WO2005038598B1 - Policy-based network security management - Google Patents
Policy-based network security managementInfo
- Publication number
- WO2005038598B1 WO2005038598B1 PCT/US2004/033828 US2004033828W WO2005038598B1 WO 2005038598 B1 WO2005038598 B1 WO 2005038598B1 US 2004033828 W US2004033828 W US 2004033828W WO 2005038598 B1 WO2005038598 B1 WO 2005038598B1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- data
- user
- level
- alert
- Prior art date
Links
- 230000002411 adverse Effects 0.000 claims abstract 4
- 230000002596 correlated Effects 0.000 claims 6
- 230000000694 effects Effects 0.000 claims 6
- 235000008733 Citrus aurantifolia Nutrition 0.000 claims 1
- 235000015450 Tilia cordata Nutrition 0.000 claims 1
- 235000011941 Tilia x europaea Nutrition 0.000 claims 1
- 239000004571 lime Substances 0.000 claims 1
Abstract
A policy-based network security management system is disclosed. In one embodiment, the system comprises a security management controller comprising one or more processors; a computer-readable medium carrying one or more sequences of instructions for policy controller comprising one or more processors; a computer-readable medium carrying one or more sequences of instructions for policy-based network security management, wherein execution of the one or more sequences of instructions by the one or more processors cause the one or more processor to perform the steps of receiving a set of data regarding a user (209) of a computer network; automatically deciding on a course of action based on the set of data (214), wherein the course of action may be adverse to the user although the set of data is insufficient to establish whether the user is performing a malicious action; and sending signals to one or more network elements in the computer network to implement the decision (224).
Claims
1. A policy-based network security management system, the system comprising: a security management controller comprising one or more processors; a computer-readable medium carrying one or more sequences of instructions for policy-based network security management, wherein execution of the one or more sequences of instructions by the one or more processors causes the one or more processors to perform the steps of: receiving a set of data regarding a user of a network, wherein the set of data is a first set of data that is collected over a first duration of lime; receiving a second set of data that is collected over a second duration of time, wherein the first duration of time is shorter than the second duration of time; assessing a risk level of the user harming the network based on the second set of data, wherein the second duration of time is sufficient to collect historical data regarding past malicious activities of the user; assessing a current alert level based on the first set of data, wherein the first duration of time is of a length appropriate for assessing current activities of the user; automatically deciding on a course of action based on at least one of the risk level and the current alert level, wherein the course of action may be adverse to the user although the current alert level is insufficient to establish whether the user is performing a malicious action; and sending signals to one or more network elements in the network to implement the course of action.
2. The system of Claim 1, wherein the set of data includes at least one or more alerts related to the user.
3. The system, of Claim 1 , wherein the signals include multiple alerts generated by multiple users; and the system further comprising sequences of instructions for correlating the multiple alerts to the multiple users.
4. The system of Claim 1, further comprising sequences of instructions for performing the steps of: receiving signals related to an external source including at least an alert assessment relevant to the network as a whole; and creating and storing a current alert level value based on the alert assessment.
5. The system of Claim 1, further comprising sequences of instructions for performing the steps of: receiving signals carrying performance information related to a health level of the network; and determining the course of action based at least in part on the set of data and the performance information.
6. The system of Claim 1 further comprising; a plurality of routers for routing information sent by users and servers to a variety of destinations; a subscriber management system for managing a network; a controller for executing the sequences of instructions; a network element for generating input for the set of data; and sequences of instructions for sending signals to the network elements,
7. A computer-readable medium carrying one or more sequences of instructions for providing policy-based network security management, wherein execution of the one or more sequences of instructions by one or more processors causes the one or more processors to perform the steps of: receiving signals carrying network performance information regarding health of a network and resource performance information regarding health of resources used by a network; assessing a health level based on the network performance information and the resource performance information; and sending signals carrying information affecting use of the network based on at least the health level.
8. A computer-readable medium as recited in Claim 7, further comprising the steps of: receiving signals related to one or more alerts; associating with the user at least the one or more alerts within a current alert dataset that establishes a current alert level for the user.
9. A computer-readable medium as recited in Claim 7, further comprising the step of establishing a user alert.
10. A computer-readable medium as recited in Claim 7, further comprising the steps of: receiving signals related to one or more alerts; associating with a user at least the one or more alerts within a historical dataset of alert related information that establishes a user risk level for the user.
11. A computer-readable medium as recited in Claim 7, wherein the step of sending signals further comprises the steps of: deciding on a course of action based on at least a user risk level, a current alert level, and the health level, wherein the information affecting the use of the network is based on at least the course of action.
12. A computer-readable medium as recited in Claim 11, wherein the deciding step includes at least: determining the user risk level and determining the current alert level, wherein the information affecting the use of the network is based on at least the user risk level, the current alert level, and the health level.
13. A policy-based network security management system, the system comprising: a security management controller comprising one or more processors; and the computer readable medium of Claim 7.
14. A method of providing policy-based network security management, comprising the steps of; receiving a set of data regarding a user of a network, wherein the set of data is a first set of data that is collected over a first duration of time; receiving a second set of data that is collected over a second duration of time, wherein the first duration of time is shorter than the second duration of time; assessing a risk level of the user harming the network based on the second set of data, wherein the second duration of time is sufficient to collect historical data regarding past malicious activities of the user; assessing a current alert level based on the first set of data, wherein the first duration of time is of a length appropriate for assessing current activities of the user; automatically deciding on a course of action based on at least one of the risk level and the current alert level, wherein the course of action may be adverse to the user although the current alert level is insufficient to establish whether the user is performing a malicious action; and sending signals to one or more network elements in the network to implement the course of action.
15. The method of Claim 14 wherein the set of data includes at least one or more alerts related to the user.
16. The method of Claim 14, wherein the signals include multiple alerts generated by multiple users, and the method further comprises correlating the multiple alerts to the multiple users.
17. The method of Claim 14 further comprising receiving signals related to an external source including an alert assessment relevant to the network as a whole, wherein the current alert level is also based on the alert assessment.
18. The method of Claim 14 further comprising receiving signals carrying performance information related to a health level of the network, wherein the course of action is based on the set of data and the performance information.
19. A method of policy-based network security management, comprising the computer- implemented steps of: receiving one or more signals carrying network performance information regarding health of one or more network devices in a network, and resource performance information regarding health of one or more resources used by the network; assessing an overall network health level based on the network performance information and the resource performance information; and sending signals carrying information affecting use of the network based on the overall network health level.
20. The method of Claim 19 further comprising: receiving signals related to one or more alerts; including at least the one or more alerts within a historical dataset of alert related information that establishes a user risk level for a user; and including at least the one or more alerts within a current alert dataset that establishes a current alert level.
21. The method of Claim 19, wherein the sending step further comprising the steps of: deciding on a course of action based on at least a user risk level, a current alert level, and the overall network health level, and the information affecting the use of the network includes at least information for carrying out the course of action,
22. The method of Claim 21 , wherein the deciding step includes at least the steps of: determining the user risk level; determining the current alert level; and determining the overall network health level; wherein the information affecting the use of the network is based on at least the user risk level, the current alert level, and the overall network health level.
23. A method of policy-based network security management, comprising the computer- implemented steps of: collecting network performance statistics related to an overall health of a network and individual performance statistics of one or more individual units of the network, the collecting being performed by a performance management system; sending the network performance statistics to a controller for analysis; computing an overall health state based on the network performance statistics and the individual performance statistics, using the controller; reading external alert data from an external alert source, using the controller; collecting security event data from the network; sending the security event data to a fault management system; using the fault management system for checking for duplications in the security event data, and deduplicating duplicate security events in the security event data; calculating an alert state based on the security event data from the fault management system and the external alert data; obtaining user information from a subscriber management system; correlating the security event data from the fault management system with the user information to form correlated security event data; reading external user risk data from an external user risk source into the controller; calculating a user risk state based on the correlated security event data and the external user risk data, using the controller; calculating a decision regarding whether to take corrective action based on the overall health state, the alert state, and the user risk state, using the controller; sending the decision from the controller to the subscriber management system; and sending directives, related to the decision, from the subscriber management system to the network.
24. A system comprising: a fault management system that receives network security data and deduplicates duplicate indications of security events in the network security data to form deduplicated security event data; a subscriber management system that manages subscribers using a network, wherein the subscriber management system stores subscriber information about individual users and is capable of sending directives to the individual users based on a decision to take corrective action toward the individual users; wherein the deduplicated security event data from the fault management system is correlated to the subscriber information to form correlated network security data; a performance management system that receives overall performance data related to an overall health of the network and individual performance data related to a health of one or more individual units of the network; and a controller that: receives external alert data from an external alert source, external user risk data from an external user risk source, the deduplicated security event data, the correlated network security data, the overall performance data, and the individual performance data; computes an alert state based on at least the external alert data and the deduplicated security event data, a user risk state based on at least the external user risk data and the correlated network security data, and a health state based on at least the overall performance data and the individual performance data; makes the decision whether to take corrective action based on at least the alert state, the user risk state, and the health state; and causes directives that implement the decision to be sent to the network.
25. An apparatus for providing policy-based network security management, comprising: means for receiving a set of data regarding a user of a network, wherein the set of data is a first set of data that is collected over a first duration of time; means for receiving a second set of data that is collected over a second duration of time, wherein the first duration of time is shorter than the second duration of time; means for assessing a risk level of the user harming the network based on the second set of data, wherein the second duration of time is sufficient to collect historical data regarding past malicious activities of the user; means for assessing a current alert level based on the first set of data, wherein the first duration of time is of a length appropriate for assessing current activities of the user; means for automatically deciding on a course of action based on at least one of the risk level and the current alert level, wherein the course of action may be adverse to the user although the current alert level is insufficient to establish whether the user is performing a malicious action; and means for sending signals to one or more network elements in the network to implement the course of action,
26. An apparatus for providing policy-based network security management, comprising: means for receiving signals carrying network performance information regarding health of a network and resource performance information regarding health of resources used by the network; means for assessing a health level based on the network performance information and the resource performance information; and means for sending signals carrying information affecting use of the network based on at least the health level.
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04795046A EP1678615A4 (en) | 2003-10-16 | 2004-10-13 | Policy-based network security management |
AU2004282937A AU2004282937B2 (en) | 2003-10-16 | 2004-10-13 | Policy-based network security management |
CA002541934A CA2541934A1 (en) | 2003-10-16 | 2004-10-13 | Policy-based network security management |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/688,051 US7237267B2 (en) | 2003-10-16 | 2003-10-16 | Policy-based network security management |
US10/688,051 | 2003-10-16 |
Publications (3)
Publication Number | Publication Date |
---|---|
WO2005038598A2 WO2005038598A2 (en) | 2005-04-28 |
WO2005038598A3 WO2005038598A3 (en) | 2006-03-02 |
WO2005038598B1 true WO2005038598B1 (en) | 2006-04-27 |
Family
ID=34465565
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2004/033828 WO2005038598A2 (en) | 2003-10-16 | 2004-10-13 | Policy-based network security management |
Country Status (6)
Country | Link |
---|---|
US (1) | US7237267B2 (en) |
EP (1) | EP1678615A4 (en) |
CN (1) | CN100421086C (en) |
AU (1) | AU2004282937B2 (en) |
CA (1) | CA2541934A1 (en) |
WO (1) | WO2005038598A2 (en) |
Families Citing this family (282)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7606898B1 (en) * | 2000-10-24 | 2009-10-20 | Microsoft Corporation | System and method for distributed management of shared computers |
US7113900B1 (en) * | 2000-10-24 | 2006-09-26 | Microsoft Corporation | System and method for logical modeling of distributed computer systems |
US6886038B1 (en) * | 2000-10-24 | 2005-04-26 | Microsoft Corporation | System and method for restricting data transfers and managing software components of distributed computers |
US7673335B1 (en) | 2004-07-01 | 2010-03-02 | Novell, Inc. | Computer-implemented method and system for security event correlation |
US6658091B1 (en) | 2002-02-01 | 2003-12-02 | @Security Broadband Corp. | LIfestyle multimedia security system |
US8661498B2 (en) | 2002-09-18 | 2014-02-25 | Symantec Corporation | Secure and scalable detection of preselected data embedded in electronically transmitted messages |
US8041719B2 (en) | 2003-05-06 | 2011-10-18 | Symantec Corporation | Personal computing device-based mechanism to detect preselected data |
US7472114B1 (en) * | 2002-09-18 | 2008-12-30 | Symantec Corporation | Method and apparatus to define the scope of a search for information from a tabular data source |
US7673344B1 (en) | 2002-09-18 | 2010-03-02 | Symantec Corporation | Mechanism to search information content for preselected data |
US7886359B2 (en) * | 2002-09-18 | 2011-02-08 | Symantec Corporation | Method and apparatus to report policy violations in messages |
US8225371B2 (en) | 2002-09-18 | 2012-07-17 | Symantec Corporation | Method and apparatus for creating an information security policy based on a pre-configured template |
US7437760B2 (en) * | 2002-10-10 | 2008-10-14 | International Business Machines Corporation | Antiviral network system |
JP4400059B2 (en) * | 2002-10-17 | 2010-01-20 | 株式会社日立製作所 | Policy setting support tool |
US7401360B2 (en) * | 2002-12-03 | 2008-07-15 | Tekelec | Methods and systems for identifying and mitigating telecommunications network security threats |
US7890543B2 (en) * | 2003-03-06 | 2011-02-15 | Microsoft Corporation | Architecture for distributed computing system and automated design, deployment, and management of distributed applications |
US8122106B2 (en) | 2003-03-06 | 2012-02-21 | Microsoft Corporation | Integrating design, deployment, and management phases for systems |
US7689676B2 (en) | 2003-03-06 | 2010-03-30 | Microsoft Corporation | Model-based policy application |
US7567504B2 (en) * | 2003-06-30 | 2009-07-28 | Microsoft Corporation | Network load balancing with traffic routing |
US7613822B2 (en) * | 2003-06-30 | 2009-11-03 | Microsoft Corporation | Network load balancing with session information |
US7512969B2 (en) * | 2003-11-21 | 2009-03-31 | Time Warner Cable, A Division Of Time Warner Entertainment Company, L.P. | System and method for detecting and reporting cable network devices with duplicate media access control addresses |
US7430598B2 (en) * | 2003-11-25 | 2008-09-30 | Microsoft Corporation | Systems and methods for health monitor alert management for networked systems |
US7613804B2 (en) * | 2003-11-25 | 2009-11-03 | Microsoft Corporation | Systems and methods for state management of networked systems |
US7590726B2 (en) * | 2003-11-25 | 2009-09-15 | Microsoft Corporation | Systems and methods for unifying and/or utilizing state information for managing networked systems |
US7533407B2 (en) | 2003-12-16 | 2009-05-12 | Microsoft Corporation | System and methods for providing network quarantine |
US8561154B2 (en) | 2003-12-22 | 2013-10-15 | International Business Machines Corporation | Method for providing network perimeter security assessment |
US20050198242A1 (en) * | 2004-01-05 | 2005-09-08 | Viascope Int. | System and method for detection/interception of IP collision |
US20050182834A1 (en) * | 2004-01-20 | 2005-08-18 | Black Chuck A. | Network and network device health monitoring |
US7778422B2 (en) | 2004-02-27 | 2010-08-17 | Microsoft Corporation | Security associations for devices |
US7607021B2 (en) | 2004-03-09 | 2009-10-20 | Cisco Technology, Inc. | Isolation approach for network users associated with elevated risk |
US11368327B2 (en) | 2008-08-11 | 2022-06-21 | Icontrol Networks, Inc. | Integrated cloud system for premises automation |
US9609003B1 (en) | 2007-06-12 | 2017-03-28 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US8963713B2 (en) | 2005-03-16 | 2015-02-24 | Icontrol Networks, Inc. | Integrated security network with security alarm signaling system |
US8988221B2 (en) * | 2005-03-16 | 2015-03-24 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11201755B2 (en) | 2004-03-16 | 2021-12-14 | Icontrol Networks, Inc. | Premises system management using status signal |
US10721087B2 (en) | 2005-03-16 | 2020-07-21 | Icontrol Networks, Inc. | Method for networked touchscreen with integrated interfaces |
US10237237B2 (en) | 2007-06-12 | 2019-03-19 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11113950B2 (en) | 2005-03-16 | 2021-09-07 | Icontrol Networks, Inc. | Gateway integrated with premises security system |
US7711796B2 (en) | 2006-06-12 | 2010-05-04 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11159484B2 (en) | 2004-03-16 | 2021-10-26 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US10382452B1 (en) | 2007-06-12 | 2019-08-13 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10313303B2 (en) | 2007-06-12 | 2019-06-04 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US9531593B2 (en) | 2007-06-12 | 2016-12-27 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US8996665B2 (en) | 2005-03-16 | 2015-03-31 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US8473619B2 (en) | 2005-03-16 | 2013-06-25 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US20160065414A1 (en) | 2013-06-27 | 2016-03-03 | Ken Sundermeyer | Control system user interface |
US10375253B2 (en) | 2008-08-25 | 2019-08-06 | Icontrol Networks, Inc. | Security system with networked touchscreen and gateway |
US10444964B2 (en) | 2007-06-12 | 2019-10-15 | Icontrol Networks, Inc. | Control system user interface |
US11677577B2 (en) | 2004-03-16 | 2023-06-13 | Icontrol Networks, Inc. | Premises system management using status signal |
US9172553B2 (en) | 2005-03-16 | 2015-10-27 | Icontrol Networks, Inc. | Security system with networked touchscreen and gateway |
US10200504B2 (en) | 2007-06-12 | 2019-02-05 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US11343380B2 (en) | 2004-03-16 | 2022-05-24 | Icontrol Networks, Inc. | Premises system automation |
US20050216302A1 (en) | 2004-03-16 | 2005-09-29 | Icontrol Networks, Inc. | Business method for premises management |
US11811845B2 (en) | 2004-03-16 | 2023-11-07 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US9191228B2 (en) | 2005-03-16 | 2015-11-17 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US11368429B2 (en) | 2004-03-16 | 2022-06-21 | Icontrol Networks, Inc. | Premises management configuration and control |
US11582065B2 (en) | 2007-06-12 | 2023-02-14 | Icontrol Networks, Inc. | Systems and methods for device communication |
US8612591B2 (en) | 2005-03-16 | 2013-12-17 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US9141276B2 (en) | 2005-03-16 | 2015-09-22 | Icontrol Networks, Inc. | Integrated interface for mobile device |
US11916870B2 (en) | 2004-03-16 | 2024-02-27 | Icontrol Networks, Inc. | Gateway registry methods and systems |
US11277465B2 (en) | 2004-03-16 | 2022-03-15 | Icontrol Networks, Inc. | Generating risk profile using data of home monitoring and security system |
US10522026B2 (en) | 2008-08-11 | 2019-12-31 | Icontrol Networks, Inc. | Automation system user interface with three-dimensional display |
US9729342B2 (en) | 2010-12-20 | 2017-08-08 | Icontrol Networks, Inc. | Defining and implementing sensor triggered response rules |
US20090077623A1 (en) | 2005-03-16 | 2009-03-19 | Marc Baum | Security Network Integrating Security System and Network Devices |
US10339791B2 (en) | 2007-06-12 | 2019-07-02 | Icontrol Networks, Inc. | Security network integrated with premise security system |
US11489812B2 (en) | 2004-03-16 | 2022-11-01 | Icontrol Networks, Inc. | Forming a security network including integrated security system components and network devices |
US11316958B2 (en) | 2008-08-11 | 2022-04-26 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11244545B2 (en) | 2004-03-16 | 2022-02-08 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US8635350B2 (en) | 2006-06-12 | 2014-01-21 | Icontrol Networks, Inc. | IP device discovery systems and methods |
US10142392B2 (en) | 2007-01-24 | 2018-11-27 | Icontrol Networks, Inc. | Methods and systems for improved system performance |
US10156959B2 (en) | 2005-03-16 | 2018-12-18 | Icontrol Networks, Inc. | Cross-client sensor user interface in an integrated security network |
US7657623B2 (en) * | 2004-03-24 | 2010-02-02 | Nortel Networks Limited | Method and apparatus for collecting management information on a communication network |
US7996024B2 (en) | 2004-04-14 | 2011-08-09 | Tekelec | Method for preventing the delivery of short message service message spam |
US20050267954A1 (en) * | 2004-04-27 | 2005-12-01 | Microsoft Corporation | System and methods for providing network quarantine |
US20050246529A1 (en) * | 2004-04-30 | 2005-11-03 | Microsoft Corporation | Isolated persistent identity storage for authentication of computing devies |
US20060080738A1 (en) * | 2004-10-08 | 2006-04-13 | Bezilla Daniel B | Automatic criticality assessment |
US20060085850A1 (en) * | 2004-10-14 | 2006-04-20 | Microsoft Corporation | System and methods for providing network quarantine using IPsec |
CA2594020C (en) * | 2004-12-22 | 2014-12-09 | Wake Forest University | Method, systems, and computer program products for implementing function-parallel network firewall |
US20060150238A1 (en) * | 2005-01-04 | 2006-07-06 | Symbol Technologies, Inc. | Method and apparatus of adaptive network policy management for wireless mobile computers |
US7979889B2 (en) * | 2005-01-07 | 2011-07-12 | Cisco Technology, Inc. | Methods and apparatus providing security to computer systems and networks |
US9306809B2 (en) | 2007-06-12 | 2016-04-05 | Icontrol Networks, Inc. | Security system with networked touchscreen |
US8713132B2 (en) | 2005-03-16 | 2014-04-29 | Icontrol Networks, Inc. | Device for data routing in networks |
US20120324566A1 (en) | 2005-03-16 | 2012-12-20 | Marc Baum | Takeover Processes In Security Network Integrated With Premise Security System |
US20110128378A1 (en) | 2005-03-16 | 2011-06-02 | Reza Raji | Modular Electronic Display Platform |
US11700142B2 (en) | 2005-03-16 | 2023-07-11 | Icontrol Networks, Inc. | Security network integrating security system and network devices |
US8819178B2 (en) | 2005-03-16 | 2014-08-26 | Icontrol Networks, Inc. | Controlling data routing in integrated security systems |
US9059863B2 (en) | 2005-03-16 | 2015-06-16 | Icontrol Networks, Inc. | Method for data routing in networks |
US20170180198A1 (en) | 2008-08-11 | 2017-06-22 | Marc Baum | Forming a security network including integrated security system components |
US9450776B2 (en) | 2005-03-16 | 2016-09-20 | Icontrol Networks, Inc. | Forming a security network including integrated security system components |
US11615697B2 (en) | 2005-03-16 | 2023-03-28 | Icontrol Networks, Inc. | Premise management systems and methods |
US8825871B2 (en) | 2005-03-16 | 2014-09-02 | Icontrol Networks, Inc. | Controlling data routing among networks |
US10999254B2 (en) | 2005-03-16 | 2021-05-04 | Icontrol Networks, Inc. | System for data routing in networks |
US11496568B2 (en) | 2005-03-16 | 2022-11-08 | Icontrol Networks, Inc. | Security system with networked touchscreen |
WO2006105093A2 (en) * | 2005-03-28 | 2006-10-05 | Wake Forest University | Methods, systems, and computer program products for network firewall policy optimization |
US9547780B2 (en) * | 2005-03-28 | 2017-01-17 | Absolute Software Corporation | Method for determining identification of an electronic device |
US8046834B2 (en) * | 2005-03-30 | 2011-10-25 | Alcatel Lucent | Method of polymorphic detection |
US8489728B2 (en) * | 2005-04-15 | 2013-07-16 | Microsoft Corporation | Model-based system monitoring |
US7802144B2 (en) * | 2005-04-15 | 2010-09-21 | Microsoft Corporation | Model-based system monitoring |
US7774849B2 (en) * | 2005-04-15 | 2010-08-10 | Tekelec | Methods, systems, and computer program products for detecting and mitigating denial of service attacks in a telecommunications signaling network |
US7797147B2 (en) * | 2005-04-15 | 2010-09-14 | Microsoft Corporation | Model-based system monitoring |
KR100694108B1 (en) * | 2005-05-03 | 2007-03-12 | 삼성전자주식회사 | Method and apparatus for securing information in a wireless network printing system |
US7788723B2 (en) * | 2005-05-17 | 2010-08-31 | Computer Associates Think, Inc. | Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning |
US8549513B2 (en) | 2005-06-29 | 2013-10-01 | Microsoft Corporation | Model-based virtual system provisioning |
US7926099B1 (en) * | 2005-07-15 | 2011-04-12 | Novell, Inc. | Computer-implemented method and system for security event transport using a message bus |
US7526677B2 (en) | 2005-10-31 | 2009-04-28 | Microsoft Corporation | Fragility handling |
US7941309B2 (en) | 2005-11-02 | 2011-05-10 | Microsoft Corporation | Modeling IT operations/policies |
US8082586B2 (en) | 2005-11-22 | 2011-12-20 | International Business Machines Corporation | Snoop echo response extractor |
US7827545B2 (en) * | 2005-12-15 | 2010-11-02 | Microsoft Corporation | Dynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy |
US8495743B2 (en) * | 2005-12-16 | 2013-07-23 | Cisco Technology, Inc. | Methods and apparatus providing automatic signature generation and enforcement |
US7882560B2 (en) * | 2005-12-16 | 2011-02-01 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing |
US8413245B2 (en) * | 2005-12-16 | 2013-04-02 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security for polymorphic attacks |
US9286469B2 (en) | 2005-12-16 | 2016-03-15 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic signature generation |
US8510596B1 (en) * | 2006-02-09 | 2013-08-13 | Virsec Systems, Inc. | System and methods for run time detection and correction of memory corruption |
US20070198525A1 (en) * | 2006-02-13 | 2007-08-23 | Microsoft Corporation | Computer system with update-based quarantine |
US8024804B2 (en) * | 2006-03-08 | 2011-09-20 | Imperva, Inc. | Correlation engine for detecting network attacks and detection method |
AU2007227214A1 (en) * | 2006-03-20 | 2007-09-27 | Absolute Software Corporation | Method for determining identification of an electronic device |
US7793096B2 (en) * | 2006-03-31 | 2010-09-07 | Microsoft Corporation | Network access protection |
US8151322B2 (en) | 2006-05-16 | 2012-04-03 | A10 Networks, Inc. | Systems and methods for user access authentication based on network access point |
US10079839B1 (en) | 2007-06-12 | 2018-09-18 | Icontrol Networks, Inc. | Activation of gateway device |
US8086732B1 (en) * | 2006-06-30 | 2011-12-27 | Cisco Technology, Inc. | Method and apparatus for rate limiting client requests |
US9715675B2 (en) | 2006-08-10 | 2017-07-25 | Oracle International Corporation | Event-driven customizable automated workflows for incident remediation |
US8424061B2 (en) * | 2006-09-12 | 2013-04-16 | International Business Machines Corporation | Method, system and program product for authenticating a user seeking to perform an electronic service request |
US7832008B1 (en) * | 2006-10-11 | 2010-11-09 | Cisco Technology, Inc. | Protection of computer resources |
US7716378B2 (en) | 2006-10-17 | 2010-05-11 | A10 Networks, Inc. | System and method to associate a private user identity with a public user identity |
US8312507B2 (en) | 2006-10-17 | 2012-11-13 | A10 Networks, Inc. | System and method to apply network traffic policy to an application session |
US7647635B2 (en) * | 2006-11-02 | 2010-01-12 | A10 Networks, Inc. | System and method to resolve an identity interactively |
US7908659B2 (en) * | 2006-11-10 | 2011-03-15 | Microsoft Corporation | Extensible framework for system security state reporting and remediation |
US7984452B2 (en) * | 2006-11-10 | 2011-07-19 | Cptn Holdings Llc | Event source management using a metadata-driven framework |
JP2008158686A (en) * | 2006-12-21 | 2008-07-10 | Toshiba Corp | Program verification device and method, signature system based on program verification |
US11706279B2 (en) | 2007-01-24 | 2023-07-18 | Icontrol Networks, Inc. | Methods and systems for data communication |
US20080201780A1 (en) * | 2007-02-20 | 2008-08-21 | Microsoft Corporation | Risk-Based Vulnerability Assessment, Remediation and Network Access Protection |
US7633385B2 (en) | 2007-02-28 | 2009-12-15 | Ucontrol, Inc. | Method and system for communicating with and controlling an alarm system from a remote server |
US8310923B1 (en) | 2007-03-27 | 2012-11-13 | Amazon Technologies, Inc. | Monitoring a network site to detect adverse network conditions |
US8451986B2 (en) | 2007-04-23 | 2013-05-28 | Icontrol Networks, Inc. | Method and system for automatically providing alternate network access for telecommunications |
US11601810B2 (en) | 2007-06-12 | 2023-03-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11218878B2 (en) | 2007-06-12 | 2022-01-04 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10498830B2 (en) | 2007-06-12 | 2019-12-03 | Icontrol Networks, Inc. | Wi-Fi-to-serial encapsulation in systems |
US10389736B2 (en) | 2007-06-12 | 2019-08-20 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10616075B2 (en) | 2007-06-12 | 2020-04-07 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10666523B2 (en) | 2007-06-12 | 2020-05-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10423309B2 (en) | 2007-06-12 | 2019-09-24 | Icontrol Networks, Inc. | Device integration framework |
US11089122B2 (en) | 2007-06-12 | 2021-08-10 | Icontrol Networks, Inc. | Controlling data routing among networks |
US11646907B2 (en) | 2007-06-12 | 2023-05-09 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11316753B2 (en) | 2007-06-12 | 2022-04-26 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11237714B2 (en) | 2007-06-12 | 2022-02-01 | Control Networks, Inc. | Control system user interface |
US11423756B2 (en) | 2007-06-12 | 2022-08-23 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US11212192B2 (en) | 2007-06-12 | 2021-12-28 | Icontrol Networks, Inc. | Communication protocols in integrated systems |
US10523689B2 (en) | 2007-06-12 | 2019-12-31 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US10051078B2 (en) | 2007-06-12 | 2018-08-14 | Icontrol Networks, Inc. | WiFi-to-serial encapsulation in systems |
CN101094236B (en) | 2007-07-20 | 2011-08-10 | 华为技术有限公司 | Method for processing message in address resolution protocol, communication system, and forwarding planar process portion |
US10223903B2 (en) | 2010-09-28 | 2019-03-05 | Icontrol Networks, Inc. | Integrated security system with parallel processing architecture |
US11831462B2 (en) | 2007-08-24 | 2023-11-28 | Icontrol Networks, Inc. | Controlling data routing in premises management systems |
US9225684B2 (en) * | 2007-10-29 | 2015-12-29 | Microsoft Technology Licensing, Llc | Controlling network access |
US8959624B2 (en) * | 2007-10-31 | 2015-02-17 | Bank Of America Corporation | Executable download tracking system |
US11916928B2 (en) | 2008-01-24 | 2024-02-27 | Icontrol Networks, Inc. | Communication protocols over internet protocol (IP) networks |
US9516460B2 (en) * | 2008-03-28 | 2016-12-06 | Securitypoint Holdings Llc | Systems and methods for security checkpoint condition information and sharing |
US7996374B1 (en) | 2008-03-28 | 2011-08-09 | Symantec Corporation | Method and apparatus for automatically correlating related incidents of policy violations |
US8185488B2 (en) | 2008-04-17 | 2012-05-22 | Emc Corporation | System and method for correlating events in a pluggable correlation architecture |
US8086905B2 (en) * | 2008-05-27 | 2011-12-27 | Hitachi, Ltd. | Method of collecting information in system network |
US20170185278A1 (en) | 2008-08-11 | 2017-06-29 | Icontrol Networks, Inc. | Automation system user interface |
US8312033B1 (en) | 2008-06-26 | 2012-11-13 | Experian Marketing Solutions, Inc. | Systems and methods for providing an integrated identifier |
US11258625B2 (en) | 2008-08-11 | 2022-02-22 | Icontrol Networks, Inc. | Mobile premises automation platform |
US11729255B2 (en) | 2008-08-11 | 2023-08-15 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US10530839B2 (en) | 2008-08-11 | 2020-01-07 | Icontrol Networks, Inc. | Integrated cloud system with lightweight gateway for premises automation |
US11758026B2 (en) | 2008-08-11 | 2023-09-12 | Icontrol Networks, Inc. | Virtual device systems and methods |
US11792036B2 (en) | 2008-08-11 | 2023-10-17 | Icontrol Networks, Inc. | Mobile premises automation platform |
US8612751B1 (en) * | 2008-08-20 | 2013-12-17 | Cisco Technology, Inc. | Method and apparatus for entitled data transfer over the public internet |
US8023504B2 (en) * | 2008-08-27 | 2011-09-20 | Cisco Technology, Inc. | Integrating security server policies with optimized routing control |
US8826443B1 (en) | 2008-09-18 | 2014-09-02 | Symantec Corporation | Selective removal of protected content from web requests sent to an interactive website |
US20100073160A1 (en) * | 2008-09-25 | 2010-03-25 | Microsoft Corporation | Alerting users using a multiple state status icon |
JP5237034B2 (en) | 2008-09-30 | 2013-07-17 | 株式会社日立製作所 | Root cause analysis method, device, and program for IT devices that do not acquire event information. |
US8245141B1 (en) | 2008-10-29 | 2012-08-14 | Cisco Technology, Inc. | Hierarchical collaboration policies in a shared workspace environment |
EP2354948A4 (en) * | 2008-10-30 | 2012-04-04 | Ibm | Device for supporting detection of failure event, method for supporting detection of failure event, and computer program |
US9628440B2 (en) | 2008-11-12 | 2017-04-18 | Icontrol Networks, Inc. | Takeover processes in security network integrated with premise security system |
US8613040B2 (en) * | 2008-12-22 | 2013-12-17 | Symantec Corporation | Adaptive data loss prevention policies |
US10057285B2 (en) * | 2009-01-30 | 2018-08-21 | Oracle International Corporation | System and method for auditing governance, risk, and compliance using a pluggable correlation architecture |
US8935752B1 (en) | 2009-03-23 | 2015-01-13 | Symantec Corporation | System and method for identity consolidation |
US8638211B2 (en) | 2009-04-30 | 2014-01-28 | Icontrol Networks, Inc. | Configurable controller and interface for home SMA, phone and multimedia |
US8694624B2 (en) * | 2009-05-19 | 2014-04-08 | Symbol Technologies, Inc. | Systems and methods for concurrent wireless local area network access and sensing |
US8495725B2 (en) * | 2009-08-28 | 2013-07-23 | Great Wall Systems | Methods, systems, and computer readable media for adaptive packet filtering |
US9742778B2 (en) | 2009-09-09 | 2017-08-22 | International Business Machines Corporation | Differential security policies in email systems |
US8793789B2 (en) | 2010-07-22 | 2014-07-29 | Bank Of America Corporation | Insider threat correlation tool |
US9038187B2 (en) * | 2010-01-26 | 2015-05-19 | Bank Of America Corporation | Insider threat correlation tool |
US8782209B2 (en) * | 2010-01-26 | 2014-07-15 | Bank Of America Corporation | Insider threat correlation tool |
US8800034B2 (en) | 2010-01-26 | 2014-08-05 | Bank Of America Corporation | Insider threat correlation tool |
US8782794B2 (en) | 2010-04-16 | 2014-07-15 | Bank Of America Corporation | Detecting secure or encrypted tunneling in a computer network |
US8544100B2 (en) | 2010-04-16 | 2013-09-24 | Bank Of America Corporation | Detecting secure or encrypted tunneling in a computer network |
WO2011137458A1 (en) | 2010-04-30 | 2011-11-03 | Icontrol Networks, Inc. | Power and data solution for remote low-power devices |
AU2011250886A1 (en) | 2010-05-10 | 2013-01-10 | Icontrol Networks, Inc | Control system user interface |
CN103039037B (en) * | 2010-06-21 | 2016-08-24 | 德国电信股份公司 | For effectively managing the method and system of the connection between communication network and this communication network and customer rs premise equipment |
US8931058B2 (en) | 2010-07-01 | 2015-01-06 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8744956B1 (en) | 2010-07-01 | 2014-06-03 | Experian Information Solutions, Inc. | Systems and methods for permission arbitrated transaction services |
US8836467B1 (en) | 2010-09-28 | 2014-09-16 | Icontrol Networks, Inc. | Method, system and apparatus for automated reporting of account and sensor zone information to a central station |
US9147042B1 (en) | 2010-11-22 | 2015-09-29 | Experian Information Solutions, Inc. | Systems and methods for data verification |
US11750414B2 (en) | 2010-12-16 | 2023-09-05 | Icontrol Networks, Inc. | Bidirectional security sensor communication for a premises security system |
US9147337B2 (en) | 2010-12-17 | 2015-09-29 | Icontrol Networks, Inc. | Method and system for logging security event data |
JP5610530B2 (en) * | 2010-12-27 | 2014-10-22 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Resource protection processing program, resource protection processing device, and resource protection processing method |
US9607336B1 (en) | 2011-06-16 | 2017-03-28 | Consumerinfo.Com, Inc. | Providing credit inquiry alerts |
US9253197B2 (en) * | 2011-08-15 | 2016-02-02 | Bank Of America Corporation | Method and apparatus for token-based real-time risk updating |
US9055053B2 (en) | 2011-08-15 | 2015-06-09 | Bank Of America Corporation | Method and apparatus for token-based combining of risk ratings |
US9106691B1 (en) | 2011-09-16 | 2015-08-11 | Consumerinfo.Com, Inc. | Systems and methods of identity protection and management |
CN103188090B (en) * | 2011-12-28 | 2016-05-25 | 中国移动通信集团江苏有限公司 | A kind of recognition methods and device of transport network rubbish time slot |
WO2013115807A1 (en) * | 2012-01-31 | 2013-08-08 | Hewlett-Packard Development Company, L.P. | Determination of spoofing of a unique machine identifier |
US9537879B2 (en) * | 2012-06-21 | 2017-01-03 | Avocent Huntsville, Llc | Cyber security monitoring system and method for data center components |
US9565213B2 (en) | 2012-10-22 | 2017-02-07 | Centripetal Networks, Inc. | Methods and systems for protecting a secured network |
US9137205B2 (en) | 2012-10-22 | 2015-09-15 | Centripetal Networks, Inc. | Methods and systems for protecting a secured network |
US20140143010A1 (en) * | 2012-11-16 | 2014-05-22 | SPF, Inc. | System and Method for Assessing Interaction Risks Potentially Associated with Transactions Between a Client and a Provider |
US10366360B2 (en) | 2012-11-16 | 2019-07-30 | SPF, Inc. | System and method for identifying potential future interaction risks between a client and a provider |
US8856894B1 (en) | 2012-11-28 | 2014-10-07 | Consumerinfo.Com, Inc. | Always on authentication |
EP2929666B1 (en) * | 2012-12-06 | 2021-03-31 | The Boeing Company | Context aware network security monitoring for threat detection |
CN103905265B (en) * | 2012-12-27 | 2018-03-23 | 中国移动通信集团公司 | The detection method and device of newly added equipment in a kind of network |
US9203806B2 (en) | 2013-01-11 | 2015-12-01 | Centripetal Networks, Inc. | Rule swapping in a packet network |
US9124552B2 (en) | 2013-03-12 | 2015-09-01 | Centripetal Networks, Inc. | Filtering network data transfers |
US9928975B1 (en) | 2013-03-14 | 2018-03-27 | Icontrol Networks, Inc. | Three-way switch |
US9287727B1 (en) | 2013-03-15 | 2016-03-15 | Icontrol Networks, Inc. | Temporal voltage adaptive lithium battery charger |
US10664936B2 (en) | 2013-03-15 | 2020-05-26 | Csidentity Corporation | Authentication systems and methods for on-demand products |
US9094445B2 (en) | 2013-03-15 | 2015-07-28 | Centripetal Networks, Inc. | Protecting networks from cyber attacks and overloading |
US9633322B1 (en) | 2013-03-15 | 2017-04-25 | Consumerinfo.Com, Inc. | Adjustment of knowledge-based authentication |
US9867143B1 (en) | 2013-03-15 | 2018-01-09 | Icontrol Networks, Inc. | Adaptive Power Modulation |
US9721147B1 (en) | 2013-05-23 | 2017-08-01 | Consumerinfo.Com, Inc. | Digital identity |
US20140359694A1 (en) * | 2013-06-03 | 2014-12-04 | eSentire, Inc. | System and method for computer system security |
US9122853B2 (en) | 2013-06-24 | 2015-09-01 | A10 Networks, Inc. | Location determination for user authentication |
WO2015021469A2 (en) | 2013-08-09 | 2015-02-12 | Icontrol Networks Canada Ulc | System, method and apparatus for remote monitoring |
CA2923231C (en) | 2013-09-12 | 2020-06-02 | Virsec Systems, Inc. | Automated runtime detection of malware |
US20150089566A1 (en) * | 2013-09-24 | 2015-03-26 | Radware, Ltd. | Escalation security method for use in software defined networks |
KR101401168B1 (en) * | 2013-09-27 | 2014-05-29 | 플러스기술주식회사 | Device and method for network security using ip address |
US11165770B1 (en) | 2013-12-06 | 2021-11-02 | A10 Networks, Inc. | Biometric verification of a human internet user |
CN103745092B (en) * | 2013-12-24 | 2017-01-11 | 新浪网技术(中国)有限公司 | Evaluation method and evaluation system for utilization ratio of server |
US11405463B2 (en) | 2014-03-03 | 2022-08-02 | Icontrol Networks, Inc. | Media content management |
US11146637B2 (en) | 2014-03-03 | 2021-10-12 | Icontrol Networks, Inc. | Media content management |
US10373240B1 (en) | 2014-04-25 | 2019-08-06 | Csidentity Corporation | Systems, methods and computer-program products for eligibility verification |
WO2015200511A1 (en) | 2014-06-24 | 2015-12-30 | Virsec Systems, Inc. | System and methods for automated detection of input and output validation and resource management vulnerability |
AU2015279920B2 (en) | 2014-06-24 | 2018-03-29 | Virsec Systems, Inc. | Automated root cause analysis of single or N-TIERED applications |
US9838431B2 (en) | 2014-11-28 | 2017-12-05 | International Business Machines Corporation | Context-based cloud security assurance system |
US9264370B1 (en) | 2015-02-10 | 2016-02-16 | Centripetal Networks, Inc. | Correlating packets in communications networks |
US9866576B2 (en) * | 2015-04-17 | 2018-01-09 | Centripetal Networks, Inc. | Rule-based network-threat detection |
EP3104563B1 (en) | 2015-06-10 | 2019-10-16 | Nokia Solutions and Networks GmbH & Co. KG | Sdn security |
US9762616B2 (en) | 2015-08-08 | 2017-09-12 | International Business Machines Corporation | Application-based security rights in cloud environments |
US9917856B2 (en) | 2015-12-23 | 2018-03-13 | Centripetal Networks, Inc. | Rule-based network-threat detection for encrypted communications |
US11729144B2 (en) | 2016-01-04 | 2023-08-15 | Centripetal Networks, Llc | Efficient packet capture for cyber threat analysis |
US10187354B2 (en) * | 2016-01-22 | 2019-01-22 | Cisco Technology, Inc. | DHCP client lease time based threat detection for authorised users |
JP6949951B2 (en) | 2016-06-16 | 2021-10-13 | ヴァーセック システムズ,インコーポレイテッド | Systems and methods for repairing memory corruption in computer applications |
WO2018023338A1 (en) | 2016-08-01 | 2018-02-08 | 华为技术有限公司 | Network-function management method and network-function management device |
US10122750B2 (en) | 2017-01-30 | 2018-11-06 | XM Cyber Ltd | Setting-up penetration testing campaigns |
US10068095B1 (en) * | 2017-05-15 | 2018-09-04 | XM Cyber Ltd | Systems and methods for selecting a termination rule for a penetration testing campaign |
US10367846B2 (en) | 2017-11-15 | 2019-07-30 | Xm Cyber Ltd. | Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign |
EP3560170A4 (en) * | 2017-01-30 | 2020-07-29 | XM Cyber Ltd. | Penetration testing of a networked system |
US10257220B2 (en) | 2017-01-30 | 2019-04-09 | Xm Cyber Ltd. | Verifying success of compromising a network node during penetration testing of a networked system |
US10581802B2 (en) | 2017-03-16 | 2020-03-03 | Keysight Technologies Singapore (Sales) Pte. Ltd. | Methods, systems, and computer readable media for advertising network security capabilities |
US10523512B2 (en) * | 2017-03-24 | 2019-12-31 | Cisco Technology, Inc. | Network agent for generating platform specific network policies |
US10574684B2 (en) | 2017-07-09 | 2020-02-25 | Xm Cyber Ltd. | Locally detecting phishing weakness |
US10503899B2 (en) | 2017-07-10 | 2019-12-10 | Centripetal Networks, Inc. | Cyberanalysis workflow acceleration |
US10284526B2 (en) | 2017-07-24 | 2019-05-07 | Centripetal Networks, Inc. | Efficient SSL/TLS proxy |
US11233777B2 (en) | 2017-07-24 | 2022-01-25 | Centripetal Networks, Inc. | Efficient SSL/TLS proxy |
US10412112B2 (en) | 2017-08-31 | 2019-09-10 | Xm Cyber Ltd. | Time-tagged pre-defined scenarios for penetration testing |
CN109474561B (en) * | 2017-09-07 | 2021-01-08 | 中国电信股份有限公司 | Network attack degree determination method and device and security protection system |
US10447721B2 (en) | 2017-09-13 | 2019-10-15 | Xm Cyber Ltd. | Systems and methods for using multiple lateral movement strategies in penetration testing |
US11075897B2 (en) | 2017-10-20 | 2021-07-27 | Vertiv It Systems, Inc. | System and method for communicating with a service processor |
CN107864164B (en) * | 2017-12-26 | 2020-11-06 | 北京中船信息科技有限公司 | Linkage alarm device based on IP embezzlement and MAC address tampering |
US10440044B1 (en) | 2018-04-08 | 2019-10-08 | Xm Cyber Ltd. | Identifying communicating network nodes in the same local network |
US10911234B2 (en) | 2018-06-22 | 2021-02-02 | Experian Information Solutions, Inc. | System and method for a token gateway environment |
US10862866B2 (en) | 2018-06-26 | 2020-12-08 | Oracle International Corporation | Methods, systems, and computer readable media for multiple transaction capabilities application part (TCAP) operation code (opcode) screening |
US10333898B1 (en) | 2018-07-09 | 2019-06-25 | Centripetal Networks, Inc. | Methods and systems for efficient network protection |
CN109190833A (en) * | 2018-09-12 | 2019-01-11 | 泰豪科技股份有限公司 | Power station health control method, apparatus and system |
US10382473B1 (en) | 2018-09-12 | 2019-08-13 | Xm Cyber Ltd. | Systems and methods for determining optimal remediation recommendations in penetration testing |
US10469521B1 (en) | 2018-11-04 | 2019-11-05 | Xm Cyber Ltd. | Using information about exportable data in penetration testing |
WO2020121078A1 (en) | 2018-12-13 | 2020-06-18 | Xm Cyber Ltd. | Systems and methods for dynamic removal of agents from nodes of penetration testing systems |
WO2020161532A1 (en) | 2019-02-06 | 2020-08-13 | Xm Cyber Ltd. | Taking privilege escalation into account in penetration testing campaigns |
US11283827B2 (en) | 2019-02-28 | 2022-03-22 | Xm Cyber Ltd. | Lateral movement strategy during penetration testing of a networked system |
US11277442B2 (en) * | 2019-04-05 | 2022-03-15 | Cisco Technology, Inc. | Verifying the trust-worthiness of ARP senders and receivers using attestation-based methods |
US11206281B2 (en) | 2019-05-08 | 2021-12-21 | Xm Cyber Ltd. | Validating the use of user credentials in a penetration testing campaign |
US10637883B1 (en) | 2019-07-04 | 2020-04-28 | Xm Cyber Ltd. | Systems and methods for determining optimal remediation recommendations in penetration testing |
US10880326B1 (en) | 2019-08-01 | 2020-12-29 | Xm Cyber Ltd. | Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic |
US11941065B1 (en) | 2019-09-13 | 2024-03-26 | Experian Information Solutions, Inc. | Single identifier platform for storing entity data |
US11533329B2 (en) | 2019-09-27 | 2022-12-20 | Keysight Technologies, Inc. | Methods, systems and computer readable media for threat simulation and threat mitigation recommendations |
US11005878B1 (en) | 2019-11-07 | 2021-05-11 | Xm Cyber Ltd. | Cooperation between reconnaissance agents in penetration testing campaigns |
US11444961B2 (en) * | 2019-12-20 | 2022-09-13 | Intel Corporation | Active attack detection in autonomous vehicle networks |
US11575700B2 (en) | 2020-01-27 | 2023-02-07 | Xm Cyber Ltd. | Systems and methods for displaying an attack vector available to an attacker of a networked system |
US11582256B2 (en) | 2020-04-06 | 2023-02-14 | Xm Cyber Ltd. | Determining multiple ways for compromising a network node in a penetration testing campaign |
DE102021109775A1 (en) * | 2020-06-30 | 2021-12-30 | Hewlett Packard Enterprise Development Lp | ADAPTIVE TIME WINDOW-BASED DEDUPLICATION OF LOG MESSAGES |
US11362996B2 (en) | 2020-10-27 | 2022-06-14 | Centripetal Networks, Inc. | Methods and systems for efficient adaptive logging of cyber threat incidents |
CN112763936B (en) * | 2021-02-04 | 2021-11-26 | 厦门市智联信通物联网科技有限公司 | Intelligent fault processing method and system |
US11159546B1 (en) | 2021-04-20 | 2021-10-26 | Centripetal Networks, Inc. | Methods and systems for efficient threat context-aware packet filtering for network protection |
Family Cites Families (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5787161A (en) | 1995-11-13 | 1998-07-28 | Bell Communications Research, Inc. | Network designer for communication networks |
US5933645A (en) | 1996-03-19 | 1999-08-03 | Oracle Corporation | Non-invasive extensibility of software applications |
US6243667B1 (en) | 1996-05-28 | 2001-06-05 | Cisco Systems, Inc. | Network flow switching and flow data export |
US6119231A (en) | 1997-10-31 | 2000-09-12 | Cisco Technologies, Inc. | Data scanning network security technique |
US6151395A (en) | 1997-12-04 | 2000-11-21 | Cisco Technology, Inc. | System and method for regenerating secret keys in diffie-hellman communication sessions |
US6339595B1 (en) | 1997-12-23 | 2002-01-15 | Cisco Technology, Inc. | Peer-model support for virtual private networks with potentially overlapping addresses |
US6131163A (en) | 1998-02-17 | 2000-10-10 | Cisco Technology, Inc. | Network gateway mechanism having a protocol stack proxy |
US6484261B1 (en) * | 1998-02-17 | 2002-11-19 | Cisco Technology, Inc. | Graphical network security policy management |
US6134559A (en) | 1998-04-27 | 2000-10-17 | Oracle Corporation | Uniform object model having methods and additional features for integrating objects defined by different foreign object type systems into a single type system |
US6965999B2 (en) * | 1998-05-01 | 2005-11-15 | Microsoft Corporation | Intelligent trust management method and system |
US6049834A (en) | 1998-05-08 | 2000-04-11 | Cisco Technology, Inc. | Layer 3 switch unicast protocol |
US6560204B1 (en) | 1998-05-13 | 2003-05-06 | Telcordia Technologies, Inc. | Method of estimating call level traffic intensity based on channel link measurements |
US6584124B1 (en) | 1998-06-30 | 2003-06-24 | Cisco Technology, Inc. | Method and system for accessing ports of a fixed-size cell switch |
US6282546B1 (en) | 1998-06-30 | 2001-08-28 | Cisco Technology, Inc. | System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment |
US6658002B1 (en) | 1998-06-30 | 2003-12-02 | Cisco Technology, Inc. | Logical operation unit for packet processing |
US6324656B1 (en) | 1998-06-30 | 2001-11-27 | Cisco Technology, Inc. | System and method for rules-driven multi-phase network vulnerability assessment |
US6038322A (en) | 1998-10-20 | 2000-03-14 | Cisco Technology, Inc. | Group key distribution |
US6381646B2 (en) | 1998-11-03 | 2002-04-30 | Cisco Technology, Inc. | Multiple network connections from a single PPP link with partial network address translation |
US6490289B1 (en) | 1998-11-03 | 2002-12-03 | Cisco Technology, Inc. | Multiple network connections from a single PPP link with network address translation |
US6539431B1 (en) | 1998-11-12 | 2003-03-25 | Cisco Technology, Inc. | Support IP pool-based configuration |
US6427174B1 (en) | 1998-11-12 | 2002-07-30 | Cisco Technology, Inc. | Dynamic IP addressing and quality of service assurance |
US6731627B1 (en) | 1998-11-17 | 2004-05-04 | Cisco Technology, Inc. | Virtual loop carrier system |
US6530024B1 (en) * | 1998-11-20 | 2003-03-04 | Centrax Corporation | Adaptive feedback security system and method |
US6347339B1 (en) | 1998-12-01 | 2002-02-12 | Cisco Technology, Inc. | Detecting an active network node using a login attempt |
US6396833B1 (en) | 1998-12-02 | 2002-05-28 | Cisco Technology, Inc. | Per user and network routing tables |
US6327618B1 (en) | 1998-12-03 | 2001-12-04 | Cisco Technology, Inc. | Recognizing and processing conflicts in network management policies |
US6301613B1 (en) | 1998-12-03 | 2001-10-09 | Cisco Technology, Inc. | Verifying that a network management policy used by a computer system can be satisfied and is feasible for use |
US6434700B1 (en) | 1998-12-22 | 2002-08-13 | Cisco Technology, Inc. | Authentication and authorization mechanisms for Fortezza passwords |
US6301668B1 (en) | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
US6415321B1 (en) * | 1998-12-29 | 2002-07-02 | Cisco Technology, Inc. | Domain mapping method and system |
US6499107B1 (en) | 1998-12-29 | 2002-12-24 | Cisco Technology, Inc. | Method and system for adaptive network security using intelligent packet analysis |
US6490290B1 (en) | 1998-12-30 | 2002-12-03 | Cisco Technology, Inc. | Default internet traffic and transparent passthrough |
US6298383B1 (en) | 1999-01-04 | 2001-10-02 | Cisco Technology, Inc. | Integration of authentication authorization and accounting service and proxy service |
US6477651B1 (en) * | 1999-01-08 | 2002-11-05 | Cisco Technology, Inc. | Intrusion detection system and method having dynamically loaded signatures |
US6578147B1 (en) | 1999-01-15 | 2003-06-10 | Cisco Technology, Inc. | Parallel intrusion detection sensors with load balancing for high speed networks |
US6487666B1 (en) | 1999-01-15 | 2002-11-26 | Cisco Technology, Inc. | Intrusion detection signature analysis using regular expressions and logical operators |
US6567917B1 (en) | 1999-02-01 | 2003-05-20 | Cisco Technology, Inc. | Method and system for providing tamper-resistant executable software |
US6484315B1 (en) | 1999-02-01 | 2002-11-19 | Cisco Technology, Inc. | Method and system for dynamically distributing updates in a network |
US6609205B1 (en) | 1999-03-18 | 2003-08-19 | Cisco Technology, Inc. | Network intrusion detection signature analysis using decision graphs |
US6618377B1 (en) | 1999-03-30 | 2003-09-09 | Cisco Technology, Inc. | Flexible scheduling of network devices within redundant aggregate configurations |
US6433977B1 (en) * | 1999-04-16 | 2002-08-13 | Pass & Seymour, Inc. | Combo AFCI/GFCI with single test button |
US6651096B1 (en) | 1999-04-20 | 2003-11-18 | Cisco Technology, Inc. | Method and apparatus for organizing, storing and evaluating access control lists |
US6466977B1 (en) | 1999-05-06 | 2002-10-15 | Cisco Technology, Inc. | Proxy on demand |
US6463474B1 (en) | 1999-07-02 | 2002-10-08 | Cisco Technology, Inc. | Local authentication of a client at a network device |
US6684331B1 (en) | 1999-12-22 | 2004-01-27 | Cisco Technology, Inc. | Method and apparatus for distributing and updating group controllers over a wide area network using a tree structure |
US6671811B1 (en) * | 1999-10-25 | 2003-12-30 | Visa Internation Service Association | Features generation for use in computer network intrusion detection |
US6597957B1 (en) | 1999-12-20 | 2003-07-22 | Cisco Technology, Inc. | System and method for consolidating and sorting event data |
US6553489B1 (en) | 2000-01-12 | 2003-04-22 | Cisco Technology, Inc. | System and method for secure and efficient universal port configuration |
JP2001273388A (en) * | 2000-01-20 | 2001-10-05 | Hitachi Ltd | System and method for security management |
US7475405B2 (en) * | 2000-09-06 | 2009-01-06 | International Business Machines Corporation | Method and system for detecting unusual events and application thereof in computer intrusion detection |
US7124440B2 (en) | 2000-09-07 | 2006-10-17 | Mazu Networks, Inc. | Monitoring network traffic denial of service attacks |
US7681032B2 (en) * | 2001-03-12 | 2010-03-16 | Portauthority Technologies Inc. | System and method for monitoring unauthorized transport of digital content |
US6965574B1 (en) | 2001-06-20 | 2005-11-15 | Arbor Networks, Inc. | Network traffic data collection and query |
AU2002312567A1 (en) | 2001-06-20 | 2003-01-08 | Arbor Networks, Inc. | Detecting network misuse |
US6792555B2 (en) | 2001-08-23 | 2004-09-14 | Cisco Technology, Inc. | Access server fault isolation without service disruption method and apparatus |
US8245297B2 (en) * | 2001-09-04 | 2012-08-14 | E-Cop Pte. Ltd. | Computer security event management system |
US20030065942A1 (en) * | 2001-09-28 | 2003-04-03 | Lineman David J. | Method and apparatus for actively managing security policies for users and computers in a network |
US6680998B1 (en) | 2001-11-19 | 2004-01-20 | Cisco Technology, Inc. | Providing private network information during emergency calls |
CA2467813C (en) | 2001-11-30 | 2014-01-07 | Oracle International Corporation | Real composite objects for providing high availability of resources on networked systems |
CN1349190A (en) * | 2001-12-03 | 2002-05-15 | 上海交通大学 | Central network medium safety monitoring system |
US7079520B2 (en) | 2001-12-28 | 2006-07-18 | Cisco Technology, Inc. | Methods and apparatus for implementing NAT traversal in mobile IP |
US7739393B2 (en) | 2002-01-28 | 2010-06-15 | Cisco Technology, Inc. | Apparatus and method for restoring traffic during failover in a cable head end |
US7114005B2 (en) | 2002-02-05 | 2006-09-26 | Cisco Technology, Inc. | Address hopping of packet-based communications |
US7284057B2 (en) | 2002-02-27 | 2007-10-16 | Cisco Technology, Inc. | Methods and apparatus for Mobile IP Home Agent clustering |
US8090828B2 (en) | 2002-03-05 | 2012-01-03 | Cisco Technology, Inc. | Method and apparatus for reusing DHCP addresses in home addresses of mobile IP clients |
US7461169B2 (en) | 2002-03-05 | 2008-12-02 | Cisco Technology, Inc. | DHCP based home address management of mobile IP clients |
US20030224788A1 (en) | 2002-03-05 | 2003-12-04 | Cisco Technology, Inc. | Mobile IP roaming between internal and external networks |
US6941467B2 (en) * | 2002-03-08 | 2005-09-06 | Ciphertrust, Inc. | Systems and methods for adaptive message interrogation through multiple queues |
US7137145B2 (en) | 2002-04-09 | 2006-11-14 | Cisco Technology, Inc. | System and method for detecting an infective element in a network environment |
US7290064B2 (en) | 2002-06-24 | 2007-10-30 | Cisco Technology, Inc. | Adaptive feedback technique implemented in mobile IP networks |
US7437760B2 (en) * | 2002-10-10 | 2008-10-14 | International Business Machines Corporation | Antiviral network system |
US7603711B2 (en) * | 2002-10-31 | 2009-10-13 | Secnap Networks Security, LLC | Intrusion detection system |
KR100456634B1 (en) * | 2002-10-31 | 2004-11-10 | 한국전자통신연구원 | Alert transmission apparatus and method for policy-based intrusion detection & response |
US7454499B2 (en) * | 2002-11-07 | 2008-11-18 | Tippingpoint Technologies, Inc. | Active network defense system and method |
-
2003
- 2003-10-16 US US10/688,051 patent/US7237267B2/en active Active
-
2004
- 2004-10-13 CN CNB2004800284987A patent/CN100421086C/en not_active Expired - Fee Related
- 2004-10-13 AU AU2004282937A patent/AU2004282937B2/en not_active Expired - Fee Related
- 2004-10-13 EP EP04795046A patent/EP1678615A4/en not_active Withdrawn
- 2004-10-13 CA CA002541934A patent/CA2541934A1/en not_active Abandoned
- 2004-10-13 WO PCT/US2004/033828 patent/WO2005038598A2/en active Application Filing
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005038598B1 (en) | Policy-based network security management | |
US10904112B2 (en) | Automatic capture of detailed analysis information based on remote server analysis | |
US8204928B2 (en) | System and method for analyzing internet usage | |
US7953691B2 (en) | Performance evaluating apparatus, performance evaluating method, and program | |
CN105812177B (en) | A kind of network failure processing method and processing equipment | |
US8166351B2 (en) | Filtering redundant events based on a statistical correlation between events | |
US20160142435A1 (en) | Systems and methods for detection of anomalous network behavior | |
KR100892415B1 (en) | Cyber Threat Forecasting System and Method therefor | |
JP2010117757A (en) | Performance monitoring system and performance monitoring method | |
CN105072139B (en) | Recommend method and apparatus | |
CN104836781A (en) | Method distinguishing identities of access users, and device | |
US9311598B1 (en) | Automatic capture of detailed analysis information for web application outliers with very low overhead | |
CN107943677A (en) | Application performance monitoring method, device, readable storage medium storing program for executing and electronic equipment | |
CN110933115B (en) | Analysis object behavior abnormity detection method and device based on dynamic session | |
US20160124833A1 (en) | Analyzing physical machine impact on business transaction performance | |
JP2007164465A (en) | Client security management system | |
CN111581258A (en) | Safety data analysis method, device, system, equipment and storage medium | |
CN104883705B (en) | A kind of the problem of data service is complained localization method and device | |
KR101405309B1 (en) | Apparatus and method for estimation of disease transmission situation using social network service data | |
Goseva-Popstojanova et al. | A contribution towards solving the web workload puzzle | |
CN111325422A (en) | Work order distribution method and system | |
CN103957230B (en) | A kind of client user's number determines method, server, client and system | |
JP6517468B2 (en) | INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING APPARATUS, MONITORING APPARATUS, MONITORING METHOD, AND PROGRAM | |
US20090055420A1 (en) | Method, system, and computer program product for identifying common factors associated with network activity with reduced resource utilization | |
KR101326804B1 (en) | Distributed denial of service detection method and system |