WO2001089146A2 - Intelligent feedback loop process control system - Google Patents
Intelligent feedback loop process control system Download PDFInfo
- Publication number
- WO2001089146A2 WO2001089146A2 PCT/US2001/015108 US0115108W WO0189146A2 WO 2001089146 A2 WO2001089146 A2 WO 2001089146A2 US 0115108 W US0115108 W US 0115108W WO 0189146 A2 WO0189146 A2 WO 0189146A2
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- set forth
- data
- packets
- invention set
- certain
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
- H04L43/0882—Utilisation of link capacity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
Definitions
- This invention relates to network control systems and more particularly to a system and method for detecting and preventing system disruption caused by certain data traffic conditions.
- the system and method recognizes problems in the early stages as they are beginning to occur and communicates with a system router to essentially control the flow of all the communication in or out of the protected system (like a front door of a building).
- the system recognizes messages that are bound for the protected site and allows only certain data in. The allowed data must pass certain tests. Alternatively, all data is allowed in until an "alarm" condition is detected and then data is blocked. The blocked data can be general, or origination site specific.
- FIGURE 2 there is shown system 20, which essentially consists of detection/notification server 21 and configuration server 22.
- Information packets come into the detection/notification server from firewall 15 via communication interface 210 and are intercepted by that interface and fed into microprocessor 211.
- Microprocessor 211 is at the same time loading programs from random access memory 212 which had been stored in disk storage 213. These programs are what logically intercept the incoming data within the random access memory. The programs operate to investigate the incoming data and to make determinations as whether to pass the data on without comment; pass the data on and perform other actions or block the data flow.
- the server optionally receives acknowledgments from gateway router(s) 13. If such acknowledgments are absent when expected, the configuration server creates a record for process NF and takes other appropriate actions and logs the activity.
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU2001261379A AU2001261379A1 (en) | 2000-05-17 | 2001-05-09 | Intelligent feedback loop process control system |
JP2001585449A JP2003533941A (en) | 2000-05-17 | 2001-05-09 | Intelligent feedback loop process control system |
DE60114181T DE60114181T2 (en) | 2000-05-17 | 2001-05-09 | PROCESS CONTROL SYSTEM WITH INTELLIGENT FEEDBACK LOOP |
EP01935271A EP1282954B1 (en) | 2000-05-17 | 2001-05-09 | Intelligent feedback loop process control system |
AT01935271T ATE307439T1 (en) | 2000-05-17 | 2001-05-09 | PROCESS CONTROL SYSTEM WITH INTELLIGENT FEEDBACK LOOP |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/572,112 | 2000-05-17 | ||
US09/572,112 US7058976B1 (en) | 2000-05-17 | 2000-05-17 | Intelligent feedback loop process control system |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2001089146A2 true WO2001089146A2 (en) | 2001-11-22 |
WO2001089146A3 WO2001089146A3 (en) | 2002-05-16 |
Family
ID=24286392
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2001/015108 WO2001089146A2 (en) | 2000-05-17 | 2001-05-09 | Intelligent feedback loop process control system |
Country Status (7)
Country | Link |
---|---|
US (2) | US7058976B1 (en) |
EP (1) | EP1282954B1 (en) |
JP (1) | JP2003533941A (en) |
AT (1) | ATE307439T1 (en) |
AU (1) | AU2001261379A1 (en) |
DE (1) | DE60114181T2 (en) |
WO (1) | WO2001089146A2 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007019349A2 (en) * | 2005-08-03 | 2007-02-15 | Calyptix Security | Systems and methods for dynamically learning network environments to achieve adaptive security |
JP2011040064A (en) * | 2003-11-12 | 2011-02-24 | Trustees Of Columbia Univ In The City Of New York | Device, method and medium for detecting abnormal payload by using n gram distribution of normal data |
Families Citing this family (51)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6728885B1 (en) | 1998-10-09 | 2004-04-27 | Networks Associates Technology, Inc. | System and method for network access control using adaptive proxies |
US7058976B1 (en) * | 2000-05-17 | 2006-06-06 | Deep Nines, Inc. | Intelligent feedback loop process control system |
US7380272B2 (en) * | 2000-05-17 | 2008-05-27 | Deep Nines Incorporated | System and method for detecting and eliminating IP spoofing in a data transmission network |
US6513122B1 (en) * | 2001-06-29 | 2003-01-28 | Networks Associates Technology, Inc. | Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities |
WO2003100617A1 (en) * | 2002-05-22 | 2003-12-04 | Lucid Security Corporation | Adaptive intrusion detection system |
US7900254B1 (en) * | 2003-01-24 | 2011-03-01 | Mcafee, Inc. | Identifying malware infected reply messages |
US20040146006A1 (en) * | 2003-01-24 | 2004-07-29 | Jackson Daniel H. | System and method for internal network data traffic control |
US7356585B1 (en) * | 2003-04-04 | 2008-04-08 | Raytheon Company | Vertically extensible intrusion detection system and method |
US7293238B1 (en) | 2003-04-04 | 2007-11-06 | Raytheon Company | Graphical user interface for an enterprise intrusion detection system |
US7895649B1 (en) | 2003-04-04 | 2011-02-22 | Raytheon Company | Dynamic rule generation for an enterprise intrusion detection system |
US7607010B2 (en) * | 2003-04-12 | 2009-10-20 | Deep Nines, Inc. | System and method for network edge data protection |
US7681235B2 (en) * | 2003-05-19 | 2010-03-16 | Radware Ltd. | Dynamic network protection |
JP4174392B2 (en) * | 2003-08-28 | 2008-10-29 | 日本電気株式会社 | Network unauthorized connection prevention system and network unauthorized connection prevention device |
US20050086524A1 (en) * | 2003-10-16 | 2005-04-21 | Deep Nines Incorporated | Systems and methods for providing network security with zero network footprint |
US20060174343A1 (en) * | 2004-11-30 | 2006-08-03 | Sensory Networks, Inc. | Apparatus and method for acceleration of security applications through pre-filtering |
US20070039051A1 (en) * | 2004-11-30 | 2007-02-15 | Sensory Networks, Inc. | Apparatus And Method For Acceleration of Security Applications Through Pre-Filtering |
US8572733B1 (en) | 2005-07-06 | 2013-10-29 | Raytheon Company | System and method for active data collection in a network security system |
US7352280B1 (en) | 2005-09-01 | 2008-04-01 | Raytheon Company | System and method for intruder tracking using advanced correlation in a network security system |
US8224761B1 (en) | 2005-09-01 | 2012-07-17 | Raytheon Company | System and method for interactive correlation rule design in a network security system |
US7950058B1 (en) | 2005-09-01 | 2011-05-24 | Raytheon Company | System and method for collaborative information security correlation in low bandwidth environments |
US7849185B1 (en) | 2006-01-10 | 2010-12-07 | Raytheon Company | System and method for attacker attribution in a network security system |
WO2007096890A2 (en) * | 2006-02-27 | 2007-08-30 | Sentrigo Inc. | Device, system and method of database security |
US8201243B2 (en) * | 2006-04-20 | 2012-06-12 | Webroot Inc. | Backwards researching activity indicative of pestware |
US8190868B2 (en) | 2006-08-07 | 2012-05-29 | Webroot Inc. | Malware management through kernel detection |
US8811156B1 (en) | 2006-11-14 | 2014-08-19 | Raytheon Company | Compressing n-dimensional data |
US8286244B2 (en) * | 2007-01-19 | 2012-10-09 | Hewlett-Packard Development Company, L.P. | Method and system for protecting a computer network against packet floods |
US20100192201A1 (en) * | 2009-01-29 | 2010-07-29 | Breach Security, Inc. | Method and Apparatus for Excessive Access Rate Detection |
US20100251355A1 (en) * | 2009-03-31 | 2010-09-30 | Inventec Corporation | Method for obtaining data for intrusion detection |
US11489857B2 (en) | 2009-04-21 | 2022-11-01 | Webroot Inc. | System and method for developing a risk profile for an internet resource |
US8938534B2 (en) | 2010-12-30 | 2015-01-20 | Ss8 Networks, Inc. | Automatic provisioning of new users of interest for capture on a communication network |
US9058323B2 (en) | 2010-12-30 | 2015-06-16 | Ss8 Networks, Inc. | System for accessing a set of communication and transaction data associated with a user of interest sourced from multiple different network carriers and for enabling multiple analysts to independently and confidentially access the set of communication and transaction data |
US8972612B2 (en) | 2011-04-05 | 2015-03-03 | SSB Networks, Inc. | Collecting asymmetric data and proxy data on a communication network |
US9350762B2 (en) | 2012-09-25 | 2016-05-24 | Ss8 Networks, Inc. | Intelligent feedback loop to iteratively reduce incoming network data for analysis |
US9565213B2 (en) | 2012-10-22 | 2017-02-07 | Centripetal Networks, Inc. | Methods and systems for protecting a secured network |
US9137205B2 (en) | 2012-10-22 | 2015-09-15 | Centripetal Networks, Inc. | Methods and systems for protecting a secured network |
US9203806B2 (en) | 2013-01-11 | 2015-12-01 | Centripetal Networks, Inc. | Rule swapping in a packet network |
US9124552B2 (en) | 2013-03-12 | 2015-09-01 | Centripetal Networks, Inc. | Filtering network data transfers |
US9094445B2 (en) | 2013-03-15 | 2015-07-28 | Centripetal Networks, Inc. | Protecting networks from cyber attacks and overloading |
US20150101050A1 (en) * | 2013-10-07 | 2015-04-09 | Bank Of America Corporation | Detecting and measuring malware threats |
US9830593B2 (en) | 2014-04-26 | 2017-11-28 | Ss8 Networks, Inc. | Cryptographic currency user directory data and enhanced peer-verification ledger synthesis through multi-modal cryptographic key-address mapping |
US9264370B1 (en) | 2015-02-10 | 2016-02-16 | Centripetal Networks, Inc. | Correlating packets in communications networks |
US9866576B2 (en) | 2015-04-17 | 2018-01-09 | Centripetal Networks, Inc. | Rule-based network-threat detection |
US9823998B2 (en) * | 2015-12-02 | 2017-11-21 | International Business Machines Corporation | Trace recovery via statistical reasoning |
US9917856B2 (en) | 2015-12-23 | 2018-03-13 | Centripetal Networks, Inc. | Rule-based network-threat detection for encrypted communications |
US11729144B2 (en) | 2016-01-04 | 2023-08-15 | Centripetal Networks, Llc | Efficient packet capture for cyber threat analysis |
US10503899B2 (en) | 2017-07-10 | 2019-12-10 | Centripetal Networks, Inc. | Cyberanalysis workflow acceleration |
US10284526B2 (en) | 2017-07-24 | 2019-05-07 | Centripetal Networks, Inc. | Efficient SSL/TLS proxy |
US11233777B2 (en) | 2017-07-24 | 2022-01-25 | Centripetal Networks, Inc. | Efficient SSL/TLS proxy |
US10333898B1 (en) | 2018-07-09 | 2019-06-25 | Centripetal Networks, Inc. | Methods and systems for efficient network protection |
CN111355929B (en) * | 2020-03-09 | 2021-10-26 | 江苏经贸职业技术学院 | Information transmission method based on advertisement player |
US11362996B2 (en) | 2020-10-27 | 2022-06-14 | Centripetal Networks, Inc. | Methods and systems for efficient adaptive logging of cyber threat incidents |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5787253A (en) * | 1996-05-28 | 1998-07-28 | The Ag Group | Apparatus and method of analyzing internet activity |
US5913041A (en) * | 1996-12-09 | 1999-06-15 | Hewlett-Packard Company | System for determining data transfer rates in accordance with log information relates to history of data transfer activities that independently stored in content servers |
Family Cites Families (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5319776A (en) | 1990-04-19 | 1994-06-07 | Hilgraeve Corporation | In transit detection of computer virus with safeguard |
US5649095A (en) | 1992-03-30 | 1997-07-15 | Cozza; Paul D. | Method and apparatus for detecting computer viruses through the use of a scan information cache |
US5414650A (en) | 1993-03-24 | 1995-05-09 | Compression Research Group, Inc. | Parsing information onto packets using context-insensitive parsing rules based on packet characteristics |
US5835726A (en) | 1993-12-15 | 1998-11-10 | Check Point Software Technologies Ltd. | System for securing the flow of and selectively modifying packets in a computer network |
US5623601A (en) | 1994-11-18 | 1997-04-22 | Milkway Networks Corporation | Apparatus and method for providing a secure gateway for communication and data exchanges between networks |
JP3499621B2 (en) | 1994-12-27 | 2004-02-23 | 株式会社東芝 | Address management device and address management method |
US5828846A (en) * | 1995-11-22 | 1998-10-27 | Raptor Systems, Inc. | Controlling passage of packets or messages via a virtual connection or flow |
US5898830A (en) | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency |
US5826014A (en) | 1996-02-06 | 1998-10-20 | Network Engineering Software | Firewall system for protecting network elements connected to a public network |
US6222856B1 (en) | 1996-07-02 | 2001-04-24 | Murali R. Krishnan | Adaptive bandwidth throttling for individual virtual services supported on a network server |
US5799002A (en) | 1996-07-02 | 1998-08-25 | Microsoft Corporation | Adaptive bandwidth throttling for network services |
US6119236A (en) | 1996-10-07 | 2000-09-12 | Shipley; Peter M. | Intelligent network security device and method |
US5991881A (en) * | 1996-11-08 | 1999-11-23 | Harris Corporation | Network surveillance system |
US6263444B1 (en) | 1997-03-11 | 2001-07-17 | National Aerospace Laboratory Of Science & Technology Agency | Network unauthorized access analysis method, network unauthorized access analysis apparatus utilizing the method, and computer-readable recording medium having network unauthorized access analysis program recorded thereon |
US6098172A (en) | 1997-09-12 | 2000-08-01 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with proxy reflection |
US6119165A (en) | 1997-11-17 | 2000-09-12 | Trend Micro, Inc. | Controlled distribution of application programs in a computer network |
US6205551B1 (en) | 1998-01-29 | 2001-03-20 | Lucent Technologies Inc. | Computer security using virus probing |
US6321336B1 (en) | 1998-03-13 | 2001-11-20 | Secure Computing Corporation | System and method for redirecting network traffic to provide secure communication |
US6279113B1 (en) | 1998-03-16 | 2001-08-21 | Internet Tools, Inc. | Dynamic signature inspection-based network intrusion detection |
US6182226B1 (en) | 1998-03-18 | 2001-01-30 | Secure Computing Corporation | System and method for controlling interactions between networks |
US6298445B1 (en) | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
US6711127B1 (en) | 1998-07-31 | 2004-03-23 | General Dynamics Government Systems Corporation | System for intrusion detection and vulnerability analysis in a telecommunications signaling network |
US6615358B1 (en) * | 1998-08-07 | 2003-09-02 | Patrick W. Dowd | Firewall for processing connection-oriented and connectionless datagrams over a connection-oriented network |
EP1106003A1 (en) | 1998-08-18 | 2001-06-13 | Madge Networks Limited | Method and system for prioritised congestion control in a switching hub |
US6219786B1 (en) | 1998-09-09 | 2001-04-17 | Surfcontrol, Inc. | Method and system for monitoring and controlling network access |
US6370648B1 (en) * | 1998-12-08 | 2002-04-09 | Visa International Service Association | Computer network intrusion detection |
US6550012B1 (en) * | 1998-12-11 | 2003-04-15 | Network Associates, Inc. | Active firewall system and methodology |
US6301668B1 (en) | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
US6415321B1 (en) * | 1998-12-29 | 2002-07-02 | Cisco Technology, Inc. | Domain mapping method and system |
US6725377B1 (en) * | 1999-03-12 | 2004-04-20 | Networks Associates Technology, Inc. | Method and system for updating anti-intrusion software |
US6981155B1 (en) | 1999-07-14 | 2005-12-27 | Symantec Corporation | System and method for computer security |
US6598034B1 (en) * | 1999-09-21 | 2003-07-22 | Infineon Technologies North America Corp. | Rule based IP data processing |
US6611869B1 (en) * | 1999-10-28 | 2003-08-26 | Networks Associates, Inc. | System and method for providing trustworthy network security concern communication in an active security management environment |
US7215637B1 (en) * | 2000-04-17 | 2007-05-08 | Juniper Networks, Inc. | Systems and methods for processing packets |
US7058976B1 (en) * | 2000-05-17 | 2006-06-06 | Deep Nines, Inc. | Intelligent feedback loop process control system |
US6513122B1 (en) | 2001-06-29 | 2003-01-28 | Networks Associates Technology, Inc. | Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities |
-
2000
- 2000-05-17 US US09/572,112 patent/US7058976B1/en not_active Expired - Lifetime
-
2001
- 2001-05-09 AU AU2001261379A patent/AU2001261379A1/en not_active Abandoned
- 2001-05-09 EP EP01935271A patent/EP1282954B1/en not_active Expired - Lifetime
- 2001-05-09 DE DE60114181T patent/DE60114181T2/en not_active Expired - Fee Related
- 2001-05-09 JP JP2001585449A patent/JP2003533941A/en active Pending
- 2001-05-09 WO PCT/US2001/015108 patent/WO2001089146A2/en active IP Right Grant
- 2001-05-09 AT AT01935271T patent/ATE307439T1/en not_active IP Right Cessation
-
2003
- 2003-12-19 US US10/741,798 patent/US20040131056A1/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5787253A (en) * | 1996-05-28 | 1998-07-28 | The Ag Group | Apparatus and method of analyzing internet activity |
US5913041A (en) * | 1996-12-09 | 1999-06-15 | Hewlett-Packard Company | System for determining data transfer rates in accordance with log information relates to history of data transfer activities that independently stored in content servers |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2011040064A (en) * | 2003-11-12 | 2011-02-24 | Trustees Of Columbia Univ In The City Of New York | Device, method and medium for detecting abnormal payload by using n gram distribution of normal data |
US8644342B2 (en) | 2003-11-12 | 2014-02-04 | The Trustees Of Columbia University In The City Of New York | Apparatus method and medium for detecting payload anomaly using N-gram distribution of normal data |
US9003528B2 (en) | 2003-11-12 | 2015-04-07 | The Trustees Of Columbia University In The City Of New York | Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data |
US9276950B2 (en) | 2003-11-12 | 2016-03-01 | The Trustees Of Columbia University In The City Of New York | Apparatus method and medium for detecting payload anomaly using N-gram distribution of normal data |
US10063574B2 (en) | 2003-11-12 | 2018-08-28 | The Trustees Of Columbia University In The City Of New York | Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data |
US10673884B2 (en) | 2003-11-12 | 2020-06-02 | The Trustees Of Columbia University In The City Of New York | Apparatus method and medium for tracing the origin of network transmissions using n-gram distribution of data |
WO2007019349A2 (en) * | 2005-08-03 | 2007-02-15 | Calyptix Security | Systems and methods for dynamically learning network environments to achieve adaptive security |
WO2007019349A3 (en) * | 2005-08-03 | 2007-03-29 | Calyptix Security | Systems and methods for dynamically learning network environments to achieve adaptive security |
Also Published As
Publication number | Publication date |
---|---|
EP1282954A2 (en) | 2003-02-12 |
ATE307439T1 (en) | 2005-11-15 |
US20040131056A1 (en) | 2004-07-08 |
EP1282954B1 (en) | 2005-10-19 |
WO2001089146A3 (en) | 2002-05-16 |
DE60114181D1 (en) | 2006-03-02 |
DE60114181T2 (en) | 2006-07-13 |
US7058976B1 (en) | 2006-06-06 |
AU2001261379A1 (en) | 2001-11-26 |
JP2003533941A (en) | 2003-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1282954B1 (en) | Intelligent feedback loop process control system | |
Dayal et al. | Research trends in security and DDoS in SDN | |
EP1668511B1 (en) | Apparatus and method for dynamic distribution of intrusion signatures | |
EP1678567B1 (en) | Method and system for intrusion prevention and deflection, | |
US7707305B2 (en) | Methods and apparatus for protecting against overload conditions on nodes of a distributed network | |
US7870611B2 (en) | System method and apparatus for service attack detection on a network | |
US8356350B2 (en) | Method and system for managing denial of service situations | |
US7627677B2 (en) | Process to thwart denial of service attacks on the internet | |
US7266602B2 (en) | System, method and computer program product for processing accounting information | |
US20040148520A1 (en) | Mitigating denial of service attacks | |
KR101042291B1 (en) | System and method for detecting and blocking to distributed denial of service attack | |
US10986018B2 (en) | Reducing traffic overload in software defined network | |
WO2002025402A2 (en) | Systems and methods that protect networks and devices against denial of service attacks | |
EP1595193B1 (en) | Detecting and protecting against worm traffic on a network | |
US8286244B2 (en) | Method and system for protecting a computer network against packet floods | |
Chen | Aegis: An active-network-powered defense mechanism against ddos attacks | |
US20050086524A1 (en) | Systems and methods for providing network security with zero network footprint | |
Chouchane et al. | Detection and Reaction against DDoS Attacks in Cellular Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
AK | Designated states |
Kind code of ref document: A3 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A3 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001935271 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2001935271 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 2001935271 Country of ref document: EP |