2 (en) 2017-01-30 2018-11-06 XM Cyber Ltd Setting-up penetration testing campaigns
US10068095B1 (en) * 2017-05-15 2018-09-04 XM Cyber Ltd Systems and methods for selecting a termination rule for a penetration testing campaign
US10367846B2 (en) 2017-11-15 2019-07-30 Xm Cyber Ltd. Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
EP3560170A4 (en) * 2017-01-30 2020-07-29 XM Cyber Ltd. Penetration testing of a networked system
US10257220B2 (en) 2017-01-30 2019-04-09 Xm Cyber Ltd. Verifying success of compromising a network node during penetration testing of a networked system
US10581802B2 (en) 2017-03-16 2020-03-03 Keysight Technologies Singapore (Sales) Pte. Ltd. Methods, systems, and computer readable media for advertising network security capabilities
US10523512B2 (en) * 2017-03-24 2019-12-31 Cisco Technology, Inc. Network agent for generating platform specific network policies
US10574684B2 (en) 2017-07-09 2020-02-25 Xm Cyber Ltd. Locally detecting phishing weakness
US10503899B2 (en) 2017-07-10 2019-12-10 Centripetal Networks, Inc. Cyberanalysis workflow acceleration
US10284526B2 (en) 2017-07-24 2019-05-07 Centripetal Networks, Inc. Efficient SSL/TLS proxy
US11233777B2 (en) 2017-07-24 2022-01-25 Centripetal Networks, Inc. Efficient SSL/TLS proxy
US10412112B2 (en) 2017-08-31 2019-09-10 Xm Cyber Ltd. Time-tagged pre-defined scenarios for penetration testing
CN109474561B (en) * 2017-09-07 2021-01-08 中国电信股份有限公司 Network attack degree determination method and device and security protection system
US10447721B2 (en) 2017-09-13 2019-10-15 Xm Cyber Ltd. Systems and methods for using multiple lateral movement strategies in penetration testing
US11075897B2 (en) 2017-10-20 2021-07-27 Vertiv It Systems, Inc. System and method for communicating with a service processor
CN107864164B (en) * 2017-12-26 2020-11-06 北京中船信息科技有限公司 Linkage alarm device based on IP embezzlement and MAC address tampering
US10440044B1 (en) 2018-04-08 2019-10-08 Xm Cyber Ltd. Identifying communicating network nodes in the same local network
US10911234B2 (en) 2018-06-22 2021-02-02 Experian Information Solutions, Inc. System and method for a token gateway environment
US10862866B2 (en) 2018-06-26 2020-12-08 Oracle International Corporation Methods, systems, and computer readable media for multiple transaction capabilities application part (TCAP) operation code (opcode) screening
US10333898B1 (en) 2018-07-09 2019-06-25 Centripetal Networks, Inc. Methods and systems for efficient network protection
CN109190833A (en) * 2018-09-12 2019-01-11 泰豪科技股份有限公司 Power station health control method, apparatus and system
US10382473B1 (en) 2018-09-12 2019-08-13 Xm Cyber Ltd. Systems and methods for determining optimal remediation recommendations in penetration testing
US10469521B1 (en) 2018-11-04 2019-11-05 Xm Cyber Ltd. Using information about exportable data in penetration testing
WO2020121078A1 (en) 2018-12-13 2020-06-18 Xm Cyber Ltd. Systems and methods for dynamic removal of agents from nodes of penetration testing systems
WO2020161532A1 (en) 2019-02-06 2020-08-13 Xm Cyber Ltd. Taking privilege escalation into account in penetration testing campaigns
US11283827B2 (en) 2019-02-28 2022-03-22 Xm Cyber Ltd. Lateral movement strategy during penetration testing of a networked system
US11277442B2 (en) * 2019-04-05 2022-03-15 Cisco Technology, Inc. Verifying the trust-worthiness of ARP senders and receivers using attestation-based methods
US11206281B2 (en) 2019-05-08 2021-12-21 Xm Cyber Ltd. Validating the use of user credentials in a penetration testing campaign
US10637883B1 (en) 2019-07-04 2020-04-28 Xm Cyber Ltd. Systems and methods for determining optimal remediation recommendations in penetration testing
US10880326B1 (en) 2019-08-01 2020-12-29 Xm Cyber Ltd. Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic
US11941065B1 (en) 2019-09-13 2024-03-26 Experian Information Solutions, Inc. Single identifier platform for storing entity data
US11533329B2 (en) 2019-09-27 2022-12-20 Keysight Technologies, Inc. Methods, systems and computer readable media for threat simulation and threat mitigation recommendations
US11005878B1 (en) 2019-11-07 2021-05-11 Xm Cyber Ltd. Cooperation between reconnaissance agents in penetration testing campaigns
US11444961B2 (en) * 2019-12-20 2022-09-13 Intel Corporation Active attack detection in autonomous vehicle networks
US11575700B2 (en) 2020-01-27 2023-02-07 Xm Cyber Ltd. Systems and methods for displaying an attack vector available to an attacker of a networked system
US11582256B2 (en) 2020-04-06 2023-02-14 Xm Cyber Ltd. Determining multiple ways for compromising a network node in a penetration testing campaign
DE102021109775A1 (en) * 2020-06-30 2021-12-30 Hewlett Packard Enterprise Development Lp ADAPTIVE TIME WINDOW-BASED DEDUPLICATION OF LOG MESSAGES
US11362996B2 (en) 2020-10-27 2022-06-14 Centripetal Networks, Inc. Methods and systems for efficient adaptive logging of cyber threat incidents
CN112763936B (en) * 2021-02-04 2021-11-26 厦门市智联信通物联网科技有限公司 Intelligent fault processing method and system
US11159546B1 (en) 2021-04-20 2021-10-26 Centripetal Networks, Inc. Methods and systems for efficient threat context-aware packet filtering for network protection

Family Cites Families (74)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5787161A (en) 1995-11-13 1998-07-28 Bell Communications Research, Inc. Network designer for communication networks
US5933645A (en) 1996-03-19 1999-08-03 Oracle Corporation Non-invasive extensibility of software applications
US6243667B1 (en) 1996-05-28 2001-06-05 Cisco Systems, Inc. Network flow switching and flow data export
US6119231A (en) 1997-10-31 2000-09-12 Cisco Technologies, Inc. Data scanning network security technique
US6151395A (en) 1997-12-04 2000-11-21 Cisco Technology, Inc. System and method for regenerating secret keys in diffie-hellman communication sessions
US6339595B1 (en) 1997-12-23 2002-01-15 Cisco Technology, Inc. Peer-model support for virtual private networks with potentially overlapping addresses
US6131163A (en) 1998-02-17 2000-10-10 Cisco Technology, Inc. Network gateway mechanism having a protocol stack proxy
US6484261B1 (en) * 1998-02-17 2002-11-19 Cisco Technology, Inc. Graphical network security policy management
US6134559A (en) 1998-04-27 2000-10-17 Oracle Corporation Uniform object model having methods and additional features for integrating objects defined by different foreign object type systems into a single type system
US6965999B2 (en) * 1998-05-01 2005-11-15 Microsoft Corporation Intelligent trust management method and system
US6049834A (en) 1998-05-08 2000-04-11 Cisco Technology, Inc. Layer 3 switch unicast protocol
US6560204B1 (en) 1998-05-13 2003-05-06 Telcordia Technologies, Inc. Method of estimating call level traffic intensity based on channel link measurements
US6584124B1 (en) 1998-06-30 2003-06-24 Cisco Technology, Inc. Method and system for accessing ports of a fixed-size cell switch
US6282546B1 (en) 1998-06-30 2001-08-28 Cisco Technology, Inc. System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment
US6658002B1 (en) 1998-06-30 2003-12-02 Cisco Technology, Inc. Logical operation unit for packet processing
US6324656B1 (en) 1998-06-30 2001-11-27 Cisco Technology, Inc. System and method for rules-driven multi-phase network vulnerability assessment
US6038322A (en) 1998-10-20 2000-03-14 Cisco Technology, Inc. Group key distribution
US6381646B2 (en) 1998-11-03 2002-04-30 Cisco Technology, Inc. Multiple network connections from a single PPP link with partial network address translation
US6490289B1 (en) 1998-11-03 2002-12-03 Cisco Technology, Inc. Multiple network connections from a single PPP link with network address translation
US6539431B1 (en) 1998-11-12 2003-03-25 Cisco Technology, Inc. Support IP pool-based configuration
US6427174B1 (en) 1998-11-12 2002-07-30 Cisco Technology, Inc. Dynamic IP addressing and quality of service assurance
US6731627B1 (en) 1998-11-17 2004-05-04 Cisco Technology, Inc. Virtual loop carrier system
US6530024B1 (en) * 1998-11-20 2003-03-04 Centrax Corporation Adaptive feedback security system and method
US6347339B1 (en) 1998-12-01 2002-02-12 Cisco Technology, Inc. Detecting an active network node using a login attempt
US6396833B1 (en) 1998-12-02 2002-05-28 Cisco Technology, Inc. Per user and network routing tables
US6327618B1 (en) 1998-12-03 2001-12-04 Cisco Technology, Inc. Recognizing and processing conflicts in network management policies
US6301613B1 (en) 1998-12-03 2001-10-09 Cisco Technology, Inc. Verifying that a network management policy used by a computer system can be satisfied and is feasible for use
US6434700B1 (en) 1998-12-22 2002-08-13 Cisco Technology, Inc. Authentication and authorization mechanisms for Fortezza passwords
US6301668B1 (en) 1998-12-29 2001-10-09 Cisco Technology, Inc. Method and system for adaptive network security using network vulnerability assessment
US6415321B1 (en) * 1998-12-29 2002-07-02 Cisco Technology, Inc. Domain mapping method and system
US6499107B1 (en) 1998-12-29 2002-12-24 Cisco Technology, Inc. Method and system for adaptive network security using intelligent packet analysis
US6490290B1 (en) 1998-12-30 2002-12-03 Cisco Technology, Inc. Default internet traffic and transparent passthrough
US6298383B1 (en) 1999-01-04 2001-10-02 Cisco Technology, Inc. Integration of authentication authorization and accounting service and proxy service
US6477651B1 (en) * 1999-01-08 2002-11-05 Cisco Technology, Inc. Intrusion detection system and method having dynamically loaded signatures
US6578147B1 (en) 1999-01-15 2003-06-10 Cisco Technology, Inc. Parallel intrusion detection sensors with load balancing for high speed networks
US6487666B1 (en) 1999-01-15 2002-11-26 Cisco Technology, Inc. Intrusion detection signature analysis using regular expressions and logical operators
US6567917B1 (en) 1999-02-01 2003-05-20 Cisco Technology, Inc. Method and system for providing tamper-resistant executable software
US6484315B1 (en) 1999-02-01 2002-11-19 Cisco Technology, Inc. Method and system for dynamically distributing updates in a network
US6609205B1 (en) 1999-03-18 2003-08-19 Cisco Technology, Inc. Network intrusion detection signature analysis using decision graphs
US6618377B1 (en) 1999-03-30 2003-09-09 Cisco Technology, Inc. Flexible scheduling of network devices within redundant aggregate configurations
US6433977B1 (en) * 1999-04-16 2002-08-13 Pass & Seymour, Inc. Combo AFCI/GFCI with single test button
US6651096B1 (en) 1999-04-20 2003-11-18 Cisco Technology, Inc. Method and apparatus for organizing, storing and evaluating access control lists
US6466977B1 (en) 1999-05-06 2002-10-15 Cisco Technology, Inc. Proxy on demand
US6463474B1 (en) 1999-07-02 2002-10-08 Cisco Technology, Inc. Local authentication of a client at a network device
US6684331B1 (en) 1999-12-22 2004-01-27 Cisco Technology, Inc. Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure
US6671811B1 (en) * 1999-10-25 2003-12-30 Visa Internation Service Association Features generation for use in computer network intrusion detection
US6597957B1 (en) 1999-12-20 2003-07-22 Cisco Technology, Inc. System and method for consolidating and sorting event data
US6553489B1 (en) 2000-01-12 2003-04-22 Cisco Technology, Inc. System and method for secure and efficient universal port configuration
JP2001273388A (en) * 2000-01-20 2001-10-05 Hitachi Ltd System and method for security management
US7475405B2 (en) * 2000-09-06 2009-01-06 International Business Machines Corporation Method and system for detecting unusual events and application thereof in computer intrusion detection
US7124440B2 (en) 2000-09-07 2006-10-17 Mazu Networks, Inc. Monitoring network traffic denial of service attacks
US7681032B2 (en) * 2001-03-12 2010-03-16 Portauthority Technologies Inc. System and method for monitoring unauthorized transport of digital content
US6965574B1 (en) 2001-06-20 2005-11-15 Arbor Networks, Inc. Network traffic data collection and query
AU2002312567A1 (en) 2001-06-20 2003-01-08 Arbor Networks, Inc. Detecting network misuse
US6792555B2 (en) 2001-08-23 2004-09-14 Cisco Technology, Inc. Access server fault isolation without service disruption method and apparatus
US8245297B2 (en) * 2001-09-04 2012-08-14 E-Cop Pte. Ltd. Computer security event management system
US20030065942A1 (en) * 2001-09-28 2003-04-03 Lineman David J. Method and apparatus for actively managing security policies for users and computers in a network
US6680998B1 (en) 2001-11-19 2004-01-20 Cisco Technology, Inc. Providing private network information during emergency calls
CA2467813C (en) 2001-11-30 2014-01-07 Oracle International Corporation Real composite objects for providing high availability of resources on networked systems
CN1349190A (en) * 2001-12-03 2002-05-15 上海交通大学 Central network medium safety monitoring system
US7079520B2 (en) 2001-12-28 2006-07-18 Cisco Technology, Inc. Methods and apparatus for implementing NAT traversal in mobile IP
US7739393B2 (en) 2002-01-28 2010-06-15 Cisco Technology, Inc. Apparatus and method for restoring traffic during failover in a cable head end
US7114005B2 (en) 2002-02-05 2006-09-26 Cisco Technology, Inc. Address hopping of packet-based communications
US7284057B2 (en) 2002-02-27 2007-10-16 Cisco Technology, Inc. Methods and apparatus for Mobile IP Home Agent clustering
US8090828B2 (en) 2002-03-05 2012-01-03 Cisco Technology, Inc. Method and apparatus for reusing DHCP addresses in home addresses of mobile IP clients
US7461169B2 (en) 2002-03-05 2008-12-02 Cisco Technology, Inc. DHCP based home address management of mobile IP clients
US20030224788A1 (en) 2002-03-05 2003-12-04 Cisco Technology, Inc. Mobile IP roaming between internal and external networks
US6941467B2 (en) * 2002-03-08 2005-09-06 Ciphertrust, Inc. Systems and methods for adaptive message interrogation through multiple queues
US7137145B2 (en) 2002-04-09 2006-11-14 Cisco Technology, Inc. System and method for detecting an infective element in a network environment
US7290064B2 (en) 2002-06-24 2007-10-30 Cisco Technology, Inc. Adaptive feedback technique implemented in mobile IP networks
US7437760B2 (en) * 2002-10-10 2008-10-14 International Business Machines Corporation Antiviral network system
US7603711B2 (en) * 2002-10-31 2009-10-13 Secnap Networks Security, LLC Intrusion detection system
KR100456634B1 (en) * 2002-10-31 2004-11-10 한국전자통신연구원 Alert transmission apparatus and method for policy-based intrusion detection & response
US7454499B2 (en) * 2002-11-07 2008-11-18 Tippingpoint Technologies, Inc. Active network defense system and method

Similar Documents

Publication Publication Date Title
WO2005038598B1 (en) Policy-based network security management
US10904112B2 (en) Automatic capture of detailed analysis information based on remote server analysis
US8204928B2 (en) System and method for analyzing internet usage
US7953691B2 (en) Performance evaluating apparatus, performance evaluating method, and program
CN105812177B (en) A kind of network failure processing method and processing equipment
US8166351B2 (en) Filtering redundant events based on a statistical correlation between events
US20160142435A1 (en) Systems and methods for detection of anomalous network behavior
KR100892415B1 (en) Cyber Threat Forecasting System and Method therefor
JP2010117757A (en) Performance monitoring system and performance monitoring method
CN105072139B (en) Recommend method and apparatus
CN104836781A (en) Method distinguishing identities of access users, and device
US9311598B1 (en) Automatic capture of detailed analysis information for web application outliers with very low overhead
CN107943677A (en) Application performance monitoring method, device, readable storage medium storing program for executing and electronic equipment
CN110933115B (en) Analysis object behavior abnormity detection method and device based on dynamic session
US20160124833A1 (en) Analyzing physical machine impact on business transaction performance
JP2007164465A (en) Client security management system
CN111581258A (en) Safety data analysis method, device, system, equipment and storage medium
CN104883705B (en) A kind of the problem of data service is complained localization method and device
KR101405309B1 (en) Apparatus and method for estimation of disease transmission situation using social network service data
Goseva-Popstojanova et al. A contribution towards solving the web workload puzzle
CN111325422A (en) Work order distribution method and system
CN103957230B (en) A kind of client user's number determines method, server, client and system
JP6517468B2 (en) INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, MONITORING APPARATUS, MONITORING METHOD, AND PROGRAM
US20090055420A1 (en) Method, system, and computer program product for identifying common factors associated with network activity with reduced resource utilization
KR101326804B1 (en) Distributed denial of service detection method and system