WO2006031302A3 - System and method of characterizing and managing electronic traffic - Google Patents

System and method of characterizing and managing electronic traffic Download PDF

Info

Publication number
WO2006031302A3
WO2006031302A3 PCT/US2005/026815 US2005026815W WO2006031302A3 WO 2006031302 A3 WO2006031302 A3 WO 2006031302A3 US 2005026815 W US2005026815 W US 2005026815W WO 2006031302 A3 WO2006031302 A3 WO 2006031302A3
Authority
WO
WIPO (PCT)
Prior art keywords
traffic
network
log
users
speed
Prior art date
Application number
PCT/US2005/026815
Other languages
French (fr)
Other versions
WO2006031302A2 (en
Inventor
Phillip H Zakas
Original Assignee
Intelli7 Inc
Phillip H Zakas
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Intelli7 Inc, Phillip H Zakas filed Critical Intelli7 Inc
Priority to JP2007523816A priority Critical patent/JP2008508805A/en
Priority to EP05814849A priority patent/EP1779345A2/en
Publication of WO2006031302A2 publication Critical patent/WO2006031302A2/en
Publication of WO2006031302A3 publication Critical patent/WO2006031302A3/en
Priority to IL180982A priority patent/IL180982A0/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0263Rule management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Abstract

A system and method for monitoring and dynamically managing all user traffic at point of log-in and throughout a user's network experience. Rules may be enforced based on observed traffic of users at and after log-in and up until log off. The system automatically detects network traffic and dynamically responds to potential attacks with extremely high speed and efficiency. Rich Traffic Analysis (RTA) offers greater network traffic characterization accuracy, detection speed, network management options and intrusion prevention capabilities. The system has ability to view all network traffic in the full context of users, applications, data and system access which offers strong, verifiable and accurate protection of networked assets. The system employs several traffic sensor devices communicating with a central manager device ena~ ing the high-speed characterization of each network packets traversing the network. This provides a more solid basis for legitimately taking action and enforcing rules on the observed traffic.
PCT/US2005/026815 2004-07-29 2005-07-29 System and method of characterizing and managing electronic traffic WO2006031302A2 (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
JP2007523816A JP2008508805A (en) 2004-07-29 2005-07-29 System and method for characterizing and managing electronic traffic
EP05814849A EP1779345A2 (en) 2004-07-29 2005-07-29 System and method of characterizing and managing electronic traffic
IL180982A IL180982A0 (en) 2004-07-29 2007-01-25 System and method for characterizing and managing electronic traffic

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US59187204P 2004-07-29 2004-07-29
US59187404P 2004-07-29 2004-07-29
US60/591,874 2004-07-29
US60/591,872 2004-07-29

Publications (2)

Publication Number Publication Date
WO2006031302A2 WO2006031302A2 (en) 2006-03-23
WO2006031302A3 true WO2006031302A3 (en) 2006-10-19

Family

ID=36060469

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/026815 WO2006031302A2 (en) 2004-07-29 2005-07-29 System and method of characterizing and managing electronic traffic

Country Status (6)

Country Link
US (6) US20060026680A1 (en)
EP (1) EP1779345A2 (en)
JP (1) JP2008508805A (en)
IL (1) IL180982A0 (en)
TW (1) TW200618565A (en)
WO (1) WO2006031302A2 (en)

Families Citing this family (295)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8023421B2 (en) * 2002-07-25 2011-09-20 Avaya Inc. Method and apparatus for the assessment and optimization of network traffic
US7720959B2 (en) * 2000-10-17 2010-05-18 Avaya Inc. Method and apparatus for characterizing the quality of a network path
US7406539B2 (en) * 2000-10-17 2008-07-29 Avaya Technology Corp. Method and apparatus for performance and cost optimization in an internetwork
US7336613B2 (en) * 2000-10-17 2008-02-26 Avaya Technology Corp. Method and apparatus for the assessment and optimization of network traffic
US7756032B2 (en) * 2000-10-17 2010-07-13 Avaya Inc. Method and apparatus for communicating data within measurement traffic
US7487237B2 (en) * 2000-10-17 2009-02-03 Avaya Technology Corp. Load optimization
DE60141417D1 (en) 2000-10-17 2010-04-08 Avaya Technology Corp METHOD AND DEVICE FOR OPTIMIZING PERFORMANCE AND COST IN AN INTERNET PLANT
US7349994B2 (en) 2000-10-17 2008-03-25 Avaya Technology Corp. Method and apparatus for coordinating routing parameters via a back-channel communication medium
US9412123B2 (en) 2003-07-01 2016-08-09 The 41St Parameter, Inc. Keystroke analysis
US7523484B2 (en) 2003-09-24 2009-04-21 Infoexpress, Inc. Systems and methods of controlling network access
US10999298B2 (en) 2004-03-02 2021-05-04 The 41St Parameter, Inc. Method and system for identifying users and detecting fraud by use of the internet
US7966658B2 (en) * 2004-04-08 2011-06-21 The Regents Of The University Of California Detecting public network attacks using signatures and fast content analysis
JP4634456B2 (en) * 2004-09-09 2011-02-16 アバイア インコーポレーテッド Method and system for security of network traffic
US7634809B1 (en) * 2005-03-11 2009-12-15 Symantec Corporation Detecting unsanctioned network servers
US7583662B1 (en) * 2005-04-12 2009-09-01 Tp Lab, Inc. Voice virtual private network
US7634584B2 (en) 2005-04-27 2009-12-15 Solarflare Communications, Inc. Packet validation in virtual network interface architecture
US7680695B2 (en) * 2005-05-10 2010-03-16 Sap Ag Method and system for role-based authorization in web shopping
US20070002736A1 (en) * 2005-06-16 2007-01-04 Cisco Technology, Inc. System and method for improving network resource utilization
GB0512744D0 (en) * 2005-06-22 2005-07-27 Blackspider Technologies Method and system for filtering electronic messages
US8665868B2 (en) * 2005-08-19 2014-03-04 Cpacket Networks, Inc. Apparatus and method for enhancing forwarding and classification of network traffic with prioritized matching and categorization
US7890991B2 (en) * 2005-08-19 2011-02-15 Cpacket Networks, Inc. Apparatus and method for providing security and monitoring in a networking architecture
US7937756B2 (en) 2005-08-19 2011-05-03 Cpacket Networks, Inc. Apparatus and method for facilitating network security
US7882554B2 (en) * 2005-08-19 2011-02-01 Cpacket Networks, Inc. Apparatus and method for selective mirroring
US8296846B2 (en) * 2005-08-19 2012-10-23 Cpacket Networks, Inc. Apparatus and method for associating categorization information with network traffic to facilitate application level processing
US8024799B2 (en) * 2005-08-19 2011-09-20 Cpacket Networks, Inc. Apparatus and method for facilitating network security with granular traffic modifications
US8346918B2 (en) * 2005-08-19 2013-01-01 Cpacket Networks, Inc. Apparatus and method for biased and weighted sampling of network traffic to facilitate network monitoring
GB2444457B (en) * 2005-09-27 2010-03-17 Nortel Networks Ltd Method for dynamic sensor network processing
US8301771B2 (en) * 2005-10-26 2012-10-30 Armstrong, Quinton Co. LLC Methods, systems, and computer program products for transmission control of sensitive application-layer data
US8566928B2 (en) 2005-10-27 2013-10-22 Georgia Tech Research Corporation Method and system for detecting and responding to attacking networks
US7606232B1 (en) 2005-11-09 2009-10-20 Juniper Networks, Inc. Dynamic virtual local area network (VLAN) interface configuration
US8495743B2 (en) * 2005-12-16 2013-07-23 Cisco Technology, Inc. Methods and apparatus providing automatic signature generation and enforcement
US11301585B2 (en) 2005-12-16 2022-04-12 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US8413245B2 (en) * 2005-12-16 2013-04-02 Cisco Technology, Inc. Methods and apparatus providing computer and network security for polymorphic attacks
US8938671B2 (en) 2005-12-16 2015-01-20 The 41St Parameter, Inc. Methods and apparatus for securely displaying digital images
US9286469B2 (en) * 2005-12-16 2016-03-15 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic signature generation
US7882560B2 (en) * 2005-12-16 2011-02-01 Cisco Technology, Inc. Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing
US20070143849A1 (en) * 2005-12-19 2007-06-21 Eyal Adar Method and a software system for end-to-end security assessment for security and CIP professionals
US8392999B2 (en) * 2005-12-19 2013-03-05 White Cyber Knight Ltd. Apparatus and methods for assessing and maintaining security of a computerized system under development
CA2531410A1 (en) * 2005-12-23 2007-06-23 Snipe Network Security Corporation Behavioural-based network anomaly detection based on user and group profiling
USD750847S1 (en) 2006-02-09 2016-03-01 Artisent, Llc Helmet mount
US7492766B2 (en) * 2006-02-22 2009-02-17 Juniper Networks, Inc. Dynamic building of VLAN interfaces based on subscriber information strings
US7808994B1 (en) 2006-02-22 2010-10-05 Juniper Networks, Inc. Forwarding traffic to VLAN interfaces built based on subscriber information strings
US8151327B2 (en) 2006-03-31 2012-04-03 The 41St Parameter, Inc. Systems and methods for detection of session tampering and fraud prevention
FR2902546B1 (en) * 2006-06-16 2008-12-26 Olfeo Sarl METHOD AND SYSTEM FOR PROCESSING SECURITY DATA OF A COMPUTER NETWORK.
US7991899B2 (en) * 2006-09-12 2011-08-02 Morgan Stanley Systems and methods for establishing rules for communication with a host
US8533819B2 (en) * 2006-09-29 2013-09-10 At&T Intellectual Property Ii, L.P. Method and apparatus for detecting compromised host computers
US11120406B2 (en) * 2006-11-16 2021-09-14 Comcast Cable Communications, Llc Process for abuse mitigation
US8484733B2 (en) * 2006-11-28 2013-07-09 Cisco Technology, Inc. Messaging security device
EP2127311B1 (en) * 2007-02-02 2013-10-09 Websense, Inc. System and method for adding context to prevent data leakage over a computer network
US7865589B2 (en) 2007-03-12 2011-01-04 Citrix Systems, Inc. Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance
US8490148B2 (en) 2007-03-12 2013-07-16 Citrix Systems, Inc Systems and methods for managing application security profiles
US8631147B2 (en) * 2007-03-12 2014-01-14 Citrix Systems, Inc. Systems and methods for configuring policy bank invocations
US7870277B2 (en) * 2007-03-12 2011-01-11 Citrix Systems, Inc. Systems and methods for using object oriented expressions to configure application security policies
AU2008225150A1 (en) * 2007-03-12 2008-09-18 Citrix Systems, Inc. Systems and methods for configuring, applying and managing object-oriented policy expressions for a network device
US7853678B2 (en) * 2007-03-12 2010-12-14 Citrix Systems, Inc. Systems and methods for configuring flow control of policy expressions
US7853679B2 (en) * 2007-03-12 2010-12-14 Citrix Systems, Inc. Systems and methods for configuring handling of undefined policy events
EP2149246B1 (en) * 2007-04-12 2018-07-11 Kroll Information Assurance, LLC A system and method for creating a list of shared information on a peer-to-peer network
WO2008124947A1 (en) * 2007-04-16 2008-10-23 Neuralitic Systems A method and system for filtering ip traffic in mobile ip networks
CN101311284A (en) * 2007-05-24 2008-11-26 鸿富锦精密工业(深圳)有限公司 Magnesium alloy and magnesium alloy thin material
CN101325780B (en) * 2007-06-15 2010-07-07 华为技术有限公司 Method and system for implementing tactics control, entity for executing tactics and charging
US7787375B2 (en) * 2007-08-06 2010-08-31 International Business Machines Corporation Performing a recovery action in response to a credit depletion notification
US7975027B2 (en) * 2007-08-06 2011-07-05 International Business Machines Corporation Credit depletion notification for transmitting frames between a port pair
US10055595B2 (en) * 2007-08-30 2018-08-21 Baimmt, Llc Secure credentials control method
US8908700B2 (en) * 2007-09-07 2014-12-09 Citrix Systems, Inc. Systems and methods for bridging a WAN accelerator with a security gateway
KR100933986B1 (en) * 2007-10-22 2009-12-28 한국전자통신연구원 Integrated Signature Management and Distribution System and Method for Network Attack
US7433960B1 (en) * 2008-01-04 2008-10-07 International Business Machines Corporation Systems, methods and computer products for profile based identity verification over the internet
US8074281B2 (en) * 2008-01-14 2011-12-06 Microsoft Corporation Malware detection with taint tracking
US8370948B2 (en) * 2008-03-19 2013-02-05 Websense, Inc. System and method for analysis of electronic information dissemination events
US8407784B2 (en) * 2008-03-19 2013-03-26 Websense, Inc. Method and system for protection against information stealing software
US9015842B2 (en) 2008-03-19 2015-04-21 Websense, Inc. Method and system for protection against information stealing software
US9130986B2 (en) * 2008-03-19 2015-09-08 Websense, Inc. Method and system for protection against information stealing software
US20090262656A1 (en) * 2008-04-22 2009-10-22 International Business Machines Corporation Method for new resource to communicate and activate monitoring of best practice metrics and thresholds values
WO2009132148A2 (en) * 2008-04-22 2009-10-29 The 41St Parameter, Inc. Systems and methods for security management based on cursor events
US8627060B2 (en) * 2008-04-30 2014-01-07 Viasat, Inc. Trusted network interface
US8339959B1 (en) 2008-05-20 2012-12-25 Juniper Networks, Inc. Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane
US8924469B2 (en) 2008-06-05 2014-12-30 Headwater Partners I Llc Enterprise access control and accounting allocation for access networks
US8635335B2 (en) 2009-01-28 2014-01-21 Headwater Partners I Llc System and method for wireless network offloading
US8326958B1 (en) * 2009-01-28 2012-12-04 Headwater Partners I, Llc Service activation tracking system
US8548428B2 (en) 2009-01-28 2013-10-01 Headwater Partners I Llc Device group partitions and settlement platform
US8391834B2 (en) * 2009-01-28 2013-03-05 Headwater Partners I Llc Security techniques for device assisted services
US8626115B2 (en) 2009-01-28 2014-01-07 Headwater Partners I Llc Wireless network service interfaces
US8924543B2 (en) 2009-01-28 2014-12-30 Headwater Partners I Llc Service design center for device assisted services
US8898293B2 (en) 2009-01-28 2014-11-25 Headwater Partners I Llc Service offer set publishing to device agent with on-device service selection
US8346225B2 (en) 2009-01-28 2013-01-01 Headwater Partners I, Llc Quality of service for device assisted services
US8589541B2 (en) 2009-01-28 2013-11-19 Headwater Partners I Llc Device-assisted services for protecting network capacity
US8406748B2 (en) 2009-01-28 2013-03-26 Headwater Partners I Llc Adaptive ambient services
US8402111B2 (en) 2009-01-28 2013-03-19 Headwater Partners I, Llc Device assisted services install
US8340634B2 (en) 2009-01-28 2012-12-25 Headwater Partners I, Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US8275830B2 (en) 2009-01-28 2012-09-25 Headwater Partners I Llc Device assisted CDR creation, aggregation, mediation and billing
US8832777B2 (en) 2009-03-02 2014-09-09 Headwater Partners I Llc Adapting network policies based on device service processor configuration
US8725123B2 (en) 2008-06-05 2014-05-13 Headwater Partners I Llc Communications device with secure data path processing agents
US7818412B2 (en) * 2008-06-27 2010-10-19 Microsoft Corporation Selection of sensors for monitoring phenomena considering the value of information and data sharing preferences
DE102009032466B4 (en) * 2008-07-16 2017-03-02 Infineon Technologies Ag Security in networks
US9379895B2 (en) * 2008-07-24 2016-06-28 Zscaler, Inc. HTTP authentication and authorization management
US9064275B1 (en) * 2008-07-25 2015-06-23 At&T Intellectual Property I, L.P. Systems and methods for charging and billing in converged communications networks
US10027688B2 (en) 2008-08-11 2018-07-17 Damballa, Inc. Method and system for detecting malicious and/or botnet-related domain names
US8154996B2 (en) 2008-09-11 2012-04-10 Juniper Networks, Inc. Methods and apparatus for flow control associated with multi-staged queues
US8955107B2 (en) * 2008-09-12 2015-02-10 Juniper Networks, Inc. Hierarchical application of security services within a computer network
US8040798B2 (en) * 2008-09-25 2011-10-18 Microsoft Corporation Discovering communication rules in a network trace
US8040808B1 (en) 2008-10-20 2011-10-18 Juniper Networks, Inc. Service aware path selection with a network acceleration device
US8312542B2 (en) * 2008-10-29 2012-11-13 Lockheed Martin Corporation Network intrusion detection using MDL compress for deep packet inspection
US7965636B2 (en) * 2008-12-05 2011-06-21 Hewlett-Packard Development Company, L.P. Loadbalancing network traffic across multiple remote inspection devices
KR101010302B1 (en) * 2008-12-24 2011-01-25 한국인터넷진흥원 Security management system and method of irc and http botnet
US11218854B2 (en) 2009-01-28 2022-01-04 Headwater Research Llc Service plan design, user interfaces, application programming interfaces, and device management
US10779177B2 (en) 2009-01-28 2020-09-15 Headwater Research Llc Device group partitions and settlement platform
US9578182B2 (en) 2009-01-28 2017-02-21 Headwater Partners I Llc Mobile device and service management
US10057775B2 (en) 2009-01-28 2018-08-21 Headwater Research Llc Virtualized policy and charging system
US10798252B2 (en) 2009-01-28 2020-10-06 Headwater Research Llc System and method for providing user notifications
US9253663B2 (en) 2009-01-28 2016-02-02 Headwater Partners I Llc Controlling mobile device communications on a roaming network based on device state
US10264138B2 (en) 2009-01-28 2019-04-16 Headwater Research Llc Mobile device and service management
US10237757B2 (en) 2009-01-28 2019-03-19 Headwater Research Llc System and method for wireless network offloading
US8893009B2 (en) 2009-01-28 2014-11-18 Headwater Partners I Llc End user device that secures an association of application to service policy with an application certificate check
US10200541B2 (en) 2009-01-28 2019-02-05 Headwater Research Llc Wireless end-user device with divided user space/kernel space traffic policy system
US9755842B2 (en) 2009-01-28 2017-09-05 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US10783581B2 (en) 2009-01-28 2020-09-22 Headwater Research Llc Wireless end-user device providing ambient or sponsored services
US8745191B2 (en) 2009-01-28 2014-06-03 Headwater Partners I Llc System and method for providing user notifications
NZ594800A (en) * 2009-01-28 2013-09-27 Headwater Partners I Llc Method and apparatus for modifying a service policy setting of an end-user device
US8351898B2 (en) 2009-01-28 2013-01-08 Headwater Partners I Llc Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US9954975B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Enhanced curfew and protection associated with a device group
US8793758B2 (en) 2009-01-28 2014-07-29 Headwater Partners I Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US9351193B2 (en) 2009-01-28 2016-05-24 Headwater Partners I Llc Intermediate networking devices
US10064055B2 (en) 2009-01-28 2018-08-28 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US8606911B2 (en) 2009-03-02 2013-12-10 Headwater Partners I Llc Flow tagging for service policy implementation
US10248996B2 (en) 2009-01-28 2019-04-02 Headwater Research Llc Method for operating a wireless end-user device mobile payment agent
US10326800B2 (en) 2009-01-28 2019-06-18 Headwater Research Llc Wireless network service interfaces
US9392462B2 (en) 2009-01-28 2016-07-12 Headwater Partners I Llc Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy
US9557889B2 (en) 2009-01-28 2017-01-31 Headwater Partners I Llc Service plan design, user interfaces, application programming interfaces, and device management
US9980146B2 (en) 2009-01-28 2018-05-22 Headwater Research Llc Communications device with secure data path processing agents
US9858559B2 (en) 2009-01-28 2018-01-02 Headwater Research Llc Network service plan design
US10484858B2 (en) 2009-01-28 2019-11-19 Headwater Research Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US9706061B2 (en) 2009-01-28 2017-07-11 Headwater Partners I Llc Service design center for device assisted services
US9647918B2 (en) 2009-01-28 2017-05-09 Headwater Research Llc Mobile device and method attributing media services network usage to requesting application
US10492102B2 (en) 2009-01-28 2019-11-26 Headwater Research Llc Intermediate networking devices
US10715342B2 (en) 2009-01-28 2020-07-14 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US10841839B2 (en) 2009-01-28 2020-11-17 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US9572019B2 (en) 2009-01-28 2017-02-14 Headwater Partners LLC Service selection set published to device agent with on-device service selection
US9270559B2 (en) 2009-01-28 2016-02-23 Headwater Partners I Llc Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
US9955332B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Method for child wireless device activation to subscriber account of a master wireless device
US9565707B2 (en) 2009-01-28 2017-02-07 Headwater Partners I Llc Wireless end-user device with wireless data attribution to multiple personas
WO2010087845A1 (en) * 2009-01-30 2010-08-05 Hewlett-Packard Development Company, L.P. Dynamically applying a control policy to a network
US8402541B2 (en) 2009-03-12 2013-03-19 Microsoft Corporation Proactive exploit detection
US9112850B1 (en) 2009-03-25 2015-08-18 The 41St Parameter, Inc. Systems and methods of sharing information through a tag-based consortium
US8868439B2 (en) * 2009-05-15 2014-10-21 Microsoft Corporation Content activity feedback into a reputation system
US9130972B2 (en) 2009-05-26 2015-09-08 Websense, Inc. Systems and methods for efficient detection of fingerprinted data and information
US9432271B2 (en) * 2009-06-15 2016-08-30 Qualcomm Incorporated Sensor network management
US8214490B1 (en) * 2009-09-15 2012-07-03 Symantec Corporation Compact input compensating reputation data tracking mechanism
GB2474545B (en) * 2009-09-24 2015-06-24 Fisher Rosemount Systems Inc Integrated unified threat management for a process control system
US8640195B2 (en) * 2009-09-30 2014-01-28 International Business Machines Corporation Method and system for automating security policy definition based on recorded transactions
US20110087786A1 (en) * 2009-10-07 2011-04-14 Wichorus, Inc. Method and apparatus for efficient resource allocation of quality of service profiles in mobile networks
US9385970B2 (en) * 2009-10-07 2016-07-05 Wichorus, Inc. Method and apparatus for assigning resources in a network node
US9106563B2 (en) * 2009-10-07 2015-08-11 Wichorus, Inc. Method and apparatus for switching communications traffic in a communications network
US20110153811A1 (en) * 2009-12-18 2011-06-23 Hyun Cheol Jeong System and method for modeling activity patterns of network traffic to detect botnets
US9264321B2 (en) 2009-12-23 2016-02-16 Juniper Networks, Inc. Methods and apparatus for tracking data flow based on flow state values
US8578497B2 (en) 2010-01-06 2013-11-05 Damballa, Inc. Method and system for detecting malware
US8826438B2 (en) 2010-01-19 2014-09-02 Damballa, Inc. Method and system for network-based detecting of malware from behavioral clustering
US8782790B1 (en) * 2010-02-19 2014-07-15 Symantec Corporation Signature creation for malicious network traffic
US20110209215A1 (en) * 2010-02-22 2011-08-25 Hazem Kabbara Intelligent Network Security Resource Deployment System
US8555343B2 (en) * 2010-03-23 2013-10-08 Verizon Patent And Licensing Inc. Managing resource allocations based on traffic patterns
US9361597B2 (en) 2010-10-19 2016-06-07 The 41St Parameter, Inc. Variable risk engine
US20130298254A1 (en) * 2010-10-26 2013-11-07 Matthew Richard Thomas Hall Methods and systems for detecting suspected data leakage using traffic samples
US9116911B2 (en) * 2010-11-02 2015-08-25 International Business Machines Corporation Remote file sharing based on content filtering
KR20120070299A (en) * 2010-12-21 2012-06-29 한국전자통신연구원 Apparatus and method for generating adaptive security model
US20120240220A1 (en) * 2011-03-15 2012-09-20 Raytheon Company Method and system for controlling data access on user interfaces
JP5776927B2 (en) * 2011-03-28 2015-09-09 ソニー株式会社 Information processing apparatus and method, and program
US9154826B2 (en) 2011-04-06 2015-10-06 Headwater Partners Ii Llc Distributing content and service launch objects to mobile devices
US8503636B1 (en) * 2011-04-29 2013-08-06 Symantec Corporation Systems and methods for blocking an outgoing request associated with an outgoing telephone number
US8412745B1 (en) * 2011-09-14 2013-04-02 Raytheon Company Relational database model optimized for the use and maintenance of watchlist data in a high demand environment
US8811183B1 (en) 2011-10-04 2014-08-19 Juniper Networks, Inc. Methods and apparatus for multi-path flow control within a multi-stage switch fabric
US10754913B2 (en) 2011-11-15 2020-08-25 Tapad, Inc. System and method for analyzing user device information
US9251535B1 (en) 2012-01-05 2016-02-02 Juniper Networks, Inc. Offload of data transfer statistics from a mobile access gateway
US9922190B2 (en) 2012-01-25 2018-03-20 Damballa, Inc. Method and system for detecting DGA-based malware
US9633201B1 (en) 2012-03-01 2017-04-25 The 41St Parameter, Inc. Methods and systems for fraud containment
US8856929B1 (en) * 2012-03-13 2014-10-07 Sprint Communications Company L.P. Wireless communication device with circuitry to invoke a physically independent non-IP communication capability
US9521551B2 (en) 2012-03-22 2016-12-13 The 41St Parameter, Inc. Methods and systems for persistent cross-application mobile device identification
IL219499B (en) * 2012-04-30 2019-02-28 Verint Systems Ltd System and method for malware detection
US8874103B2 (en) 2012-05-11 2014-10-28 Intel Corporation Determining proximity of user equipment for device-to-device communication
ES2684553T3 (en) * 2012-05-11 2018-10-03 Intel Corporation Determine the proximity of user equipment in device-to-device communications
US8738628B2 (en) * 2012-05-31 2014-05-27 International Business Machines Corporation Community profiling for social media
TW201404074A (en) * 2012-07-02 2014-01-16 Chunghwa Telecom Co Ltd Fault diagnosis method by wideband network traffic analysis using relational rules
CN102857388A (en) * 2012-07-12 2013-01-02 上海云辰信息科技有限公司 Cloud detection safety management auditing system
EP2880619A1 (en) 2012-08-02 2015-06-10 The 41st Parameter, Inc. Systems and methods for accessing records via derivative locators
US10547674B2 (en) 2012-08-27 2020-01-28 Help/Systems, Llc Methods and systems for network flow analysis
US10084806B2 (en) 2012-08-31 2018-09-25 Damballa, Inc. Traffic simulation to identify malicious activity
US9894088B2 (en) 2012-08-31 2018-02-13 Damballa, Inc. Data mining to identify malicious activity
US9154507B2 (en) * 2012-10-15 2015-10-06 International Business Machines Corporation Automated role and entitlements mining using network observations
US9210128B2 (en) * 2012-10-25 2015-12-08 Check Point Software Technologies Ltd. Filtering of applications for access to an enterprise network
WO2014078569A1 (en) 2012-11-14 2014-05-22 The 41St Parameter, Inc. Systems and methods of global identification
US9241259B2 (en) 2012-11-30 2016-01-19 Websense, Inc. Method and apparatus for managing the transfer of sensitive information to mobile devices
KR101371902B1 (en) * 2012-12-12 2014-03-10 현대자동차주식회사 Apparatus for detecting vehicle network attcak and method thereof
EP2945720B1 (en) * 2013-01-18 2017-11-08 Kuss Filtration Inc. Channel depth filtration media
WO2014159862A1 (en) 2013-03-14 2014-10-02 Headwater Partners I Llc Automated credential porting for mobile devices
US9767299B2 (en) 2013-03-15 2017-09-19 Mymail Technology, Llc Secure cloud data sharing
US9338134B2 (en) * 2013-03-27 2016-05-10 Fortinet, Inc. Firewall policy management
US9426124B2 (en) 2013-04-08 2016-08-23 Solarflare Communications, Inc. Locked down network interface
US10742604B2 (en) * 2013-04-08 2020-08-11 Xilinx, Inc. Locked down network interface
US9158915B1 (en) * 2013-05-24 2015-10-13 Symantec Corporation Systems and methods for analyzing zero-day attacks
IL226747B (en) 2013-06-04 2019-01-31 Verint Systems Ltd System and method for malware detection learning
US9571511B2 (en) * 2013-06-14 2017-02-14 Damballa, Inc. Systems and methods for traffic classification
US9730153B2 (en) 2013-07-17 2017-08-08 Huawei Technologies Co., Ltd. System and methods for multi-objective cell switch-off in wireless networks
US10902327B1 (en) 2013-08-30 2021-01-26 The 41St Parameter, Inc. System and method for device identification and uniqueness
KR101455167B1 (en) * 2013-09-03 2014-10-27 한국전자통신연구원 Network switch based on whitelist
US9645860B2 (en) * 2013-09-06 2017-05-09 Microsoft Technology Licensing, Llc Verification that particular information is transferred by an application
KR101463695B1 (en) * 2013-09-09 2014-11-19 주식회사 엘지유플러스 Traffic management system and control method thereof
US9961096B1 (en) 2013-09-17 2018-05-01 Cisco Technology, Inc. Distributed behavior based anomaly detection
US9503465B2 (en) 2013-11-14 2016-11-22 At&T Intellectual Property I, L.P. Methods and apparatus to identify malicious activity in a network
US10764323B1 (en) * 2015-12-21 2020-09-01 Amdocs Development Limited System, method, and computer program for isolating services of a communication network in response to a distributed denial of service (DDoS) attack
US9485271B1 (en) * 2014-03-11 2016-11-01 Symantec Corporation Systems and methods for anomaly-based detection of compromised IT administration accounts
US9832217B2 (en) * 2014-03-13 2017-11-28 International Business Machines Corporation Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure
US10498700B2 (en) * 2014-03-25 2019-12-03 Hewlett Packard Enterprise Development Lp Transmitting network traffic in accordance with network traffic rules
US9306964B2 (en) * 2014-04-04 2016-04-05 Netscout Systems, Inc. Using trust profiles for network breach detection
US9628502B2 (en) * 2014-06-09 2017-04-18 Meadow Hills, LLC Active attack detection system
US9692728B2 (en) * 2014-06-18 2017-06-27 Telefonaktiebolaget Lm Ericsson (Publ) Packet filtering at an application-processor-to-modem interface
US9584341B2 (en) 2014-06-18 2017-02-28 Telefonaktiebolaget Lm Ericsson (Publ) Modem interface using virtual local-area network tagging
US11838851B1 (en) * 2014-07-15 2023-12-05 F5, Inc. Methods for managing L7 traffic classification and devices thereof
WO2016036321A1 (en) * 2014-09-05 2016-03-10 Agency For Science, Technology And Research Methods for generating a vulnerability pattern, methods for determining a security threat, vulnerability pattern generators, and vulnerability pattern scanners
WO2016040297A1 (en) * 2014-09-08 2016-03-17 Seven Networks, Llc Device activity and data traffic signature-based detection of mobile device health
US9893944B2 (en) 2014-10-01 2018-02-13 International Business Machines Corporation Managing network bandwidth based on cognitive analysis of site content against organizational needs
US10091312B1 (en) 2014-10-14 2018-10-02 The 41St Parameter, Inc. Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups
CN105681261A (en) * 2014-11-19 2016-06-15 小米科技有限责任公司 Security authentication method and apparatus
US10182013B1 (en) 2014-12-01 2019-01-15 F5 Networks, Inc. Methods for managing progressive image delivery and devices thereof
US9860264B2 (en) * 2014-12-23 2018-01-02 International Business Machines Corporation Multi-dimensional geometry for enhancement of simulations of network devices
US10560842B2 (en) 2015-01-28 2020-02-11 Verint Systems Ltd. System and method for combined network-side and off-air monitoring of wireless networks
US11895138B1 (en) 2015-02-02 2024-02-06 F5, Inc. Methods for improving web scanner accuracy and devices thereof
WO2016138400A1 (en) * 2015-02-27 2016-09-01 Cisco Technology, Inc. System and methods for computer network security involving user confirmation of network connections
US9807117B2 (en) 2015-03-17 2017-10-31 Solarflare Communications, Inc. System and apparatus for providing network security
US10165004B1 (en) 2015-03-18 2018-12-25 Cequence Security, Inc. Passive detection of forged web browsers
US9602527B2 (en) * 2015-03-19 2017-03-21 Fortinet, Inc. Security threat detection
US9930065B2 (en) 2015-03-25 2018-03-27 University Of Georgia Research Foundation, Inc. Measuring, categorizing, and/or mitigating malware distribution paths
IL238001B (en) * 2015-03-29 2020-05-31 Verint Systems Ltd System and method for identifying communication session participants based on traffic patterns
US9934475B2 (en) * 2015-05-13 2018-04-03 Bank Of America Corporation Managing enterprise data movement using a heuristic data movement detection engine
US10154049B2 (en) * 2015-05-13 2018-12-11 Preempt Security, Inc. System and method for providing an in-line sniffer mode network based identity centric firewall
US10536357B2 (en) 2015-06-05 2020-01-14 Cisco Technology, Inc. Late data detection in data center
US10142353B2 (en) 2015-06-05 2018-11-27 Cisco Technology, Inc. System for monitoring and managing datacenters
US11418520B2 (en) 2015-06-15 2022-08-16 Cequence Security, Inc. Passive security analysis with inline active security device
TWI562013B (en) * 2015-07-06 2016-12-11 Wistron Corp Method, system and apparatus for predicting abnormality
JP5967739B1 (en) 2015-07-23 2016-08-10 Necプラットフォームズ株式会社 Filtering system, management apparatus, filtering method, and management program
JP6520612B2 (en) 2015-09-28 2019-05-29 富士通株式会社 Firewall controller, firewall device, and firewall control method
US9686415B2 (en) 2015-11-06 2017-06-20 At&T Intellectual Property I, L.P. Systems and methods of split billing
JP6693114B2 (en) * 2015-12-15 2020-05-13 横河電機株式会社 Controller and integrated production system
JP6759572B2 (en) 2015-12-15 2020-09-23 横河電機株式会社 Integrated production system
US10931713B1 (en) 2016-02-17 2021-02-23 Cequence Security, Inc. Passive detection of genuine web browsers based on security parameters
US10536478B2 (en) * 2016-02-26 2020-01-14 Oracle International Corporation Techniques for discovering and managing security of applications
US10063444B2 (en) 2016-02-29 2018-08-28 Red Hat, Inc. Network traffic capture analysis
US10594733B2 (en) * 2016-04-06 2020-03-17 Rapid7, Inc System and method for application software security and auditing
IL245299B (en) 2016-04-25 2021-05-31 Verint Systems Ltd System and method for decrypting communication exchanged on a wireless local area network
US20170324774A1 (en) * 2016-05-05 2017-11-09 Javelin Networks, Inc. Adding supplemental data to a security-related query
US10515187B2 (en) 2016-06-29 2019-12-24 Symantec Corporation Artificial intelligence (AI) techniques for learning and modeling internal networks
US10637864B2 (en) 2016-05-05 2020-04-28 Ca, Inc. Creation of fictitious identities to obfuscate hacking of internal networks
US10686792B1 (en) * 2016-05-13 2020-06-16 Nuvolex, Inc. Apparatus and method for administering user identities across on premise and third-party computation resources
US11416912B2 (en) * 2016-05-13 2022-08-16 Digital River, Inc. High volume transaction queueing with machine learning
CN106027528B (en) * 2016-05-24 2019-07-12 微梦创科网络科技(中国)有限公司 A kind of method and device of the horizontal permission automatic identification of WEB
US10812348B2 (en) 2016-07-15 2020-10-20 A10 Networks, Inc. Automatic capture of network data for a detected anomaly
US10536468B2 (en) * 2016-07-21 2020-01-14 Level 3 Communications, Llc System and method for voice security in a telecommunications network
US10367703B2 (en) * 2016-12-01 2019-07-30 Gigamon Inc. Analysis of network traffic rules at a network visibility node
US10419479B2 (en) * 2017-01-12 2019-09-17 Acalvio Technologies, Inc. Testing environment cyber vaccine
US20180205611A1 (en) * 2017-01-13 2018-07-19 Gigamon Inc. Network enumeration at a network visibility node
US10931686B1 (en) 2017-02-01 2021-02-23 Cequence Security, Inc. Detection of automated requests using session identifiers
US11140173B2 (en) 2017-03-31 2021-10-05 Baimmt, Llc System and method for secure access control
US10785249B2 (en) * 2017-04-06 2020-09-22 Fortinet, Inc. Predicting the risk associated with a network flow, such as one involving an IoT device, and applying an appropriate level of security inspection based thereon
IL252037B (en) 2017-04-30 2021-12-01 Verint Systems Ltd System and method for identifying relationships between users of computer applications
IL252041B (en) 2017-04-30 2020-09-30 Verint Systems Ltd System and method for tracking users of computer applications
US10977361B2 (en) 2017-05-16 2021-04-13 Beyondtrust Software, Inc. Systems and methods for controlling privileged operations
US10498758B1 (en) 2017-06-28 2019-12-03 Armis Security Ltd. Network sensor and method thereof for wireless network vulnerability detection
US10505967B1 (en) * 2017-06-28 2019-12-10 Armis Security Ltd. Sensor-based wireless network vulnerability detection
US11095678B2 (en) * 2017-07-12 2021-08-17 The Boeing Company Mobile security countermeasures
US10979390B2 (en) * 2017-08-25 2021-04-13 Panasonic Intellectual Property Corporation Of America Communication security apparatus, control method, and storage medium storing a program
IL254438B (en) 2017-09-07 2021-12-01 Verint Systems Ltd System and method for decrypting communication over a umts network
US11165720B2 (en) 2017-12-19 2021-11-02 Xilinx, Inc. Network interface device
US10686872B2 (en) 2017-12-19 2020-06-16 Xilinx, Inc. Network interface device
US10686731B2 (en) 2017-12-19 2020-06-16 Xilinx, Inc. Network interface device
IL256690B (en) 2018-01-01 2022-02-01 Cognyte Tech Israel Ltd System and method for identifying pairs of related application users
CN110391988B (en) * 2018-04-16 2023-05-02 阿里巴巴集团控股有限公司 Network flow control method, system and safety protection device
US11356517B2 (en) * 2018-04-30 2022-06-07 Google Llc Optimizing network utilization
US11627201B2 (en) 2018-04-30 2023-04-11 Google Llc Optimizing network utilization
US10838763B2 (en) 2018-07-17 2020-11-17 Xilinx, Inc. Network interface device and host processing device
US10659555B2 (en) 2018-07-17 2020-05-19 Xilinx, Inc. Network interface device and host processing device
US11113118B2 (en) * 2018-07-20 2021-09-07 Hewlett Packard Enterprise Development Lp System and method for managing network access control privileges based on communication context awareness
US11695783B2 (en) * 2018-08-13 2023-07-04 Ares Technologies, Inc. Systems, devices, and methods for determining a confidence level associated with a device using heuristics of trust
US11824882B2 (en) * 2018-08-13 2023-11-21 Ares Technologies, Inc. Systems, devices, and methods for determining a confidence level associated with a device using heuristics of trust
CN109246736B (en) * 2018-08-31 2021-11-26 中建科技集团有限公司 Sensor network monitoring system, monitor and fault analysis terminal
US11190542B2 (en) 2018-10-22 2021-11-30 A10 Networks, Inc. Network session traffic behavior learning system
US11164206B2 (en) * 2018-11-16 2021-11-02 Comenity Llc Automatically aggregating, evaluating, and providing a contextually relevant offer
JP6603782B2 (en) * 2018-11-22 2019-11-06 株式会社エヌ・ティ・ティ・データ Network information output system and network information output method
US11012472B2 (en) * 2018-12-05 2021-05-18 International Business Machines Corporation Security rule generation based on cognitive and industry analysis
CN109981573B (en) * 2019-02-20 2021-09-10 新华三信息安全技术有限公司 Security event response method and device
GB2584018B (en) 2019-04-26 2022-04-13 Beyondtrust Software Inc Root-level application selective configuration
US11418493B2 (en) 2019-08-07 2022-08-16 Bank Of America Corporation Identifying and securing unencrypted data in a production environment
WO2021041965A1 (en) * 2019-08-28 2021-03-04 Pulse Secure, Llc Autonomous policy enforcement point configuration for role based access control
WO2021084439A1 (en) 2019-11-03 2021-05-06 Verint Systems Ltd. System and method for identifying exchanges of encrypted communication traffic
CN110855657B (en) * 2019-11-07 2021-05-18 深圳市高德信通信股份有限公司 Network security control system for computer network
US11483339B1 (en) 2019-11-27 2022-10-25 Pulse Secure, Llc Detecting attacks and quarantining malware infected devices
US11831664B2 (en) 2020-06-03 2023-11-28 Netskope, Inc. Systems and methods for anomaly detection
CN112231336B (en) * 2020-07-17 2023-07-25 北京百度网讯科技有限公司 Method and device for identifying user, storage medium and electronic equipment
US11909826B1 (en) * 2022-11-03 2024-02-20 Fortinet, Inc. Systems and methods for four dimensional network session authorization
CN116232770B (en) * 2023-05-08 2023-07-21 中国石油大学(华东) Enterprise network safety protection system and method based on SDN controller

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030145232A1 (en) * 2002-01-31 2003-07-31 Poletto Massimiliano Antonio Denial of service attacks characterization
US20040015719A1 (en) * 2002-07-16 2004-01-22 Dae-Hyung Lee Intelligent security engine and intelligent and integrated security system using the same

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2706652B1 (en) * 1993-06-09 1995-08-18 Alsthom Cge Alcatel Device for detecting intrusions and suspicious users for a computer system and security system comprising such a device.
US6072778A (en) * 1996-08-14 2000-06-06 Motorola, Inc. Method of controlling a communication system
US6453345B2 (en) * 1996-11-06 2002-09-17 Datadirect Networks, Inc. Network security and surveillance system
US6424624B1 (en) * 1997-10-16 2002-07-23 Cisco Technology, Inc. Method and system for implementing congestion detection and flow control in high speed digital network
US6078953A (en) * 1997-12-29 2000-06-20 Ukiah Software, Inc. System and method for monitoring quality of service over network
US6320845B1 (en) * 1998-04-27 2001-11-20 Cisco Technology, Inc. Traffic management and flow prioritization on a routed computer network
US6154778A (en) * 1998-05-19 2000-11-28 Hewlett-Packard Company Utility-based multi-category quality-of-service negotiation in distributed systems
US6015776A (en) * 1998-09-08 2000-01-18 Chevron Chemical Company Polyalkylene polysuccinimides and post-treated derivatives thereof
US6286052B1 (en) * 1998-12-04 2001-09-04 Cisco Technology, Inc. Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows
US6321338B1 (en) * 1998-11-09 2001-11-20 Sri International Network surveillance
US6643260B1 (en) * 1998-12-18 2003-11-04 Cisco Technology, Inc. Method and apparatus for implementing a quality of service policy in a data communications network
US6493317B1 (en) * 1998-12-18 2002-12-10 Cisco Technology, Inc. Traffic engineering technique for routing inter-class traffic in a computer network
US6301668B1 (en) * 1998-12-29 2001-10-09 Cisco Technology, Inc. Method and system for adaptive network security using network vulnerability assessment
US7120934B2 (en) * 2000-03-30 2006-10-10 Ishikawa Mark M System, method and apparatus for detecting, identifying and responding to fraudulent requests on a network
US20030061506A1 (en) * 2001-04-05 2003-03-27 Geoffrey Cooper System and method for security policy
US20020107953A1 (en) * 2001-01-16 2002-08-08 Mark Ontiveros Method and device for monitoring data traffic and preventing unauthorized access to a network
US20020133586A1 (en) * 2001-01-16 2002-09-19 Carter Shanklin Method and device for monitoring data traffic and preventing unauthorized access to a network
US7234168B2 (en) * 2001-06-13 2007-06-19 Mcafee, Inc. Hierarchy-based method and apparatus for detecting attacks on a computer system
US8370936B2 (en) * 2002-02-08 2013-02-05 Juniper Networks, Inc. Multi-method gateway-based network security systems and methods
US20030188189A1 (en) * 2002-03-27 2003-10-02 Desai Anish P. Multi-level and multi-platform intrusion detection and response system
US7373663B2 (en) * 2002-05-31 2008-05-13 Alcatel Canada Inc. Secret hashing for TCP SYN/FIN correspondence
US20030236995A1 (en) * 2002-06-21 2003-12-25 Fretwell Lyman Jefferson Method and apparatus for facilitating detection of network intrusion
US20040030931A1 (en) * 2002-08-12 2004-02-12 Chamandy Alexander G. System and method for providing enhanced network security
WO2004028121A2 (en) * 2002-09-23 2004-04-01 Wimetrics Corporation System and method for wireless local area network monitoring and intrusion detection
US20040123141A1 (en) * 2002-12-18 2004-06-24 Satyendra Yadav Multi-tier intrusion detection system
US7483972B2 (en) * 2003-01-08 2009-01-27 Cisco Technology, Inc. Network security monitoring system
US20040143749A1 (en) * 2003-01-16 2004-07-22 Platformlogic, Inc. Behavior-based host-based intrusion prevention system
US20040148520A1 (en) * 2003-01-29 2004-07-29 Rajesh Talpade Mitigating denial of service attacks
US20040193943A1 (en) * 2003-02-13 2004-09-30 Robert Angelino Multiparameter network fault detection system using probabilistic and aggregation analysis
US7681235B2 (en) * 2003-05-19 2010-03-16 Radware Ltd. Dynamic network protection

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030145232A1 (en) * 2002-01-31 2003-07-31 Poletto Massimiliano Antonio Denial of service attacks characterization
US20040015719A1 (en) * 2002-07-16 2004-01-22 Dae-Hyung Lee Intelligent security engine and intelligent and integrated security system using the same

Also Published As

Publication number Publication date
EP1779345A2 (en) 2007-05-02
JP2008508805A (en) 2008-03-21
TW200618565A (en) 2006-06-01
WO2006031302A2 (en) 2006-03-23
IL180982A0 (en) 2007-07-04
US20060026680A1 (en) 2006-02-02
US20060026681A1 (en) 2006-02-02
US20060026682A1 (en) 2006-02-02
US20060026669A1 (en) 2006-02-02
US20060026678A1 (en) 2006-02-02
US20060026679A1 (en) 2006-02-02

Similar Documents

Publication Publication Date Title
WO2006031302A3 (en) System and method of characterizing and managing electronic traffic
CN104113519B (en) Network attack detecting method and its device
WO2006014504A3 (en) Self configuring network management system
GB0022485D0 (en) Monitoring network activity
US20120173712A1 (en) Method and device for identifying p2p application connections
WO2006127012A3 (en) Packet sampling flow-based detection of network intrusions
WO2005022440A8 (en) Network isolation techniques suitable for virus protection
EP1976227A3 (en) Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices
WO2004088952A3 (en) Intelligent integrated network security device
WO2004111785A3 (en) Event monitoring and management
WO2008057521A3 (en) Personal possession management system using short range ip based personal area network, and method for managing personal possession
WO2003073724A3 (en) System and method for detecting and eliminating ip spoofing in a data transmission network
DE60124295D1 (en) RIVER-BASED DETECTION OF AN INSERT INTO A NETWORK
WO2008096078A3 (en) Portable electronic device and method for securing such device
WO2010057748A3 (en) Network intrusion protection
WO2007133308A3 (en) Centralized processing and management system
WO2008024501A3 (en) System and method for mobile device application management
AU2003294251A1 (en) Server resource management, analysis, and intrusion negation
WO2006019701A3 (en) Inline intrusion detection using a single physical port
WO2007144802A3 (en) Authentication in a multiple-access environment
CN101741628A (en) Application layer service analysis-based network flow analysis method
CN109040140A (en) A kind of attack detection method and device at a slow speed
CN110166480A (en) A kind of analysis method and device of data packet
CN108234516B (en) Method and device for detecting network flooding attack
Zhang et al. Optimization of traditional Snort intrusion detection system

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 180982

Country of ref document: IL

WWE Wipo information: entry into national phase

Ref document number: 200580025488.2

Country of ref document: CN

Ref document number: 2007523816

Country of ref document: JP

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 478/KOLNP/2007

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2005814849

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2005814849

Country of ref document: EP