CA2436096A1 - Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures - Google Patents
Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures Download PDFInfo
- Publication number
- CA2436096A1 CA2436096A1 CA002436096A CA2436096A CA2436096A1 CA 2436096 A1 CA2436096 A1 CA 2436096A1 CA 002436096 A CA002436096 A CA 002436096A CA 2436096 A CA2436096 A CA 2436096A CA 2436096 A1 CA2436096 A1 CA 2436096A1
- Authority
- CA
- Canada
- Prior art keywords
- security
- security subsystem
- subsystem
- master system
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Abstract
A method and apparatus for verifying the integrity of devices on a target network (100) having two components: a subsystem (50) connected to the target network (100), and a master system (60), isolated therefrom by a secure lin (52). The topological and hierarchical relationship of the devices to each other improves stability of the apparatus. Random testing of the subsystem (50) by the master system (60) provide verification and independent self-checking.
Claims (12)
1. A security system for a computer connected to a network of computers comprising:
at least one security subsystem associated with said computer, said subsystem configured to detect attacks on said computer;
and a secure link between said security subsystem and a master system enabling data communication therebetween; wherein said master system monitors said security subsystem through said secure link and registers information pertaining to attacks detected by said security subsystem.
at least one security subsystem associated with said computer, said subsystem configured to detect attacks on said computer;
and a secure link between said security subsystem and a master system enabling data communication therebetween; wherein said master system monitors said security subsystem through said secure link and registers information pertaining to attacks detected by said security subsystem.
2. The security system of Claim 1 further comprising a pseudo attack generator associated with said master system for generating attacks on said computer detectable by said security subsystem wherein said master system monitors said security subsystem by comparing said pseudo-attacks to said attacks detected by the security subsystem.
3. The security system of Claim 1 wherein said master system is hierarchically independent from said security subsystem.
4. The security system of Claim 1 wherein said security subsystem is hierarchically subordinate to said master system.
5. A network security system for a target network of computers comprising:
at least one security subsystem associated with said target network, said subsystem configured to detect attacks on said network; and a secure link between said security subsystem and a master system enabling data communication therebetween; wherein said master system monitors said security subsystem through said secure link and registers information pertaining to the attacks detected by said security subsystem.
at least one security subsystem associated with said target network, said subsystem configured to detect attacks on said network; and a secure link between said security subsystem and a master system enabling data communication therebetween; wherein said master system monitors said security subsystem through said secure link and registers information pertaining to the attacks detected by said security subsystem.
6. The network security system of Claim 5 wherein said master system is hierarchically independent from said security subsystem.
7. The network security system of Claim 5 wherein said security subsystem is hierarchically subordinate to said master system.
8. A network security system for a target network of computers comprising:
at least one security subsystem associated with said target network and configured to detect and register attacks on said target network;
a secure link for data communication between said security subsystem and said master system; and testing means associated with said master system for generating pseudo-attacks on said target network initiated by said master system and detectable by said security subsystem;
wherein said master system monitors said security subsystem through said secure link by comparing the pseudo-attacks generated by said testing means to the detected attacks registered by said security subsytem.
at least one security subsystem associated with said target network and configured to detect and register attacks on said target network;
a secure link for data communication between said security subsystem and said master system; and testing means associated with said master system for generating pseudo-attacks on said target network initiated by said master system and detectable by said security subsystem;
wherein said master system monitors said security subsystem through said secure link by comparing the pseudo-attacks generated by said testing means to the detected attacks registered by said security subsytem.
9. The network security system of Claim 8 wherein said master system is hierarchically independent from said security subsystem.
10. The network security system of Claim 8 wherein said security subsystem is hierarchically subordinate to said master system.
11. A method for monitoring the integrity of a security subsystem associated with a target network of computers and configured to detect attacks on said network of computers comprising:
establishing a secure link for the transfer of data between said security subsystem and a master system hierarchically independent from said security subsystem;
monitoring the status of said security subsystem through said secure link; and registering information pertaining to the status of said security subsystem.
establishing a secure link for the transfer of data between said security subsystem and a master system hierarchically independent from said security subsystem;
monitoring the status of said security subsystem through said secure link; and registering information pertaining to the status of said security subsystem.
12. The method for monitoring the integrity of a security system of Claim 11 including the steps of:
connecting said master system and said target network separately to an open network of computers;
generating at least one pseudo-attack in said master system, said pseudo attack being detectable by said security subsystem;
generating in said master system a list of expected responses to said at least one pseudo-attack;
delivering said at least on pseudo-attack over said open network to said target network; and comparing the response of said security subsystem to said pseudo-attack to the list of expected responses thereto.
connecting said master system and said target network separately to an open network of computers;
generating at least one pseudo-attack in said master system, said pseudo attack being detectable by said security subsystem;
generating in said master system a list of expected responses to said at least one pseudo-attack;
delivering said at least on pseudo-attack over said open network to said target network; and comparing the response of said security subsystem to said pseudo-attack to the list of expected responses thereto.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/770,525 | 2001-01-25 | ||
US09/770,525 US7168093B2 (en) | 2001-01-25 | 2001-01-25 | Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures |
PCT/US2002/002218 WO2002060117A1 (en) | 2001-01-25 | 2002-01-24 | Method and apparatus for verifying the integrity of computer networks and implementation of counter measures |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2436096A1 true CA2436096A1 (en) | 2002-08-01 |
CA2436096C CA2436096C (en) | 2011-08-30 |
Family
ID=25088850
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2436096A Expired - Lifetime CA2436096C (en) | 2001-01-25 | 2002-01-24 | Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures |
Country Status (6)
Country | Link |
---|---|
US (7) | US7168093B2 (en) |
EP (1) | EP1356626B1 (en) |
JP (1) | JP2004525446A (en) |
CA (1) | CA2436096C (en) |
ES (1) | ES2662901T3 (en) |
WO (1) | WO2002060117A1 (en) |
Families Citing this family (327)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7765581B1 (en) | 1999-12-10 | 2010-07-27 | Oracle America, Inc. | System and method for enabling scalable security in a virtual private network |
US6957348B1 (en) * | 2000-01-10 | 2005-10-18 | Ncircle Network Security, Inc. | Interoperability of vulnerability and intrusion detection systems |
US7574740B1 (en) | 2000-04-28 | 2009-08-11 | International Business Machines Corporation | Method and system for intrusion detection in a computer network |
CN1313897C (en) * | 2000-05-19 | 2007-05-02 | 网景通信公司 | Adaptive multi-tier authentication system |
US7174454B2 (en) * | 2002-11-19 | 2007-02-06 | America Online, Inc. | System and method for establishing historical usage-based hardware trust |
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US7181769B1 (en) * | 2000-08-25 | 2007-02-20 | Ncircle Network Security, Inc. | Network security system having a device profiler communicatively coupled to a traffic monitor |
US20020090997A1 (en) * | 2000-12-15 | 2002-07-11 | Liveplanet | System for integrated media presentation |
US7168093B2 (en) | 2001-01-25 | 2007-01-23 | Solutionary, Inc. | Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures |
GB2372673B (en) * | 2001-02-27 | 2003-05-28 | 3Com Corp | Apparatus and method for processing data relating to events on a network |
US7185232B1 (en) | 2001-02-28 | 2007-02-27 | Cenzic, Inc. | Fault injection methods and apparatus |
US20020154635A1 (en) * | 2001-04-23 | 2002-10-24 | Sun Microsystems, Inc. | System and method for extending private networks onto public infrastructure using supernets |
US7350234B2 (en) * | 2001-06-11 | 2008-03-25 | Research Triangle Institute | Intrusion tolerant communication networks and associated methods |
US7594267B2 (en) * | 2001-06-14 | 2009-09-22 | Cisco Technology, Inc. | Stateful distributed event processing and adaptive security |
DE60135449D1 (en) * | 2001-06-14 | 2008-10-02 | Ibm | Intrusion detection in data processing systems |
US7222359B2 (en) * | 2001-07-27 | 2007-05-22 | Check Point Software Technologies, Inc. | System methodology for automatic local network discovery and firewall reconfiguration for mobile computing devices |
US8001594B2 (en) * | 2001-07-30 | 2011-08-16 | Ipass, Inc. | Monitoring computer network security enforcement |
US7058975B2 (en) * | 2001-12-14 | 2006-06-06 | Mcafee, Inc. | Method and system for delayed write scanning for detecting computer malwares |
US7257630B2 (en) | 2002-01-15 | 2007-08-14 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7664845B2 (en) * | 2002-01-15 | 2010-02-16 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7543056B2 (en) | 2002-01-15 | 2009-06-02 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7401149B2 (en) * | 2002-02-22 | 2008-07-15 | International Business Machines Corporation | Method for automatically providing a temporary user account for servicing system resources |
US7694128B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for secure communication delivery |
US7096498B2 (en) | 2002-03-08 | 2006-08-22 | Cipher Trust, Inc. | Systems and methods for message threat management |
US7693947B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for graphically displaying messaging traffic |
US8132250B2 (en) | 2002-03-08 | 2012-03-06 | Mcafee, Inc. | Message profiling systems and methods |
US7903549B2 (en) | 2002-03-08 | 2011-03-08 | Secure Computing Corporation | Content-based policy compliance systems and methods |
US20060015942A1 (en) | 2002-03-08 | 2006-01-19 | Ciphertrust, Inc. | Systems and methods for classification of messaging entities |
US8561167B2 (en) | 2002-03-08 | 2013-10-15 | Mcafee, Inc. | Web reputation scoring |
US7124438B2 (en) | 2002-03-08 | 2006-10-17 | Ciphertrust, Inc. | Systems and methods for anomaly detection in patterns of monitored communications |
US8578480B2 (en) * | 2002-03-08 | 2013-11-05 | Mcafee, Inc. | Systems and methods for identifying potentially malicious messages |
US7870203B2 (en) * | 2002-03-08 | 2011-01-11 | Mcafee, Inc. | Methods and systems for exposing messaging reputation to an end user |
AU2003223379A1 (en) | 2002-03-29 | 2003-10-13 | Global Dataguard, Inc. | Adaptive behavioral intrusion detection systems and methods |
US7484097B2 (en) * | 2002-04-04 | 2009-01-27 | Symantec Corporation | Method and system for communicating data to and from network security devices |
WO2003100559A2 (en) * | 2002-05-20 | 2003-12-04 | Airdefense, Inc. | System and method for making managing wireless network activity |
US7058796B2 (en) | 2002-05-20 | 2006-06-06 | Airdefense, Inc. | Method and system for actively defending a wireless LAN against attacks |
TWI244297B (en) * | 2002-06-12 | 2005-11-21 | Thomson Licensing Sa | Apparatus and method adapted to communicate via a network |
US20040064722A1 (en) * | 2002-10-01 | 2004-04-01 | Dinesh Neelay | System and method for propagating patches to address vulnerabilities in computers |
US8407798B1 (en) | 2002-10-01 | 2013-03-26 | Skybox Secutiry Inc. | Method for simulation aided security event management |
US8359650B2 (en) * | 2002-10-01 | 2013-01-22 | Skybox Secutiry Inc. | System, method and computer readable medium for evaluating potential attacks of worms |
US8001271B1 (en) * | 2002-10-21 | 2011-08-16 | Arbor Networks, Inc. | Method and apparatus for locating naming discrepancies |
EP1563393A4 (en) * | 2002-10-22 | 2010-12-22 | Unho Choi | Integrated emergency response system in information infrastructure and operating method therefor |
US8327436B2 (en) * | 2002-10-25 | 2012-12-04 | Randle William M | Infrastructure architecture for secure network management with peer to peer functionality |
US7603711B2 (en) * | 2002-10-31 | 2009-10-13 | Secnap Networks Security, LLC | Intrusion detection system |
US7353539B2 (en) * | 2002-11-04 | 2008-04-01 | Hewlett-Packard Development Company, L.P. | Signal level propagation mechanism for distribution of a payload to vulnerable systems |
US8230497B2 (en) * | 2002-11-04 | 2012-07-24 | Hewlett-Packard Development Company, L.P. | Method of identifying software vulnerabilities on a computer system |
US7353538B2 (en) * | 2002-11-08 | 2008-04-01 | Federal Network Systems Llc | Server resource management, analysis, and intrusion negation |
US7669229B2 (en) * | 2002-11-13 | 2010-02-23 | Intel Corporation | Network protecting authentication proxy |
US7607169B1 (en) | 2002-12-02 | 2009-10-20 | Arcsight, Inc. | User interface for network security console |
US8176527B1 (en) | 2002-12-02 | 2012-05-08 | Hewlett-Packard Development Company, L. P. | Correlation engine with support for time-based rules |
US7219239B1 (en) | 2002-12-02 | 2007-05-15 | Arcsight, Inc. | Method for batching events for transmission by software agent |
US7788722B1 (en) | 2002-12-02 | 2010-08-31 | Arcsight, Inc. | Modular agent for network security intrusion detection system |
US7650638B1 (en) | 2002-12-02 | 2010-01-19 | Arcsight, Inc. | Network security monitoring system employing bi-directional communication |
US7899901B1 (en) | 2002-12-02 | 2011-03-01 | Arcsight, Inc. | Method and apparatus for exercising and debugging correlations for network security system |
US7376969B1 (en) | 2002-12-02 | 2008-05-20 | Arcsight, Inc. | Real time monitoring and analysis of events from multiple network security devices |
US7913303B1 (en) * | 2003-01-21 | 2011-03-22 | International Business Machines Corporation | Method and system for dynamically protecting a computer system from attack |
US7523503B2 (en) * | 2003-01-21 | 2009-04-21 | Hewlett-Packard Development Company, L.P. | Method for protecting security of network intrusion detection sensors |
US8533828B2 (en) * | 2003-01-21 | 2013-09-10 | Hewlett-Packard Development Company, L.P. | System for protecting security of a provisionable network |
JP4120415B2 (en) * | 2003-02-10 | 2008-07-16 | 株式会社日立製作所 | Traffic control computer |
US8091117B2 (en) | 2003-02-14 | 2012-01-03 | Preventsys, Inc. | System and method for interfacing with heterogeneous network data gathering tools |
JP3945438B2 (en) * | 2003-03-28 | 2007-07-18 | コニカミノルタビジネステクノロジーズ株式会社 | Control program and control device |
US7631351B2 (en) * | 2003-04-03 | 2009-12-08 | Commvault Systems, Inc. | System and method for performing storage operations through a firewall |
US20040250121A1 (en) * | 2003-05-06 | 2004-12-09 | Keith Millar | Assessing security of information technology |
BR0307030A (en) * | 2003-05-17 | 2005-03-08 | Microsoft Corp | Security Risk Assessment Mechanism |
US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
US20070113272A2 (en) | 2003-07-01 | 2007-05-17 | Securityprofiling, Inc. | Real-time vulnerability monitoring |
US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US7386887B2 (en) * | 2003-07-01 | 2008-06-10 | International Business Machines Corporation | System and method for denying unauthorized access to a private data processing network |
US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US7386883B2 (en) | 2003-07-22 | 2008-06-10 | International Business Machines Corporation | Systems, methods and computer program products for administration of computer security threat countermeasures to a computer system |
US20050022021A1 (en) * | 2003-07-22 | 2005-01-27 | Bardsley Jeffrey S. | Systems, methods and data structures for generating computer-actionable computer security threat management information |
US7228564B2 (en) * | 2003-07-24 | 2007-06-05 | Hewlett-Packard Development Company, L.P. | Method for configuring a network intrusion detection system |
US7890999B2 (en) * | 2003-08-07 | 2011-02-15 | Hewlett-Packard Development Company, L.P. | RPC port mapper integrity checker to improve security of a provisionable network |
US7260844B1 (en) | 2003-09-03 | 2007-08-21 | Arcsight, Inc. | Threat detection in a network security system |
US9027120B1 (en) | 2003-10-10 | 2015-05-05 | Hewlett-Packard Development Company, L.P. | Hierarchical architecture in a network security system |
US8015604B1 (en) | 2003-10-10 | 2011-09-06 | Arcsight Inc | Hierarchical architecture in a network security system |
US7333999B1 (en) | 2003-10-30 | 2008-02-19 | Arcsight, Inc. | Expression editor |
JP4351517B2 (en) * | 2003-11-14 | 2009-10-28 | 株式会社日立製作所 | Data center device management method, device management server, data center device management system and program |
US8656039B2 (en) | 2003-12-10 | 2014-02-18 | Mcafee, Inc. | Rule parser |
US8548170B2 (en) | 2003-12-10 | 2013-10-01 | Mcafee, Inc. | Document de-registration |
US7565696B1 (en) | 2003-12-10 | 2009-07-21 | Arcsight, Inc. | Synchronizing network security devices within a network security system |
US20050201297A1 (en) * | 2003-12-12 | 2005-09-15 | Cyrus Peikari | Diagnosis of embedded, wireless mesh networks with real-time, flexible, location-specific signaling |
US8561154B2 (en) * | 2003-12-22 | 2013-10-15 | International Business Machines Corporation | Method for providing network perimeter security assessment |
US8954420B1 (en) | 2003-12-31 | 2015-02-10 | Google Inc. | Methods and systems for improving a search ranking using article information |
US20050149498A1 (en) * | 2003-12-31 | 2005-07-07 | Stephen Lawrence | Methods and systems for improving a search ranking using article information |
GB2410647A (en) * | 2004-01-31 | 2005-08-03 | Hewlett Packard Development Co | Identifying and Patching Vulnerabilities in a Network |
US7594263B2 (en) * | 2004-02-05 | 2009-09-22 | International Business Machines Corporation | Operating a communication network through use of blocking measures for responding to communication traffic anomalies |
US7523494B2 (en) * | 2004-02-05 | 2009-04-21 | International Business Machines Corporation | Determining blocking measures for processing communication traffic anomalies |
US7370345B2 (en) * | 2004-03-02 | 2008-05-06 | Lenovo Singapore Pte. Ltd | Domain controlling systems, methods and computer program products for administration of computer security threat countermeasures to a domain of target computer systems |
US7581227B1 (en) | 2004-03-31 | 2009-08-25 | Google Inc. | Systems and methods of synchronizing indexes |
US8161053B1 (en) | 2004-03-31 | 2012-04-17 | Google Inc. | Methods and systems for eliminating duplicate events |
US8386728B1 (en) | 2004-03-31 | 2013-02-26 | Google Inc. | Methods and systems for prioritizing a crawl |
US8275839B2 (en) | 2004-03-31 | 2012-09-25 | Google Inc. | Methods and systems for processing email messages |
US8631076B1 (en) | 2004-03-31 | 2014-01-14 | Google Inc. | Methods and systems for associating instant messenger events |
US7333976B1 (en) | 2004-03-31 | 2008-02-19 | Google Inc. | Methods and systems for processing contact information |
US7725508B2 (en) | 2004-03-31 | 2010-05-25 | Google Inc. | Methods and systems for information capture and retrieval |
DE102004016580B4 (en) * | 2004-03-31 | 2008-11-20 | Nec Europe Ltd. | Method of transmitting data in an ad hoc network or a sensor network |
US8346777B1 (en) | 2004-03-31 | 2013-01-01 | Google Inc. | Systems and methods for selectively storing event data |
US20050223027A1 (en) * | 2004-03-31 | 2005-10-06 | Lawrence Stephen R | Methods and systems for structuring event data in a database for location and retrieval |
US8099407B2 (en) | 2004-03-31 | 2012-01-17 | Google Inc. | Methods and systems for processing media files |
US8201257B1 (en) | 2004-03-31 | 2012-06-12 | Mcafee, Inc. | System and method of managing network security risks |
US7680888B1 (en) | 2004-03-31 | 2010-03-16 | Google Inc. | Methods and systems for processing instant messenger messages |
US7412708B1 (en) | 2004-03-31 | 2008-08-12 | Google Inc. | Methods and systems for capturing information |
US7941439B1 (en) | 2004-03-31 | 2011-05-10 | Google Inc. | Methods and systems for information capture |
TWI263915B (en) * | 2004-04-02 | 2006-10-11 | Hon Hai Prec Ind Co Ltd | System and method for logging event of telecommunications devices |
US7966658B2 (en) * | 2004-04-08 | 2011-06-21 | The Regents Of The University Of California | Detecting public network attacks using signatures and fast content analysis |
US8528077B1 (en) * | 2004-04-09 | 2013-09-03 | Hewlett-Packard Development Company, L.P. | Comparing events from multiple network security devices |
US7509677B2 (en) | 2004-05-04 | 2009-03-24 | Arcsight, Inc. | Pattern discovery in a network security system |
US7966391B2 (en) * | 2004-05-11 | 2011-06-21 | Todd J. Anderson | Systems, apparatus and methods for managing networking devices |
US7698275B2 (en) * | 2004-05-21 | 2010-04-13 | Computer Associates Think, Inc. | System and method for providing remediation management |
US20050283840A1 (en) * | 2004-06-18 | 2005-12-22 | Daniel Le Metayer | Method for the automatic analysis of security requirements of information technology system |
US8458793B2 (en) * | 2004-07-13 | 2013-06-04 | International Business Machines Corporation | Methods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems |
US7665119B2 (en) | 2004-09-03 | 2010-02-16 | Secure Elements, Inc. | Policy-based selection of remediation |
US8195781B2 (en) * | 2004-08-19 | 2012-06-05 | Hewlett-Packard Development Company, L.P. | Network management with scalable trap definitions |
JP2006139747A (en) * | 2004-08-30 | 2006-06-01 | Kddi Corp | Communication system, and security assurance device |
US8196199B2 (en) | 2004-10-19 | 2012-06-05 | Airdefense, Inc. | Personal wireless monitoring agent |
US9100422B1 (en) | 2004-10-27 | 2015-08-04 | Hewlett-Packard Development Company, L.P. | Network zone identification in a network security system |
US7644438B1 (en) | 2004-10-27 | 2010-01-05 | Arcsight, Inc. | Security event aggregation at software agent |
US7424742B1 (en) | 2004-10-27 | 2008-09-09 | Arcsight, Inc. | Dynamic security events and event channels in a network security system |
US8635690B2 (en) | 2004-11-05 | 2014-01-21 | Mcafee, Inc. | Reputation based message processing |
US20060242694A1 (en) * | 2004-11-08 | 2006-10-26 | Jeffrey Gold | Mitigation and mitigation management of attacks in networked systems |
US7936682B2 (en) * | 2004-11-09 | 2011-05-03 | Cisco Technology, Inc. | Detecting malicious attacks using network behavior and header analysis |
US8010685B2 (en) * | 2004-11-09 | 2011-08-30 | Cisco Technology, Inc. | Method and apparatus for content classification |
US20060129810A1 (en) * | 2004-12-14 | 2006-06-15 | Electronics And Telecommunications Research Institute | Method and apparatus for evaluating security of subscriber network |
US7809131B1 (en) | 2004-12-23 | 2010-10-05 | Arcsight, Inc. | Adjusting sensor time in a network security system |
US7647632B1 (en) | 2005-01-04 | 2010-01-12 | Arcsight, Inc. | Object reference in a system |
US9323922B2 (en) * | 2005-01-06 | 2016-04-26 | Oracle International Corporation | Dynamically differentiating service in a database based on a security profile of a user |
US7934257B1 (en) * | 2005-01-07 | 2011-04-26 | Symantec Corporation | On-box active reconnaissance |
US8850565B2 (en) * | 2005-01-10 | 2014-09-30 | Hewlett-Packard Development Company, L.P. | System and method for coordinating network incident response activities |
US7310669B2 (en) * | 2005-01-19 | 2007-12-18 | Lockdown Networks, Inc. | Network appliance for vulnerability assessment auditing over multiple networks |
US9325728B1 (en) | 2005-01-27 | 2016-04-26 | Leidos, Inc. | Systems and methods for implementing and scoring computer network defense exercises |
US8266320B1 (en) | 2005-01-27 | 2012-09-11 | Science Applications International Corporation | Computer network defense |
US8250654B1 (en) | 2005-01-27 | 2012-08-21 | Science Applications International Corporation | Systems and methods for implementing and scoring computer network defense exercises |
US20060191007A1 (en) * | 2005-02-24 | 2006-08-24 | Sanjiva Thielamay | Security force automation |
US7844999B1 (en) | 2005-03-01 | 2010-11-30 | Arcsight, Inc. | Message parsing in a network security system |
US7640591B1 (en) * | 2005-04-22 | 2009-12-29 | Sun Microsystems, Inc. | Method and apparatus for limiting denial of service attack by limiting traffic for hosts |
WO2006124025A1 (en) * | 2005-05-17 | 2006-11-23 | Computer Associates Think, Inc. | Method and apparatus for providing computer security |
US7788723B2 (en) * | 2005-05-17 | 2010-08-31 | Computer Associates Think, Inc. | Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning |
US7937480B2 (en) | 2005-06-02 | 2011-05-03 | Mcafee, Inc. | Aggregation of reputation data |
US20060281056A1 (en) * | 2005-06-09 | 2006-12-14 | Battelle Memorial Institute | System administrator training system and method |
US20070002736A1 (en) * | 2005-06-16 | 2007-01-04 | Cisco Technology, Inc. | System and method for improving network resource utilization |
GB0513375D0 (en) * | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
CN100466599C (en) * | 2005-07-22 | 2009-03-04 | 上海贝尔阿尔卡特股份有限公司 | Safety access method for special local area net and device used for said method |
US7907608B2 (en) | 2005-08-12 | 2011-03-15 | Mcafee, Inc. | High speed packet capture |
CA2623120C (en) | 2005-10-05 | 2015-03-24 | Byres Security Inc. | Network security appliance |
US8146146B1 (en) * | 2005-12-23 | 2012-03-27 | At&T Intellectual Property Ii, L.P. | Method and apparatus for integrated network security alert information retrieval |
US20070192344A1 (en) * | 2005-12-29 | 2007-08-16 | Microsoft Corporation | Threats and countermeasures schema |
US7890315B2 (en) | 2005-12-29 | 2011-02-15 | Microsoft Corporation | Performance engineering and the application life cycle |
US20070156420A1 (en) * | 2005-12-29 | 2007-07-05 | Microsoft Corporation | Performance modeling and the application life cycle |
US20070157311A1 (en) * | 2005-12-29 | 2007-07-05 | Microsoft Corporation | Security modeling and the application life cycle |
US9262446B1 (en) | 2005-12-29 | 2016-02-16 | Google Inc. | Dynamically ranking entries in a personal data book |
US7715800B2 (en) | 2006-01-13 | 2010-05-11 | Airdefense, Inc. | Systems and methods for wireless intrusion detection using spectral analysis |
US8443442B2 (en) * | 2006-01-31 | 2013-05-14 | The Penn State Research Foundation | Signature-free buffer overflow attack blocker |
US7818788B2 (en) * | 2006-02-14 | 2010-10-19 | Microsoft Corporation | Web application security frame |
US7712137B2 (en) * | 2006-02-27 | 2010-05-04 | Microsoft Corporation | Configuring and organizing server security information |
US7971251B2 (en) | 2006-03-17 | 2011-06-28 | Airdefense, Inc. | Systems and methods for wireless security using distributed collaboration of wireless clients |
US7437359B2 (en) | 2006-04-05 | 2008-10-14 | Arcsight, Inc. | Merging multiple log entries in accordance with merge properties and mapping properties |
US7958227B2 (en) | 2006-05-22 | 2011-06-07 | Mcafee, Inc. | Attributes of captured objects in a capture system |
US7970013B2 (en) | 2006-06-16 | 2011-06-28 | Airdefense, Inc. | Systems and methods for wireless network content filtering |
US8281392B2 (en) | 2006-08-11 | 2012-10-02 | Airdefense, Inc. | Methods and systems for wired equivalent privacy and Wi-Fi protected access protection |
US20080072321A1 (en) * | 2006-09-01 | 2008-03-20 | Mark Wahl | System and method for automating network intrusion training |
US8453234B2 (en) * | 2006-09-20 | 2013-05-28 | Clearwire Ip Holdings Llc | Centralized security management system |
US7551073B2 (en) * | 2007-01-10 | 2009-06-23 | International Business Machines Corporation | Method, system and program product for alerting an information technology support organization of a security event |
US8898276B1 (en) | 2007-01-11 | 2014-11-25 | Crimson Corporation | Systems and methods for monitoring network ports to redirect computing devices to a protected network |
US8214497B2 (en) | 2007-01-24 | 2012-07-03 | Mcafee, Inc. | Multi-dimensional reputation scoring |
US8763114B2 (en) | 2007-01-24 | 2014-06-24 | Mcafee, Inc. | Detecting image spam |
US7949716B2 (en) | 2007-01-24 | 2011-05-24 | Mcafee, Inc. | Correlation and analysis of entity attributes |
US8179798B2 (en) | 2007-01-24 | 2012-05-15 | Mcafee, Inc. | Reputation based connection throttling |
US7779156B2 (en) | 2007-01-24 | 2010-08-17 | Mcafee, Inc. | Reputation based load balancing |
US9218500B2 (en) * | 2007-02-26 | 2015-12-22 | Secure Islands Technologies Ltd. | System and method for automatic data protection in a computer network |
US8955105B2 (en) * | 2007-03-14 | 2015-02-10 | Microsoft Corporation | Endpoint enabled for enterprise security assessment sharing |
US8413247B2 (en) * | 2007-03-14 | 2013-04-02 | Microsoft Corporation | Adaptive data collection for root-cause analysis and intrusion detection |
US8959568B2 (en) * | 2007-03-14 | 2015-02-17 | Microsoft Corporation | Enterprise security assessment sharing |
US20080229419A1 (en) * | 2007-03-16 | 2008-09-18 | Microsoft Corporation | Automated identification of firewall malware scanner deficiencies |
US8140666B2 (en) * | 2007-03-29 | 2012-03-20 | International Business Machines Corporation | Method and apparatus for network distribution and provisioning of applications across multiple domains |
US7770203B2 (en) * | 2007-04-17 | 2010-08-03 | International Business Machines Corporation | Method of integrating a security operations policy into a threat management vector |
US7912894B2 (en) * | 2007-05-15 | 2011-03-22 | Adams Phillip M | Computerized, copy-detection and discrimination apparatus and method |
US20080295153A1 (en) * | 2007-05-24 | 2008-11-27 | Zhidan Cheng | System and method for detection and communication of computer infection status in a networked environment |
US8646081B1 (en) | 2007-10-15 | 2014-02-04 | Sprint Communications Company L.P. | Method and system to detect a security event in a packet flow and block the packet flow at an egress point in a communication network |
US20090113039A1 (en) * | 2007-10-25 | 2009-04-30 | At&T Knowledge Ventures, L.P. | Method and system for content handling |
US8185930B2 (en) | 2007-11-06 | 2012-05-22 | Mcafee, Inc. | Adjusting filter or classification control settings |
US8045458B2 (en) | 2007-11-08 | 2011-10-25 | Mcafee, Inc. | Prioritizing network traffic |
US20090171678A1 (en) * | 2007-12-26 | 2009-07-02 | Michael Zimmerman | Protecting domain names from undesired transfer |
US20090171823A1 (en) * | 2007-12-26 | 2009-07-02 | Michael Zimmerman | Underwriting the sale of shares of equity in a domain name |
US10091229B2 (en) | 2008-01-09 | 2018-10-02 | Masergy Communications, Inc. | Systems and methods of network security and threat management |
US8160975B2 (en) | 2008-01-25 | 2012-04-17 | Mcafee, Inc. | Granular support vector machine with random granularity |
US7792922B2 (en) * | 2008-03-05 | 2010-09-07 | Caterpillar Inc. | Systems and methods for managing health of a client system |
US20090235359A1 (en) * | 2008-03-12 | 2009-09-17 | Comodo Ca Limited | Method and system for performing security and vulnerability scans on devices behind a network security device |
US8589503B2 (en) | 2008-04-04 | 2013-11-19 | Mcafee, Inc. | Prioritizing network traffic |
CN101282340B (en) * | 2008-05-09 | 2010-09-22 | 成都市华为赛门铁克科技有限公司 | Method and apparatus for processing network attack |
US8819823B1 (en) * | 2008-06-02 | 2014-08-26 | Symantec Corporation | Method and apparatus for notifying a recipient of a threat within previously communicated data |
US8601068B2 (en) * | 2008-06-26 | 2013-12-03 | Ca, Inc. | Information technology system collaboration |
US9104579B1 (en) * | 2008-07-23 | 2015-08-11 | Oracle America, Inc. | Methods and apparatuses for monitoring and configuring remote sub-systems using a feed |
US9253154B2 (en) | 2008-08-12 | 2016-02-02 | Mcafee, Inc. | Configuration management for a capture/registration system |
WO2010051020A1 (en) * | 2008-10-29 | 2010-05-06 | Anamorphic Systems, Inc. | System to create and maintain internet meta-maps |
US8341748B2 (en) * | 2008-12-18 | 2012-12-25 | Caterpillar Inc. | Method and system to detect breaks in a border of a computer network |
US8850591B2 (en) | 2009-01-13 | 2014-09-30 | Mcafee, Inc. | System and method for concept building |
US8473442B1 (en) | 2009-02-25 | 2013-06-25 | Mcafee, Inc. | System and method for intelligent state management |
US8667121B2 (en) * | 2009-03-25 | 2014-03-04 | Mcafee, Inc. | System and method for managing data and policies |
US8447722B1 (en) | 2009-03-25 | 2013-05-21 | Mcafee, Inc. | System and method for data mining and security policy management |
US9894093B2 (en) * | 2009-04-21 | 2018-02-13 | Bandura, Llc | Structuring data and pre-compiled exception list engines and internet protocol threat prevention |
US9342691B2 (en) * | 2013-03-14 | 2016-05-17 | Bandura, Llc | Internet protocol threat prevention |
US20100305130A1 (en) * | 2009-06-01 | 2010-12-02 | PHILLIPS Thomas | Nasal spray device and method of use thereof |
JP5304449B2 (en) * | 2009-06-02 | 2013-10-02 | 富士通株式会社 | Scenario creation program, scenario creation device, and scenario creation method |
US8898774B2 (en) * | 2009-06-25 | 2014-11-25 | Accenture Global Services Limited | Method and system for scanning a computer system for sensitive content |
US8307219B2 (en) | 2009-07-13 | 2012-11-06 | Satyam Computer Services Limited | Enterprise black box system and method for data centers |
US8261355B2 (en) * | 2009-07-24 | 2012-09-04 | Cisco Technology, Inc. | Topology-aware attack mitigation |
US8793151B2 (en) * | 2009-08-28 | 2014-07-29 | Src, Inc. | System and method for organizational risk analysis and reporting by mapping detected risk patterns onto a risk ontology |
CN101645807B (en) * | 2009-09-04 | 2011-06-08 | 英华达(上海)科技有限公司 | Detecting system and method for network online state |
US8706728B2 (en) * | 2010-02-19 | 2014-04-22 | Go Daddy Operating Company, LLC | Calculating reliability scores from word splitting |
US9058393B1 (en) | 2010-02-19 | 2015-06-16 | Go Daddy Operating Company, LLC | Tools for appraising a domain name using keyword monetary value data |
US8515969B2 (en) * | 2010-02-19 | 2013-08-20 | Go Daddy Operating Company, LLC | Splitting a character string into keyword strings |
US8909558B1 (en) | 2010-02-19 | 2014-12-09 | Go Daddy Operating Company, LLC | Appraising a domain name using keyword monetary value data |
US9098700B2 (en) | 2010-03-01 | 2015-08-04 | The Trustees Of Columbia University In The City Of New York | Systems and methods for detecting attacks against a digital circuit |
US8868728B2 (en) * | 2010-03-11 | 2014-10-21 | Accenture Global Services Limited | Systems and methods for detecting and investigating insider fraud |
US9378387B2 (en) * | 2010-03-24 | 2016-06-28 | Oracle International Corporation | Multi-level security cluster |
US8621638B2 (en) | 2010-05-14 | 2013-12-31 | Mcafee, Inc. | Systems and methods for classification of messaging entities |
US8386602B2 (en) | 2010-11-02 | 2013-02-26 | International Business Machines Corporation | Relevant alert delivery in a distributed processing system |
US8364813B2 (en) | 2010-11-02 | 2013-01-29 | International Business Machines Corporation | Administering incident pools for event and alert analysis |
US8806615B2 (en) | 2010-11-04 | 2014-08-12 | Mcafee, Inc. | System and method for protecting specified data combinations |
US8621277B2 (en) | 2010-12-06 | 2013-12-31 | International Business Machines Corporation | Dynamic administration of component event reporting in a distributed processing system |
US8737231B2 (en) | 2010-12-07 | 2014-05-27 | International Business Machines Corporation | Dynamic administration of event pools for relevant event and alert analysis during event storms |
US8868984B2 (en) | 2010-12-07 | 2014-10-21 | International Business Machines Corporation | Relevant alert delivery in a distributed processing system with event listeners and alert listeners |
US8805999B2 (en) | 2010-12-07 | 2014-08-12 | International Business Machines Corporation | Administering event reporting rules in a distributed processing system |
KR20120068611A (en) * | 2010-12-17 | 2012-06-27 | 한국전자통신연구원 | Apparatus and method for security situation awareness and situation information generation based on spatial linkage of physical and it security |
IL210169A0 (en) | 2010-12-22 | 2011-03-31 | Yehuda Binder | System and method for routing-based internet security |
US10574630B2 (en) | 2011-02-15 | 2020-02-25 | Webroot Inc. | Methods and apparatus for malware threat research |
US9432282B2 (en) * | 2011-02-24 | 2016-08-30 | The University Of Tulsa | Network-based hyperspeed communication and defense |
US8887279B2 (en) * | 2011-03-31 | 2014-11-11 | International Business Machines Corporation | Distributed real-time network protection for authentication systems |
US8756462B2 (en) | 2011-05-24 | 2014-06-17 | International Business Machines Corporation | Configurable alert delivery for reducing the amount of alerts transmitted in a distributed processing system |
US8645757B2 (en) | 2011-05-26 | 2014-02-04 | International Business Machines Corporation | Administering incident pools for event and alert analysis |
US8676883B2 (en) | 2011-05-27 | 2014-03-18 | International Business Machines Corporation | Event management in a distributed processing system |
US9213621B2 (en) | 2011-05-27 | 2015-12-15 | International Business Machines Corporation | Administering event pools for relevant event analysis in a distributed processing system |
US8880943B2 (en) | 2011-06-22 | 2014-11-04 | International Business Machines Corporation | Restarting event and alert analysis after a shutdown in a distributed processing system |
US8392385B2 (en) | 2011-06-22 | 2013-03-05 | International Business Machines Corporation | Flexible event data content management for relevant event and alert analysis within a distributed processing system |
US9419650B2 (en) | 2011-06-22 | 2016-08-16 | International Business Machines Corporation | Flexible event data content management for relevant event and alert analysis within a distributed processing system |
US8713366B2 (en) | 2011-06-22 | 2014-04-29 | International Business Machines Corporation | Restarting event and alert analysis after a shutdown in a distributed processing system |
US9544323B2 (en) * | 2011-07-08 | 2017-01-10 | Rapid Focus Security, Llc | System and method for remotely conducting a security assessment and analysis of a network |
US8881289B2 (en) * | 2011-10-18 | 2014-11-04 | Mcafee, Inc. | User behavioral risk assessment |
US8887175B2 (en) | 2011-10-18 | 2014-11-11 | International Business Machines Corporation | Administering incident pools for event and alert analysis |
US9178936B2 (en) | 2011-10-18 | 2015-11-03 | International Business Machines Corporation | Selected alert delivery in a distributed processing system |
US20130097272A1 (en) * | 2011-10-18 | 2013-04-18 | International Business Machines Corporation | Prioritized Alert Delivery In A Distributed Processing System |
US20130097215A1 (en) | 2011-10-18 | 2013-04-18 | International Business Machines Corporation | Selected Alert Delivery In A Distributed Processing System |
US8713581B2 (en) * | 2011-10-27 | 2014-04-29 | International Business Machines Corporation | Selected alert delivery in a distributed processing system |
WO2013066809A1 (en) * | 2011-11-01 | 2013-05-10 | Raytheon Company | System to establish trustworthiness of autonomous agent |
US20130246431A1 (en) | 2011-12-27 | 2013-09-19 | Mcafee, Inc. | System and method for providing data protection workflows in a network environment |
US8595822B2 (en) * | 2011-12-29 | 2013-11-26 | Mcafee, Inc. | System and method for cloud based scanning for computer vulnerabilities in a network environment |
CN104303153B (en) | 2012-03-22 | 2017-06-13 | 洛斯阿拉莫斯国家安全股份有限公司 | For the detection of abnormal subgraph, abnormal/change detection and the path scanning of network situation awareness |
US8990948B2 (en) | 2012-05-01 | 2015-03-24 | Taasera, Inc. | Systems and methods for orchestrating runtime operational integrity |
US8819834B2 (en) * | 2012-06-19 | 2014-08-26 | Ixia | Methods, systems, and computer readable media for automatically generating a fuzzer that implements functional and fuzz testing and testing a network device using the fuzzer |
WO2014021871A1 (en) * | 2012-07-31 | 2014-02-06 | Hewlett-Packard Development Company, L.P. | Pattern consolidation to identify malicious activity |
US8954811B2 (en) | 2012-08-06 | 2015-02-10 | International Business Machines Corporation | Administering incident pools for incident analysis |
US8943366B2 (en) | 2012-08-09 | 2015-01-27 | International Business Machines Corporation | Administering checkpoints for incident analysis |
US9275040B1 (en) | 2012-09-14 | 2016-03-01 | Go Daddy Operating Company, LLC | Validating user control over contact information in a domain name registration database |
CN104756131B (en) * | 2012-09-19 | 2017-07-11 | 交互数字专利控股公司 | Layering certification |
US9361455B2 (en) | 2013-01-02 | 2016-06-07 | International Business Machines Corporation | Security management in a networked computing environment |
CN103916376A (en) * | 2013-01-09 | 2014-07-09 | 台达电子工业股份有限公司 | Cloud system with attract defending mechanism and defending method thereof |
US8782157B1 (en) * | 2013-01-11 | 2014-07-15 | Robert Hansen | Distributed comment moderation |
WO2014120189A1 (en) * | 2013-01-31 | 2014-08-07 | Hewlett-Packard Development Company, L.P. | Sharing information |
US9361184B2 (en) | 2013-05-09 | 2016-06-07 | International Business Machines Corporation | Selecting during a system shutdown procedure, a restart incident checkpoint of an incident analyzer in a distributed processing system |
US9170860B2 (en) | 2013-07-26 | 2015-10-27 | International Business Machines Corporation | Parallel incident processing |
US9990499B2 (en) * | 2013-08-05 | 2018-06-05 | Netflix, Inc. | Dynamic security testing |
US9231921B2 (en) * | 2013-08-20 | 2016-01-05 | Janus Technologies, Inc. | System and architecture for secure computer devices |
US9658902B2 (en) | 2013-08-22 | 2017-05-23 | Globalfoundries Inc. | Adaptive clock throttling for event processing |
US9256482B2 (en) | 2013-08-23 | 2016-02-09 | International Business Machines Corporation | Determining whether to send an alert in a distributed processing system |
US9086968B2 (en) | 2013-09-11 | 2015-07-21 | International Business Machines Corporation | Checkpointing for delayed alert creation |
US9602337B2 (en) | 2013-09-11 | 2017-03-21 | International Business Machines Corporation | Event and alert analysis in a distributed processing system |
US9866526B2 (en) | 2013-10-10 | 2018-01-09 | Go Daddy Operating Company, LLC | Presentation of candidate domain name stacks in a user interface |
US9270647B2 (en) | 2013-12-06 | 2016-02-23 | Shape Security, Inc. | Client/server security by an intermediary rendering modified in-memory objects |
US9753796B2 (en) * | 2013-12-06 | 2017-09-05 | Lookout, Inc. | Distributed monitoring, evaluation, and response for multiple devices |
US10122747B2 (en) * | 2013-12-06 | 2018-11-06 | Lookout, Inc. | Response generation after distributed monitoring and evaluation of multiple devices |
US9389943B2 (en) | 2014-01-07 | 2016-07-12 | International Business Machines Corporation | Determining a number of unique incidents in a plurality of incidents for incident processing in a distributed processing system |
US8954583B1 (en) | 2014-01-20 | 2015-02-10 | Shape Security, Inc. | Intercepting and supervising calls to transformed operations and objects |
EP2908195B1 (en) * | 2014-02-13 | 2017-07-05 | Siemens Aktiengesellschaft | Method for monitoring security in an automation network, and automation network |
US9544329B2 (en) | 2014-03-18 | 2017-01-10 | Shape Security, Inc. | Client/server security by an intermediary executing instructions received from a server and rendering client application instructions |
US9485262B1 (en) * | 2014-03-28 | 2016-11-01 | Juniper Networks, Inc. | Detecting past intrusions and attacks based on historical network traffic information |
US8997226B1 (en) | 2014-04-17 | 2015-03-31 | Shape Security, Inc. | Detection of client-side malware activity |
US9497100B2 (en) | 2014-05-05 | 2016-11-15 | Ixia | Methods, systems, and computer readable media for providing fuzz testing functionality |
US9244713B1 (en) * | 2014-05-13 | 2016-01-26 | Nutanix, Inc. | Method and system for sorting and bucketizing alerts in a virtualization environment |
US9083739B1 (en) | 2014-05-29 | 2015-07-14 | Shape Security, Inc. | Client/server authentication using dynamic credentials |
US9210171B1 (en) | 2014-05-29 | 2015-12-08 | Shape Security, Inc. | Selectively protecting valid links to pages of a web site |
US9497215B2 (en) * | 2014-07-23 | 2016-11-15 | Cisco Technology, Inc. | Stealth mitigation for simulating the success of an attack |
US10812327B2 (en) * | 2014-07-31 | 2020-10-20 | Ent. Services Development Corporation Lp | Event clusters |
US9769273B2 (en) | 2014-08-22 | 2017-09-19 | Go Daddy Operating Company, LLC | System and method for automatic configuration of domain names for third party services |
US9438625B1 (en) | 2014-09-09 | 2016-09-06 | Shape Security, Inc. | Mitigating scripted attacks using dynamic polymorphism |
US9953105B1 (en) | 2014-10-01 | 2018-04-24 | Go Daddy Operating Company, LLC | System and method for creating subdomains or directories for a domain name |
US9779125B2 (en) | 2014-11-14 | 2017-10-03 | Go Daddy Operating Company, LLC | Ensuring accurate domain name contact information |
US9785663B2 (en) | 2014-11-14 | 2017-10-10 | Go Daddy Operating Company, LLC | Verifying a correspondence address for a registrant |
US9591018B1 (en) * | 2014-11-20 | 2017-03-07 | Amazon Technologies, Inc. | Aggregation of network traffic source behavior data across network-based endpoints |
US9380029B1 (en) * | 2014-12-09 | 2016-06-28 | Knight Security Systems | Security-focused monitoring system |
US9584536B2 (en) * | 2014-12-12 | 2017-02-28 | Fortinet, Inc. | Presentation of threat history associated with network activity |
US9479495B2 (en) | 2014-12-18 | 2016-10-25 | Go Daddy Operating Company, LLC | Sending authentication codes to multiple recipients |
US9479533B2 (en) | 2014-12-18 | 2016-10-25 | Go Daddy Operating Company, LLC | Time based authentication codes |
US10164933B2 (en) | 2014-12-19 | 2018-12-25 | Go Daddy Operating Company, LLC | System and method for domain name system restore points |
US10659423B2 (en) | 2014-12-19 | 2020-05-19 | Go Daddy Operating Company, LLC | System and method for modifying a domain name system template |
US9917924B2 (en) | 2015-03-16 | 2018-03-13 | Keysight Technologies Singapore (Holdings) Pte. Ltd. | Methods, systems, and computer readable media for simplistic visual representation of complex interdependent network protocol fields for network protocol fuzzing and graphical framework for reporting instantaneous system level progress |
US9432394B1 (en) | 2015-03-16 | 2016-08-30 | Ixia | Methods, systems, and computer readable media for converging on network protocol stack vulnerabilities using fuzzing variables, vulnerability ratings and progressive convergence |
US9608975B2 (en) | 2015-03-30 | 2017-03-28 | Shape Security, Inc. | Challenge-dynamic credential pairs for client/server request validation |
CN106295333B (en) * | 2015-05-27 | 2018-08-17 | 安一恒通(北京)科技有限公司 | method and system for detecting malicious code |
RU2601148C1 (en) * | 2015-06-30 | 2016-10-27 | Закрытое акционерное общество "Лаборатория Касперского" | System and method for detecting anomalies when connecting devices |
KR101689295B1 (en) | 2015-10-19 | 2016-12-23 | 한국과학기술정보연구원 | Automated verification method of security event and automated verification apparatus of security event |
US10212167B2 (en) * | 2016-02-27 | 2019-02-19 | Gryphon Online Safety, Inc. | Method and system to enable controlled safe internet browsing |
US10003598B2 (en) | 2016-04-15 | 2018-06-19 | Bank Of America Corporation | Model framework and system for cyber security services |
US9832201B1 (en) | 2016-05-16 | 2017-11-28 | Bank Of America Corporation | System for generation and reuse of resource-centric threat modeling templates and identifying controls for securing technology resources |
US9948652B2 (en) | 2016-05-16 | 2018-04-17 | Bank Of America Corporation | System for resource-centric threat modeling and identifying controls for securing technology resources |
RU2634173C1 (en) * | 2016-06-24 | 2017-10-24 | Акционерное общество "Лаборатория Касперского" | System and detecting method of remote administration application |
US10491621B2 (en) * | 2016-08-18 | 2019-11-26 | International Business Machines Corporation | Website security tracking across a network |
US11522901B2 (en) | 2016-09-23 | 2022-12-06 | OPSWAT, Inc. | Computer security vulnerability assessment |
US9749349B1 (en) * | 2016-09-23 | 2017-08-29 | OPSWAT, Inc. | Computer security vulnerability assessment |
US11347373B2 (en) * | 2016-10-05 | 2022-05-31 | Vmware, Inc. | Methods and systems to sample event messages |
US10855714B2 (en) | 2016-10-31 | 2020-12-01 | KnowBe4, Inc. | Systems and methods for an artificial intelligence driven agent |
JP6903901B2 (en) * | 2016-11-28 | 2021-07-14 | 富士通株式会社 | Attack detection device, attack detection program and attack detection method |
US10339309B1 (en) | 2017-06-09 | 2019-07-02 | Bank Of America Corporation | System for identifying anomalies in an information system |
US11874845B2 (en) * | 2017-06-28 | 2024-01-16 | Fortinet, Inc. | Centralized state database storing state information |
US10452689B1 (en) * | 2018-04-06 | 2019-10-22 | Banjo, Inc. | Consolidating information from different signals into an event |
US11228614B1 (en) * | 2018-07-24 | 2022-01-18 | Amazon Technologies, Inc. | Automated management of security operations centers |
US10630718B2 (en) * | 2018-11-27 | 2020-04-21 | BehavioSec Inc | Detection of remote fraudulent activity in a client-server-system |
US10298611B1 (en) * | 2018-12-10 | 2019-05-21 | Securitymetrics, Inc. | Network vulnerability assessment |
US11489675B1 (en) | 2019-07-12 | 2022-11-01 | Allscripts Software, Llc | Computing system for electronic message tamper-roofing |
US11244058B2 (en) | 2019-09-18 | 2022-02-08 | Bank Of America Corporation | Security tool |
US11134081B2 (en) | 2019-10-31 | 2021-09-28 | International Business Machines Corporation | Authentication mechanism utilizing location corroboration |
KR102366304B1 (en) * | 2020-05-11 | 2022-02-23 | (주)노르마 | Method for Detecting of fake device and wireless device Care Apparatus |
US11290480B2 (en) | 2020-05-26 | 2022-03-29 | Bank Of America Corporation | Network vulnerability assessment tool |
Family Cites Families (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4759592A (en) * | 1986-09-08 | 1988-07-26 | Spacesaver Corporation | Movable storage unit control system with system resetting watchdog circuit |
US5909493A (en) * | 1996-10-16 | 1999-06-01 | Ricoh Company, Ltd. | Method and system for diagnosis and control of machines using connectionless modes of communication |
JP2810171B2 (en) * | 1989-12-18 | 1998-10-15 | 株式会社日立製作所 | Network system and network management method applying the same |
JP2950138B2 (en) * | 1994-03-23 | 1999-09-20 | ヤマハ株式会社 | Fingering information analyzer and electronic musical instrument using the same |
GB9422959D0 (en) * | 1994-11-15 | 1995-01-04 | Int Computers Ltd | Security monitoring arrangement for a computer system |
JPH08204736A (en) | 1995-01-26 | 1996-08-09 | Matsushita Electric Works Ltd | Network management system |
US6850497B1 (en) * | 1995-09-19 | 2005-02-01 | Mobile Satellite Ventures, Lp | Satellite trunked radio service system |
US5764887A (en) | 1995-12-11 | 1998-06-09 | International Business Machines Corporation | System and method for supporting distributed computing mechanisms in a local area network server environment |
US6820807B1 (en) * | 1996-03-01 | 2004-11-23 | Cobblestone Software, Inc. | Variable formatting of digital data into a pattern |
US5970149A (en) * | 1996-11-19 | 1999-10-19 | Johnson; R. Brent | Combined remote access and security system |
US5796942A (en) * | 1996-11-21 | 1998-08-18 | Computer Associates International, Inc. | Method and apparatus for automated network-wide surveillance and security breach intervention |
US5961644A (en) * | 1997-09-19 | 1999-10-05 | International Business Machines Corporation | Method and apparatus for testing the integrity of computer security alarm systems |
US7956894B2 (en) * | 1997-10-14 | 2011-06-07 | William Rex Akers | Apparatus and method for computerized multi-media medical and pharmaceutical data organization and transmission |
US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
US6205551B1 (en) | 1998-01-29 | 2001-03-20 | Lucent Technologies Inc. | Computer security using virus probing |
EP0935199B1 (en) * | 1998-02-04 | 2011-05-04 | Panasonic Corporation | Memory control unit and memory control method and medium containing program for realizing the same |
US6298445B1 (en) * | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
WO1999066383A2 (en) * | 1998-06-15 | 1999-12-23 | Dmw Worldwide, Inc. | Method and apparatus for assessing the security of a computer system |
US6185689B1 (en) | 1998-06-24 | 2001-02-06 | Richard S. Carson & Assoc., Inc. | Method for network self security assessment |
US6324656B1 (en) | 1998-06-30 | 2001-11-27 | Cisco Technology, Inc. | System and method for rules-driven multi-phase network vulnerability assessment |
US6282546B1 (en) | 1998-06-30 | 2001-08-28 | Cisco Technology, Inc. | System and method for real-time insertion of data into a multi-dimensional database for network intrusion detection and vulnerability assessment |
US6269447B1 (en) | 1998-07-21 | 2001-07-31 | Raytheon Company | Information security analysis system |
US6304973B1 (en) * | 1998-08-06 | 2001-10-16 | Cryptek Secure Communications, Llc | Multi-level security network system |
US6343362B1 (en) | 1998-09-01 | 2002-01-29 | Networks Associates, Inc. | System and method providing custom attack simulation language for testing networks |
US6321338B1 (en) * | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
US6985953B1 (en) * | 1998-11-30 | 2006-01-10 | George Mason University | System and apparatus for storage and transfer of secure data on web |
US6226372B1 (en) | 1998-12-11 | 2001-05-01 | Securelogix Corporation | Tightly integrated cooperative telecommunications firewall and scanner with distributed capabilities |
US6301668B1 (en) | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
US6205552B1 (en) | 1998-12-31 | 2001-03-20 | Mci Worldcom, Inc. | Method and apparatus for checking security vulnerability of networked devices |
US6567917B1 (en) * | 1999-02-01 | 2003-05-20 | Cisco Technology, Inc. | Method and system for providing tamper-resistant executable software |
US6678827B1 (en) * | 1999-05-06 | 2004-01-13 | Watchguard Technologies, Inc. | Managing multiple network security devices from a manager device |
EP1055990A1 (en) * | 1999-05-28 | 2000-11-29 | Hewlett-Packard Company | Event logging in a computing platform |
US6865596B1 (en) * | 1999-06-09 | 2005-03-08 | Amx Corporation | Method and system for operating virtual devices by master controllers in a control system |
US6342362B1 (en) * | 1999-08-05 | 2002-01-29 | Daniel S. Mytelka | Methods and compositions for the purification of proteins or other macromolecules |
US7085936B1 (en) * | 1999-08-30 | 2006-08-01 | Symantec Corporation | System and method for using login correlations to detect intrusions |
US7107347B1 (en) * | 1999-11-15 | 2006-09-12 | Fred Cohen | Method and apparatus for network deception/emulation |
US6775657B1 (en) * | 1999-12-22 | 2004-08-10 | Cisco Technology, Inc. | Multilayered intrusion detection system and method |
WO2001053909A2 (en) * | 2000-01-18 | 2001-07-26 | Telcordia Technologies, Inc. | Method and systems for data security |
US7159237B2 (en) * | 2000-03-16 | 2007-01-02 | Counterpane Internet Security, Inc. | Method and system for dynamic network intrusion monitoring, detection and response |
DE60134842D1 (en) * | 2000-04-11 | 2008-08-28 | Thomson Licensing | DEVICE FOR SAFE SAVING OF SECRET INFORMATION |
JP2004534973A (en) * | 2000-04-14 | 2004-11-18 | ゴー アヘッド ソフトウェア インコーポレイテッド | Network device upgrade system and method |
US7215637B1 (en) * | 2000-04-17 | 2007-05-08 | Juniper Networks, Inc. | Systems and methods for processing packets |
US7921459B2 (en) * | 2000-04-28 | 2011-04-05 | International Business Machines Corporation | System and method for managing security events on a network |
US7574740B1 (en) * | 2000-04-28 | 2009-08-11 | International Business Machines Corporation | Method and system for intrusion detection in a computer network |
US6973577B1 (en) * | 2000-05-26 | 2005-12-06 | Mcafee, Inc. | System and method for dynamically detecting computer viruses through associative behavioral analysis of runtime state |
US7181769B1 (en) * | 2000-08-25 | 2007-02-20 | Ncircle Network Security, Inc. | Network security system having a device profiler communicatively coupled to a traffic monitor |
JP2002141895A (en) * | 2000-11-01 | 2002-05-17 | Sony Corp | System and method for distributing contents |
AUPR230700A0 (en) * | 2000-12-22 | 2001-01-25 | Canon Kabushiki Kaisha | A method for facilitating access to multimedia content |
US7168093B2 (en) * | 2001-01-25 | 2007-01-23 | Solutionary, Inc. | Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures |
US6738911B2 (en) | 2001-02-02 | 2004-05-18 | Keith Hayes | Method and apparatus for providing client-based network security |
US7788722B1 (en) * | 2002-12-02 | 2010-08-31 | Arcsight, Inc. | Modular agent for network security intrusion detection system |
US7523503B2 (en) * | 2003-01-21 | 2009-04-21 | Hewlett-Packard Development Company, L.P. | Method for protecting security of network intrusion detection sensors |
US7260844B1 (en) * | 2003-09-03 | 2007-08-21 | Arcsight, Inc. | Threat detection in a network security system |
US7712137B2 (en) * | 2006-02-27 | 2010-05-04 | Microsoft Corporation | Configuring and organizing server security information |
-
2001
- 2001-01-25 US US09/770,525 patent/US7168093B2/en not_active Expired - Lifetime
-
2002
- 2002-01-24 ES ES02709175.0T patent/ES2662901T3/en not_active Expired - Lifetime
- 2002-01-24 EP EP02709175.0A patent/EP1356626B1/en not_active Expired - Lifetime
- 2002-01-24 JP JP2002560331A patent/JP2004525446A/en active Pending
- 2002-01-24 CA CA2436096A patent/CA2436096C/en not_active Expired - Lifetime
- 2002-01-24 WO PCT/US2002/002218 patent/WO2002060117A1/en active Application Filing
- 2002-07-16 US US10/196,472 patent/US6988208B2/en not_active Expired - Lifetime
-
2005
- 2005-03-02 US US11/070,022 patent/US7370359B2/en not_active Expired - Lifetime
-
2006
- 2006-12-29 US US11/647,660 patent/US7424743B2/en not_active Expired - Lifetime
-
2008
- 2008-05-05 US US12/115,147 patent/US7954159B2/en not_active Expired - Fee Related
- 2008-09-04 US US12/204,573 patent/US8261347B2/en not_active Expired - Lifetime
-
2012
- 2012-08-10 US US13/571,918 patent/US8931077B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US20080244745A1 (en) | 2008-10-02 |
US20020099958A1 (en) | 2002-07-25 |
US7954159B2 (en) | 2011-05-31 |
US7168093B2 (en) | 2007-01-23 |
US8931077B2 (en) | 2015-01-06 |
WO2002060117A1 (en) | 2002-08-01 |
US8261347B2 (en) | 2012-09-04 |
US20050204404A1 (en) | 2005-09-15 |
US7370359B2 (en) | 2008-05-06 |
CA2436096C (en) | 2011-08-30 |
US20080320586A1 (en) | 2008-12-25 |
US7424743B2 (en) | 2008-09-09 |
EP1356626A1 (en) | 2003-10-29 |
ES2662901T3 (en) | 2018-04-10 |
EP1356626A4 (en) | 2009-06-24 |
US20120311694A1 (en) | 2012-12-06 |
JP2004525446A (en) | 2004-08-19 |
US20020178383A1 (en) | 2002-11-28 |
US6988208B2 (en) | 2006-01-17 |
EP1356626B1 (en) | 2017-12-13 |
US20070113283A1 (en) | 2007-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2436096A1 (en) | Method and apparatus for verifying the integrity and security of computer networks and implementation of counter measures | |
CN109257342A (en) | Authentication method, system, server and readable storage medium storing program for executing of the block chain across chain | |
CN100583768C (en) | Safety requirement based remote proving method and system thereof | |
CN1889432B (en) | Long-distance password identifying method based on smart card, smart card, server and system | |
CN109117097A (en) | A kind of date storage method and system based on block chain | |
JP2004525446A5 (en) | ||
CN104991526A (en) | Industrial control system safe support framework and data safe transmission and storage method thereof | |
US20180124048A1 (en) | Data transmission method, authentication method, and server | |
Sharma et al. | Experience with heterogenous clock-skew based device fingerprinting | |
CN110198297A (en) | Data on flows monitoring method, device, electronic equipment and computer-readable medium | |
CN107070893A (en) | A kind of power distribution network terminal IEC101 protocol massages certification method of discrimination | |
Hu et al. | Automated Discovery of {Denial-of-Service} Vulnerabilities in Connected Vehicle Protocols | |
CN111314381A (en) | Safety isolation gateway | |
CN112073431B (en) | Security defense method and system for industrial control system network | |
CN106372550A (en) | Hash function-based MH lightweight security authentication system and method | |
CN110362984A (en) | Method and device for operating service system by multiple devices | |
CN102801699B (en) | The system preventing server data from distorting, method and apparatus | |
CN107659534A (en) | A kind of ospf protocol vulnerability analysis and detecting system | |
CN109743319B (en) | Trusted starting and safe operation method of networking type special server | |
CN104410642B (en) | Equipment access cognitive method based on ARP protocol | |
CN105763569B (en) | To the method for account authentication, client, service platform and management platform | |
CN101122988B (en) | Safe treatment method of network tax-control system | |
CN103297480A (en) | System and method for automatically detecting application service | |
Wang et al. | An efficient scheme for SDN state consistency verification in cloud computing environment | |
CN107315660A (en) | A kind of two-node cluster hot backup method of virtualization system, apparatus and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKEX | Expiry |
Effective date: 20220124 |
|
MKEX | Expiry |
Effective date: 20220124 |