WO2006031302A3 - System and method of characterizing and managing electronic traffic - Google Patents
System and method of characterizing and managing electronic traffic Download PDFInfo
- Publication number
- WO2006031302A3 WO2006031302A3 PCT/US2005/026815 US2005026815W WO2006031302A3 WO 2006031302 A3 WO2006031302 A3 WO 2006031302A3 US 2005026815 W US2005026815 W US 2005026815W WO 2006031302 A3 WO2006031302 A3 WO 2006031302A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- traffic
- network
- log
- users
- speed
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0263—Rule management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Abstract
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2007523816A JP2008508805A (en) | 2004-07-29 | 2005-07-29 | System and method for characterizing and managing electronic traffic |
EP05814849A EP1779345A2 (en) | 2004-07-29 | 2005-07-29 | System and method of characterizing and managing electronic traffic |
IL180982A IL180982A0 (en) | 2004-07-29 | 2007-01-25 | System and method for characterizing and managing electronic traffic |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US59187204P | 2004-07-29 | 2004-07-29 | |
US59187404P | 2004-07-29 | 2004-07-29 | |
US60/591,874 | 2004-07-29 | ||
US60/591,872 | 2004-07-29 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2006031302A2 WO2006031302A2 (en) | 2006-03-23 |
WO2006031302A3 true WO2006031302A3 (en) | 2006-10-19 |
Family
ID=36060469
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2005/026815 WO2006031302A2 (en) | 2004-07-29 | 2005-07-29 | System and method of characterizing and managing electronic traffic |
Country Status (6)
Country | Link |
---|---|
US (6) | US20060026680A1 (en) |
EP (1) | EP1779345A2 (en) |
JP (1) | JP2008508805A (en) |
IL (1) | IL180982A0 (en) |
TW (1) | TW200618565A (en) |
WO (1) | WO2006031302A2 (en) |
Families Citing this family (295)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8023421B2 (en) * | 2002-07-25 | 2011-09-20 | Avaya Inc. | Method and apparatus for the assessment and optimization of network traffic |
US7720959B2 (en) * | 2000-10-17 | 2010-05-18 | Avaya Inc. | Method and apparatus for characterizing the quality of a network path |
US7406539B2 (en) * | 2000-10-17 | 2008-07-29 | Avaya Technology Corp. | Method and apparatus for performance and cost optimization in an internetwork |
US7336613B2 (en) * | 2000-10-17 | 2008-02-26 | Avaya Technology Corp. | Method and apparatus for the assessment and optimization of network traffic |
US7756032B2 (en) * | 2000-10-17 | 2010-07-13 | Avaya Inc. | Method and apparatus for communicating data within measurement traffic |
US7487237B2 (en) * | 2000-10-17 | 2009-02-03 | Avaya Technology Corp. | Load optimization |
DE60141417D1 (en) | 2000-10-17 | 2010-04-08 | Avaya Technology Corp | METHOD AND DEVICE FOR OPTIMIZING PERFORMANCE AND COST IN AN INTERNET PLANT |
US7349994B2 (en) | 2000-10-17 | 2008-03-25 | Avaya Technology Corp. | Method and apparatus for coordinating routing parameters via a back-channel communication medium |
US9412123B2 (en) | 2003-07-01 | 2016-08-09 | The 41St Parameter, Inc. | Keystroke analysis |
US7523484B2 (en) | 2003-09-24 | 2009-04-21 | Infoexpress, Inc. | Systems and methods of controlling network access |
US10999298B2 (en) | 2004-03-02 | 2021-05-04 | The 41St Parameter, Inc. | Method and system for identifying users and detecting fraud by use of the internet |
US7966658B2 (en) * | 2004-04-08 | 2011-06-21 | The Regents Of The University Of California | Detecting public network attacks using signatures and fast content analysis |
JP4634456B2 (en) * | 2004-09-09 | 2011-02-16 | アバイア インコーポレーテッド | Method and system for security of network traffic |
US7634809B1 (en) * | 2005-03-11 | 2009-12-15 | Symantec Corporation | Detecting unsanctioned network servers |
US7583662B1 (en) * | 2005-04-12 | 2009-09-01 | Tp Lab, Inc. | Voice virtual private network |
US7634584B2 (en) | 2005-04-27 | 2009-12-15 | Solarflare Communications, Inc. | Packet validation in virtual network interface architecture |
US7680695B2 (en) * | 2005-05-10 | 2010-03-16 | Sap Ag | Method and system for role-based authorization in web shopping |
US20070002736A1 (en) * | 2005-06-16 | 2007-01-04 | Cisco Technology, Inc. | System and method for improving network resource utilization |
GB0512744D0 (en) * | 2005-06-22 | 2005-07-27 | Blackspider Technologies | Method and system for filtering electronic messages |
US8665868B2 (en) * | 2005-08-19 | 2014-03-04 | Cpacket Networks, Inc. | Apparatus and method for enhancing forwarding and classification of network traffic with prioritized matching and categorization |
US7890991B2 (en) * | 2005-08-19 | 2011-02-15 | Cpacket Networks, Inc. | Apparatus and method for providing security and monitoring in a networking architecture |
US7937756B2 (en) | 2005-08-19 | 2011-05-03 | Cpacket Networks, Inc. | Apparatus and method for facilitating network security |
US7882554B2 (en) * | 2005-08-19 | 2011-02-01 | Cpacket Networks, Inc. | Apparatus and method for selective mirroring |
US8296846B2 (en) * | 2005-08-19 | 2012-10-23 | Cpacket Networks, Inc. | Apparatus and method for associating categorization information with network traffic to facilitate application level processing |
US8024799B2 (en) * | 2005-08-19 | 2011-09-20 | Cpacket Networks, Inc. | Apparatus and method for facilitating network security with granular traffic modifications |
US8346918B2 (en) * | 2005-08-19 | 2013-01-01 | Cpacket Networks, Inc. | Apparatus and method for biased and weighted sampling of network traffic to facilitate network monitoring |
GB2444457B (en) * | 2005-09-27 | 2010-03-17 | Nortel Networks Ltd | Method for dynamic sensor network processing |
US8301771B2 (en) * | 2005-10-26 | 2012-10-30 | Armstrong, Quinton Co. LLC | Methods, systems, and computer program products for transmission control of sensitive application-layer data |
US8566928B2 (en) | 2005-10-27 | 2013-10-22 | Georgia Tech Research Corporation | Method and system for detecting and responding to attacking networks |
US7606232B1 (en) | 2005-11-09 | 2009-10-20 | Juniper Networks, Inc. | Dynamic virtual local area network (VLAN) interface configuration |
US8495743B2 (en) * | 2005-12-16 | 2013-07-23 | Cisco Technology, Inc. | Methods and apparatus providing automatic signature generation and enforcement |
US11301585B2 (en) | 2005-12-16 | 2022-04-12 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US8413245B2 (en) * | 2005-12-16 | 2013-04-02 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security for polymorphic attacks |
US8938671B2 (en) | 2005-12-16 | 2015-01-20 | The 41St Parameter, Inc. | Methods and apparatus for securely displaying digital images |
US9286469B2 (en) * | 2005-12-16 | 2016-03-15 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic signature generation |
US7882560B2 (en) * | 2005-12-16 | 2011-02-01 | Cisco Technology, Inc. | Methods and apparatus providing computer and network security utilizing probabilistic policy reposturing |
US20070143849A1 (en) * | 2005-12-19 | 2007-06-21 | Eyal Adar | Method and a software system for end-to-end security assessment for security and CIP professionals |
US8392999B2 (en) * | 2005-12-19 | 2013-03-05 | White Cyber Knight Ltd. | Apparatus and methods for assessing and maintaining security of a computerized system under development |
CA2531410A1 (en) * | 2005-12-23 | 2007-06-23 | Snipe Network Security Corporation | Behavioural-based network anomaly detection based on user and group profiling |
USD750847S1 (en) | 2006-02-09 | 2016-03-01 | Artisent, Llc | Helmet mount |
US7492766B2 (en) * | 2006-02-22 | 2009-02-17 | Juniper Networks, Inc. | Dynamic building of VLAN interfaces based on subscriber information strings |
US7808994B1 (en) | 2006-02-22 | 2010-10-05 | Juniper Networks, Inc. | Forwarding traffic to VLAN interfaces built based on subscriber information strings |
US8151327B2 (en) | 2006-03-31 | 2012-04-03 | The 41St Parameter, Inc. | Systems and methods for detection of session tampering and fraud prevention |
FR2902546B1 (en) * | 2006-06-16 | 2008-12-26 | Olfeo Sarl | METHOD AND SYSTEM FOR PROCESSING SECURITY DATA OF A COMPUTER NETWORK. |
US7991899B2 (en) * | 2006-09-12 | 2011-08-02 | Morgan Stanley | Systems and methods for establishing rules for communication with a host |
US8533819B2 (en) * | 2006-09-29 | 2013-09-10 | At&T Intellectual Property Ii, L.P. | Method and apparatus for detecting compromised host computers |
US11120406B2 (en) * | 2006-11-16 | 2021-09-14 | Comcast Cable Communications, Llc | Process for abuse mitigation |
US8484733B2 (en) * | 2006-11-28 | 2013-07-09 | Cisco Technology, Inc. | Messaging security device |
EP2127311B1 (en) * | 2007-02-02 | 2013-10-09 | Websense, Inc. | System and method for adding context to prevent data leakage over a computer network |
US7865589B2 (en) | 2007-03-12 | 2011-01-04 | Citrix Systems, Inc. | Systems and methods for providing structured policy expressions to represent unstructured data in a network appliance |
US8490148B2 (en) | 2007-03-12 | 2013-07-16 | Citrix Systems, Inc | Systems and methods for managing application security profiles |
US8631147B2 (en) * | 2007-03-12 | 2014-01-14 | Citrix Systems, Inc. | Systems and methods for configuring policy bank invocations |
US7870277B2 (en) * | 2007-03-12 | 2011-01-11 | Citrix Systems, Inc. | Systems and methods for using object oriented expressions to configure application security policies |
AU2008225150A1 (en) * | 2007-03-12 | 2008-09-18 | Citrix Systems, Inc. | Systems and methods for configuring, applying and managing object-oriented policy expressions for a network device |
US7853678B2 (en) * | 2007-03-12 | 2010-12-14 | Citrix Systems, Inc. | Systems and methods for configuring flow control of policy expressions |
US7853679B2 (en) * | 2007-03-12 | 2010-12-14 | Citrix Systems, Inc. | Systems and methods for configuring handling of undefined policy events |
EP2149246B1 (en) * | 2007-04-12 | 2018-07-11 | Kroll Information Assurance, LLC | A system and method for creating a list of shared information on a peer-to-peer network |
WO2008124947A1 (en) * | 2007-04-16 | 2008-10-23 | Neuralitic Systems | A method and system for filtering ip traffic in mobile ip networks |
CN101311284A (en) * | 2007-05-24 | 2008-11-26 | 鸿富锦精密工业(深圳)有限公司 | Magnesium alloy and magnesium alloy thin material |
CN101325780B (en) * | 2007-06-15 | 2010-07-07 | 华为技术有限公司 | Method and system for implementing tactics control, entity for executing tactics and charging |
US7787375B2 (en) * | 2007-08-06 | 2010-08-31 | International Business Machines Corporation | Performing a recovery action in response to a credit depletion notification |
US7975027B2 (en) * | 2007-08-06 | 2011-07-05 | International Business Machines Corporation | Credit depletion notification for transmitting frames between a port pair |
US10055595B2 (en) * | 2007-08-30 | 2018-08-21 | Baimmt, Llc | Secure credentials control method |
US8908700B2 (en) * | 2007-09-07 | 2014-12-09 | Citrix Systems, Inc. | Systems and methods for bridging a WAN accelerator with a security gateway |
KR100933986B1 (en) * | 2007-10-22 | 2009-12-28 | 한국전자통신연구원 | Integrated Signature Management and Distribution System and Method for Network Attack |
US7433960B1 (en) * | 2008-01-04 | 2008-10-07 | International Business Machines Corporation | Systems, methods and computer products for profile based identity verification over the internet |
US8074281B2 (en) * | 2008-01-14 | 2011-12-06 | Microsoft Corporation | Malware detection with taint tracking |
US8370948B2 (en) * | 2008-03-19 | 2013-02-05 | Websense, Inc. | System and method for analysis of electronic information dissemination events |
US8407784B2 (en) * | 2008-03-19 | 2013-03-26 | Websense, Inc. | Method and system for protection against information stealing software |
US9015842B2 (en) | 2008-03-19 | 2015-04-21 | Websense, Inc. | Method and system for protection against information stealing software |
US9130986B2 (en) * | 2008-03-19 | 2015-09-08 | Websense, Inc. | Method and system for protection against information stealing software |
US20090262656A1 (en) * | 2008-04-22 | 2009-10-22 | International Business Machines Corporation | Method for new resource to communicate and activate monitoring of best practice metrics and thresholds values |
WO2009132148A2 (en) * | 2008-04-22 | 2009-10-29 | The 41St Parameter, Inc. | Systems and methods for security management based on cursor events |
US8627060B2 (en) * | 2008-04-30 | 2014-01-07 | Viasat, Inc. | Trusted network interface |
US8339959B1 (en) | 2008-05-20 | 2012-12-25 | Juniper Networks, Inc. | Streamlined packet forwarding using dynamic filters for routing and security in a shared forwarding plane |
US8924469B2 (en) | 2008-06-05 | 2014-12-30 | Headwater Partners I Llc | Enterprise access control and accounting allocation for access networks |
US8635335B2 (en) | 2009-01-28 | 2014-01-21 | Headwater Partners I Llc | System and method for wireless network offloading |
US8326958B1 (en) * | 2009-01-28 | 2012-12-04 | Headwater Partners I, Llc | Service activation tracking system |
US8548428B2 (en) | 2009-01-28 | 2013-10-01 | Headwater Partners I Llc | Device group partitions and settlement platform |
US8391834B2 (en) * | 2009-01-28 | 2013-03-05 | Headwater Partners I Llc | Security techniques for device assisted services |
US8626115B2 (en) | 2009-01-28 | 2014-01-07 | Headwater Partners I Llc | Wireless network service interfaces |
US8924543B2 (en) | 2009-01-28 | 2014-12-30 | Headwater Partners I Llc | Service design center for device assisted services |
US8898293B2 (en) | 2009-01-28 | 2014-11-25 | Headwater Partners I Llc | Service offer set publishing to device agent with on-device service selection |
US8346225B2 (en) | 2009-01-28 | 2013-01-01 | Headwater Partners I, Llc | Quality of service for device assisted services |
US8589541B2 (en) | 2009-01-28 | 2013-11-19 | Headwater Partners I Llc | Device-assisted services for protecting network capacity |
US8406748B2 (en) | 2009-01-28 | 2013-03-26 | Headwater Partners I Llc | Adaptive ambient services |
US8402111B2 (en) | 2009-01-28 | 2013-03-19 | Headwater Partners I, Llc | Device assisted services install |
US8340634B2 (en) | 2009-01-28 | 2012-12-25 | Headwater Partners I, Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US8275830B2 (en) | 2009-01-28 | 2012-09-25 | Headwater Partners I Llc | Device assisted CDR creation, aggregation, mediation and billing |
US8832777B2 (en) | 2009-03-02 | 2014-09-09 | Headwater Partners I Llc | Adapting network policies based on device service processor configuration |
US8725123B2 (en) | 2008-06-05 | 2014-05-13 | Headwater Partners I Llc | Communications device with secure data path processing agents |
US7818412B2 (en) * | 2008-06-27 | 2010-10-19 | Microsoft Corporation | Selection of sensors for monitoring phenomena considering the value of information and data sharing preferences |
DE102009032466B4 (en) * | 2008-07-16 | 2017-03-02 | Infineon Technologies Ag | Security in networks |
US9379895B2 (en) * | 2008-07-24 | 2016-06-28 | Zscaler, Inc. | HTTP authentication and authorization management |
US9064275B1 (en) * | 2008-07-25 | 2015-06-23 | At&T Intellectual Property I, L.P. | Systems and methods for charging and billing in converged communications networks |
US10027688B2 (en) | 2008-08-11 | 2018-07-17 | Damballa, Inc. | Method and system for detecting malicious and/or botnet-related domain names |
US8154996B2 (en) | 2008-09-11 | 2012-04-10 | Juniper Networks, Inc. | Methods and apparatus for flow control associated with multi-staged queues |
US8955107B2 (en) * | 2008-09-12 | 2015-02-10 | Juniper Networks, Inc. | Hierarchical application of security services within a computer network |
US8040798B2 (en) * | 2008-09-25 | 2011-10-18 | Microsoft Corporation | Discovering communication rules in a network trace |
US8040808B1 (en) | 2008-10-20 | 2011-10-18 | Juniper Networks, Inc. | Service aware path selection with a network acceleration device |
US8312542B2 (en) * | 2008-10-29 | 2012-11-13 | Lockheed Martin Corporation | Network intrusion detection using MDL compress for deep packet inspection |
US7965636B2 (en) * | 2008-12-05 | 2011-06-21 | Hewlett-Packard Development Company, L.P. | Loadbalancing network traffic across multiple remote inspection devices |
KR101010302B1 (en) * | 2008-12-24 | 2011-01-25 | 한국인터넷진흥원 | Security management system and method of irc and http botnet |
US11218854B2 (en) | 2009-01-28 | 2022-01-04 | Headwater Research Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US10779177B2 (en) | 2009-01-28 | 2020-09-15 | Headwater Research Llc | Device group partitions and settlement platform |
US9578182B2 (en) | 2009-01-28 | 2017-02-21 | Headwater Partners I Llc | Mobile device and service management |
US10057775B2 (en) | 2009-01-28 | 2018-08-21 | Headwater Research Llc | Virtualized policy and charging system |
US10798252B2 (en) | 2009-01-28 | 2020-10-06 | Headwater Research Llc | System and method for providing user notifications |
US9253663B2 (en) | 2009-01-28 | 2016-02-02 | Headwater Partners I Llc | Controlling mobile device communications on a roaming network based on device state |
US10264138B2 (en) | 2009-01-28 | 2019-04-16 | Headwater Research Llc | Mobile device and service management |
US10237757B2 (en) | 2009-01-28 | 2019-03-19 | Headwater Research Llc | System and method for wireless network offloading |
US8893009B2 (en) | 2009-01-28 | 2014-11-18 | Headwater Partners I Llc | End user device that secures an association of application to service policy with an application certificate check |
US10200541B2 (en) | 2009-01-28 | 2019-02-05 | Headwater Research Llc | Wireless end-user device with divided user space/kernel space traffic policy system |
US9755842B2 (en) | 2009-01-28 | 2017-09-05 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US10783581B2 (en) | 2009-01-28 | 2020-09-22 | Headwater Research Llc | Wireless end-user device providing ambient or sponsored services |
US8745191B2 (en) | 2009-01-28 | 2014-06-03 | Headwater Partners I Llc | System and method for providing user notifications |
NZ594800A (en) * | 2009-01-28 | 2013-09-27 | Headwater Partners I Llc | Method and apparatus for modifying a service policy setting of an end-user device |
US8351898B2 (en) | 2009-01-28 | 2013-01-08 | Headwater Partners I Llc | Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account |
US9954975B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Enhanced curfew and protection associated with a device group |
US8793758B2 (en) | 2009-01-28 | 2014-07-29 | Headwater Partners I Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US9351193B2 (en) | 2009-01-28 | 2016-05-24 | Headwater Partners I Llc | Intermediate networking devices |
US10064055B2 (en) | 2009-01-28 | 2018-08-28 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US8606911B2 (en) | 2009-03-02 | 2013-12-10 | Headwater Partners I Llc | Flow tagging for service policy implementation |
US10248996B2 (en) | 2009-01-28 | 2019-04-02 | Headwater Research Llc | Method for operating a wireless end-user device mobile payment agent |
US10326800B2 (en) | 2009-01-28 | 2019-06-18 | Headwater Research Llc | Wireless network service interfaces |
US9392462B2 (en) | 2009-01-28 | 2016-07-12 | Headwater Partners I Llc | Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy |
US9557889B2 (en) | 2009-01-28 | 2017-01-31 | Headwater Partners I Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US9980146B2 (en) | 2009-01-28 | 2018-05-22 | Headwater Research Llc | Communications device with secure data path processing agents |
US9858559B2 (en) | 2009-01-28 | 2018-01-02 | Headwater Research Llc | Network service plan design |
US10484858B2 (en) | 2009-01-28 | 2019-11-19 | Headwater Research Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US9706061B2 (en) | 2009-01-28 | 2017-07-11 | Headwater Partners I Llc | Service design center for device assisted services |
US9647918B2 (en) | 2009-01-28 | 2017-05-09 | Headwater Research Llc | Mobile device and method attributing media services network usage to requesting application |
US10492102B2 (en) | 2009-01-28 | 2019-11-26 | Headwater Research Llc | Intermediate networking devices |
US10715342B2 (en) | 2009-01-28 | 2020-07-14 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US10841839B2 (en) | 2009-01-28 | 2020-11-17 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US9572019B2 (en) | 2009-01-28 | 2017-02-14 | Headwater Partners LLC | Service selection set published to device agent with on-device service selection |
US9270559B2 (en) | 2009-01-28 | 2016-02-23 | Headwater Partners I Llc | Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow |
US9955332B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Method for child wireless device activation to subscriber account of a master wireless device |
US9565707B2 (en) | 2009-01-28 | 2017-02-07 | Headwater Partners I Llc | Wireless end-user device with wireless data attribution to multiple personas |
WO2010087845A1 (en) * | 2009-01-30 | 2010-08-05 | Hewlett-Packard Development Company, L.P. | Dynamically applying a control policy to a network |
US8402541B2 (en) | 2009-03-12 | 2013-03-19 | Microsoft Corporation | Proactive exploit detection |
US9112850B1 (en) | 2009-03-25 | 2015-08-18 | The 41St Parameter, Inc. | Systems and methods of sharing information through a tag-based consortium |
US8868439B2 (en) * | 2009-05-15 | 2014-10-21 | Microsoft Corporation | Content activity feedback into a reputation system |
US9130972B2 (en) | 2009-05-26 | 2015-09-08 | Websense, Inc. | Systems and methods for efficient detection of fingerprinted data and information |
US9432271B2 (en) * | 2009-06-15 | 2016-08-30 | Qualcomm Incorporated | Sensor network management |
US8214490B1 (en) * | 2009-09-15 | 2012-07-03 | Symantec Corporation | Compact input compensating reputation data tracking mechanism |
GB2474545B (en) * | 2009-09-24 | 2015-06-24 | Fisher Rosemount Systems Inc | Integrated unified threat management for a process control system |
US8640195B2 (en) * | 2009-09-30 | 2014-01-28 | International Business Machines Corporation | Method and system for automating security policy definition based on recorded transactions |
US20110087786A1 (en) * | 2009-10-07 | 2011-04-14 | Wichorus, Inc. | Method and apparatus for efficient resource allocation of quality of service profiles in mobile networks |
US9385970B2 (en) * | 2009-10-07 | 2016-07-05 | Wichorus, Inc. | Method and apparatus for assigning resources in a network node |
US9106563B2 (en) * | 2009-10-07 | 2015-08-11 | Wichorus, Inc. | Method and apparatus for switching communications traffic in a communications network |
US20110153811A1 (en) * | 2009-12-18 | 2011-06-23 | Hyun Cheol Jeong | System and method for modeling activity patterns of network traffic to detect botnets |
US9264321B2 (en) | 2009-12-23 | 2016-02-16 | Juniper Networks, Inc. | Methods and apparatus for tracking data flow based on flow state values |
US8578497B2 (en) | 2010-01-06 | 2013-11-05 | Damballa, Inc. | Method and system for detecting malware |
US8826438B2 (en) | 2010-01-19 | 2014-09-02 | Damballa, Inc. | Method and system for network-based detecting of malware from behavioral clustering |
US8782790B1 (en) * | 2010-02-19 | 2014-07-15 | Symantec Corporation | Signature creation for malicious network traffic |
US20110209215A1 (en) * | 2010-02-22 | 2011-08-25 | Hazem Kabbara | Intelligent Network Security Resource Deployment System |
US8555343B2 (en) * | 2010-03-23 | 2013-10-08 | Verizon Patent And Licensing Inc. | Managing resource allocations based on traffic patterns |
US9361597B2 (en) | 2010-10-19 | 2016-06-07 | The 41St Parameter, Inc. | Variable risk engine |
US20130298254A1 (en) * | 2010-10-26 | 2013-11-07 | Matthew Richard Thomas Hall | Methods and systems for detecting suspected data leakage using traffic samples |
US9116911B2 (en) * | 2010-11-02 | 2015-08-25 | International Business Machines Corporation | Remote file sharing based on content filtering |
KR20120070299A (en) * | 2010-12-21 | 2012-06-29 | 한국전자통신연구원 | Apparatus and method for generating adaptive security model |
US20120240220A1 (en) * | 2011-03-15 | 2012-09-20 | Raytheon Company | Method and system for controlling data access on user interfaces |
JP5776927B2 (en) * | 2011-03-28 | 2015-09-09 | ソニー株式会社 | Information processing apparatus and method, and program |
US9154826B2 (en) | 2011-04-06 | 2015-10-06 | Headwater Partners Ii Llc | Distributing content and service launch objects to mobile devices |
US8503636B1 (en) * | 2011-04-29 | 2013-08-06 | Symantec Corporation | Systems and methods for blocking an outgoing request associated with an outgoing telephone number |
US8412745B1 (en) * | 2011-09-14 | 2013-04-02 | Raytheon Company | Relational database model optimized for the use and maintenance of watchlist data in a high demand environment |
US8811183B1 (en) | 2011-10-04 | 2014-08-19 | Juniper Networks, Inc. | Methods and apparatus for multi-path flow control within a multi-stage switch fabric |
US10754913B2 (en) | 2011-11-15 | 2020-08-25 | Tapad, Inc. | System and method for analyzing user device information |
US9251535B1 (en) | 2012-01-05 | 2016-02-02 | Juniper Networks, Inc. | Offload of data transfer statistics from a mobile access gateway |
US9922190B2 (en) | 2012-01-25 | 2018-03-20 | Damballa, Inc. | Method and system for detecting DGA-based malware |
US9633201B1 (en) | 2012-03-01 | 2017-04-25 | The 41St Parameter, Inc. | Methods and systems for fraud containment |
US8856929B1 (en) * | 2012-03-13 | 2014-10-07 | Sprint Communications Company L.P. | Wireless communication device with circuitry to invoke a physically independent non-IP communication capability |
US9521551B2 (en) | 2012-03-22 | 2016-12-13 | The 41St Parameter, Inc. | Methods and systems for persistent cross-application mobile device identification |
IL219499B (en) * | 2012-04-30 | 2019-02-28 | Verint Systems Ltd | System and method for malware detection |
US8874103B2 (en) | 2012-05-11 | 2014-10-28 | Intel Corporation | Determining proximity of user equipment for device-to-device communication |
ES2684553T3 (en) * | 2012-05-11 | 2018-10-03 | Intel Corporation | Determine the proximity of user equipment in device-to-device communications |
US8738628B2 (en) * | 2012-05-31 | 2014-05-27 | International Business Machines Corporation | Community profiling for social media |
TW201404074A (en) * | 2012-07-02 | 2014-01-16 | Chunghwa Telecom Co Ltd | Fault diagnosis method by wideband network traffic analysis using relational rules |
CN102857388A (en) * | 2012-07-12 | 2013-01-02 | 上海云辰信息科技有限公司 | Cloud detection safety management auditing system |
EP2880619A1 (en) | 2012-08-02 | 2015-06-10 | The 41st Parameter, Inc. | Systems and methods for accessing records via derivative locators |
US10547674B2 (en) | 2012-08-27 | 2020-01-28 | Help/Systems, Llc | Methods and systems for network flow analysis |
US10084806B2 (en) | 2012-08-31 | 2018-09-25 | Damballa, Inc. | Traffic simulation to identify malicious activity |
US9894088B2 (en) | 2012-08-31 | 2018-02-13 | Damballa, Inc. | Data mining to identify malicious activity |
US9154507B2 (en) * | 2012-10-15 | 2015-10-06 | International Business Machines Corporation | Automated role and entitlements mining using network observations |
US9210128B2 (en) * | 2012-10-25 | 2015-12-08 | Check Point Software Technologies Ltd. | Filtering of applications for access to an enterprise network |
WO2014078569A1 (en) | 2012-11-14 | 2014-05-22 | The 41St Parameter, Inc. | Systems and methods of global identification |
US9241259B2 (en) | 2012-11-30 | 2016-01-19 | Websense, Inc. | Method and apparatus for managing the transfer of sensitive information to mobile devices |
KR101371902B1 (en) * | 2012-12-12 | 2014-03-10 | 현대자동차주식회사 | Apparatus for detecting vehicle network attcak and method thereof |
EP2945720B1 (en) * | 2013-01-18 | 2017-11-08 | Kuss Filtration Inc. | Channel depth filtration media |
WO2014159862A1 (en) | 2013-03-14 | 2014-10-02 | Headwater Partners I Llc | Automated credential porting for mobile devices |
US9767299B2 (en) | 2013-03-15 | 2017-09-19 | Mymail Technology, Llc | Secure cloud data sharing |
US9338134B2 (en) * | 2013-03-27 | 2016-05-10 | Fortinet, Inc. | Firewall policy management |
US9426124B2 (en) | 2013-04-08 | 2016-08-23 | Solarflare Communications, Inc. | Locked down network interface |
US10742604B2 (en) * | 2013-04-08 | 2020-08-11 | Xilinx, Inc. | Locked down network interface |
US9158915B1 (en) * | 2013-05-24 | 2015-10-13 | Symantec Corporation | Systems and methods for analyzing zero-day attacks |
IL226747B (en) | 2013-06-04 | 2019-01-31 | Verint Systems Ltd | System and method for malware detection learning |
US9571511B2 (en) * | 2013-06-14 | 2017-02-14 | Damballa, Inc. | Systems and methods for traffic classification |
US9730153B2 (en) | 2013-07-17 | 2017-08-08 | Huawei Technologies Co., Ltd. | System and methods for multi-objective cell switch-off in wireless networks |
US10902327B1 (en) | 2013-08-30 | 2021-01-26 | The 41St Parameter, Inc. | System and method for device identification and uniqueness |
KR101455167B1 (en) * | 2013-09-03 | 2014-10-27 | 한국전자통신연구원 | Network switch based on whitelist |
US9645860B2 (en) * | 2013-09-06 | 2017-05-09 | Microsoft Technology Licensing, Llc | Verification that particular information is transferred by an application |
KR101463695B1 (en) * | 2013-09-09 | 2014-11-19 | 주식회사 엘지유플러스 | Traffic management system and control method thereof |
US9961096B1 (en) | 2013-09-17 | 2018-05-01 | Cisco Technology, Inc. | Distributed behavior based anomaly detection |
US9503465B2 (en) | 2013-11-14 | 2016-11-22 | At&T Intellectual Property I, L.P. | Methods and apparatus to identify malicious activity in a network |
US10764323B1 (en) * | 2015-12-21 | 2020-09-01 | Amdocs Development Limited | System, method, and computer program for isolating services of a communication network in response to a distributed denial of service (DDoS) attack |
US9485271B1 (en) * | 2014-03-11 | 2016-11-01 | Symantec Corporation | Systems and methods for anomaly-based detection of compromised IT administration accounts |
US9832217B2 (en) * | 2014-03-13 | 2017-11-28 | International Business Machines Corporation | Computer implemented techniques for detecting, investigating and remediating security violations to IT infrastructure |
US10498700B2 (en) * | 2014-03-25 | 2019-12-03 | Hewlett Packard Enterprise Development Lp | Transmitting network traffic in accordance with network traffic rules |
US9306964B2 (en) * | 2014-04-04 | 2016-04-05 | Netscout Systems, Inc. | Using trust profiles for network breach detection |
US9628502B2 (en) * | 2014-06-09 | 2017-04-18 | Meadow Hills, LLC | Active attack detection system |
US9692728B2 (en) * | 2014-06-18 | 2017-06-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Packet filtering at an application-processor-to-modem interface |
US9584341B2 (en) | 2014-06-18 | 2017-02-28 | Telefonaktiebolaget Lm Ericsson (Publ) | Modem interface using virtual local-area network tagging |
US11838851B1 (en) * | 2014-07-15 | 2023-12-05 | F5, Inc. | Methods for managing L7 traffic classification and devices thereof |
WO2016036321A1 (en) * | 2014-09-05 | 2016-03-10 | Agency For Science, Technology And Research | Methods for generating a vulnerability pattern, methods for determining a security threat, vulnerability pattern generators, and vulnerability pattern scanners |
WO2016040297A1 (en) * | 2014-09-08 | 2016-03-17 | Seven Networks, Llc | Device activity and data traffic signature-based detection of mobile device health |
US9893944B2 (en) | 2014-10-01 | 2018-02-13 | International Business Machines Corporation | Managing network bandwidth based on cognitive analysis of site content against organizational needs |
US10091312B1 (en) | 2014-10-14 | 2018-10-02 | The 41St Parameter, Inc. | Data structures for intelligently resolving deterministic and probabilistic device identifiers to device profiles and/or groups |
CN105681261A (en) * | 2014-11-19 | 2016-06-15 | 小米科技有限责任公司 | Security authentication method and apparatus |
US10182013B1 (en) | 2014-12-01 | 2019-01-15 | F5 Networks, Inc. | Methods for managing progressive image delivery and devices thereof |
US9860264B2 (en) * | 2014-12-23 | 2018-01-02 | International Business Machines Corporation | Multi-dimensional geometry for enhancement of simulations of network devices |
US10560842B2 (en) | 2015-01-28 | 2020-02-11 | Verint Systems Ltd. | System and method for combined network-side and off-air monitoring of wireless networks |
US11895138B1 (en) | 2015-02-02 | 2024-02-06 | F5, Inc. | Methods for improving web scanner accuracy and devices thereof |
WO2016138400A1 (en) * | 2015-02-27 | 2016-09-01 | Cisco Technology, Inc. | System and methods for computer network security involving user confirmation of network connections |
US9807117B2 (en) | 2015-03-17 | 2017-10-31 | Solarflare Communications, Inc. | System and apparatus for providing network security |
US10165004B1 (en) | 2015-03-18 | 2018-12-25 | Cequence Security, Inc. | Passive detection of forged web browsers |
US9602527B2 (en) * | 2015-03-19 | 2017-03-21 | Fortinet, Inc. | Security threat detection |
US9930065B2 (en) | 2015-03-25 | 2018-03-27 | University Of Georgia Research Foundation, Inc. | Measuring, categorizing, and/or mitigating malware distribution paths |
IL238001B (en) * | 2015-03-29 | 2020-05-31 | Verint Systems Ltd | System and method for identifying communication session participants based on traffic patterns |
US9934475B2 (en) * | 2015-05-13 | 2018-04-03 | Bank Of America Corporation | Managing enterprise data movement using a heuristic data movement detection engine |
US10154049B2 (en) * | 2015-05-13 | 2018-12-11 | Preempt Security, Inc. | System and method for providing an in-line sniffer mode network based identity centric firewall |
US10536357B2 (en) | 2015-06-05 | 2020-01-14 | Cisco Technology, Inc. | Late data detection in data center |
US10142353B2 (en) | 2015-06-05 | 2018-11-27 | Cisco Technology, Inc. | System for monitoring and managing datacenters |
US11418520B2 (en) | 2015-06-15 | 2022-08-16 | Cequence Security, Inc. | Passive security analysis with inline active security device |
TWI562013B (en) * | 2015-07-06 | 2016-12-11 | Wistron Corp | Method, system and apparatus for predicting abnormality |
JP5967739B1 (en) | 2015-07-23 | 2016-08-10 | Necプラットフォームズ株式会社 | Filtering system, management apparatus, filtering method, and management program |
JP6520612B2 (en) | 2015-09-28 | 2019-05-29 | 富士通株式会社 | Firewall controller, firewall device, and firewall control method |
US9686415B2 (en) | 2015-11-06 | 2017-06-20 | At&T Intellectual Property I, L.P. | Systems and methods of split billing |
JP6693114B2 (en) * | 2015-12-15 | 2020-05-13 | 横河電機株式会社 | Controller and integrated production system |
JP6759572B2 (en) | 2015-12-15 | 2020-09-23 | 横河電機株式会社 | Integrated production system |
US10931713B1 (en) | 2016-02-17 | 2021-02-23 | Cequence Security, Inc. | Passive detection of genuine web browsers based on security parameters |
US10536478B2 (en) * | 2016-02-26 | 2020-01-14 | Oracle International Corporation | Techniques for discovering and managing security of applications |
US10063444B2 (en) | 2016-02-29 | 2018-08-28 | Red Hat, Inc. | Network traffic capture analysis |
US10594733B2 (en) * | 2016-04-06 | 2020-03-17 | Rapid7, Inc | System and method for application software security and auditing |
IL245299B (en) | 2016-04-25 | 2021-05-31 | Verint Systems Ltd | System and method for decrypting communication exchanged on a wireless local area network |
US20170324774A1 (en) * | 2016-05-05 | 2017-11-09 | Javelin Networks, Inc. | Adding supplemental data to a security-related query |
US10515187B2 (en) | 2016-06-29 | 2019-12-24 | Symantec Corporation | Artificial intelligence (AI) techniques for learning and modeling internal networks |
US10637864B2 (en) | 2016-05-05 | 2020-04-28 | Ca, Inc. | Creation of fictitious identities to obfuscate hacking of internal networks |
US10686792B1 (en) * | 2016-05-13 | 2020-06-16 | Nuvolex, Inc. | Apparatus and method for administering user identities across on premise and third-party computation resources |
US11416912B2 (en) * | 2016-05-13 | 2022-08-16 | Digital River, Inc. | High volume transaction queueing with machine learning |
CN106027528B (en) * | 2016-05-24 | 2019-07-12 | 微梦创科网络科技(中国)有限公司 | A kind of method and device of the horizontal permission automatic identification of WEB |
US10812348B2 (en) | 2016-07-15 | 2020-10-20 | A10 Networks, Inc. | Automatic capture of network data for a detected anomaly |
US10536468B2 (en) * | 2016-07-21 | 2020-01-14 | Level 3 Communications, Llc | System and method for voice security in a telecommunications network |
US10367703B2 (en) * | 2016-12-01 | 2019-07-30 | Gigamon Inc. | Analysis of network traffic rules at a network visibility node |
US10419479B2 (en) * | 2017-01-12 | 2019-09-17 | Acalvio Technologies, Inc. | Testing environment cyber vaccine |
US20180205611A1 (en) * | 2017-01-13 | 2018-07-19 | Gigamon Inc. | Network enumeration at a network visibility node |
US10931686B1 (en) | 2017-02-01 | 2021-02-23 | Cequence Security, Inc. | Detection of automated requests using session identifiers |
US11140173B2 (en) | 2017-03-31 | 2021-10-05 | Baimmt, Llc | System and method for secure access control |
US10785249B2 (en) * | 2017-04-06 | 2020-09-22 | Fortinet, Inc. | Predicting the risk associated with a network flow, such as one involving an IoT device, and applying an appropriate level of security inspection based thereon |
IL252037B (en) | 2017-04-30 | 2021-12-01 | Verint Systems Ltd | System and method for identifying relationships between users of computer applications |
IL252041B (en) | 2017-04-30 | 2020-09-30 | Verint Systems Ltd | System and method for tracking users of computer applications |
US10977361B2 (en) | 2017-05-16 | 2021-04-13 | Beyondtrust Software, Inc. | Systems and methods for controlling privileged operations |
US10498758B1 (en) | 2017-06-28 | 2019-12-03 | Armis Security Ltd. | Network sensor and method thereof for wireless network vulnerability detection |
US10505967B1 (en) * | 2017-06-28 | 2019-12-10 | Armis Security Ltd. | Sensor-based wireless network vulnerability detection |
US11095678B2 (en) * | 2017-07-12 | 2021-08-17 | The Boeing Company | Mobile security countermeasures |
US10979390B2 (en) * | 2017-08-25 | 2021-04-13 | Panasonic Intellectual Property Corporation Of America | Communication security apparatus, control method, and storage medium storing a program |
IL254438B (en) | 2017-09-07 | 2021-12-01 | Verint Systems Ltd | System and method for decrypting communication over a umts network |
US11165720B2 (en) | 2017-12-19 | 2021-11-02 | Xilinx, Inc. | Network interface device |
US10686872B2 (en) | 2017-12-19 | 2020-06-16 | Xilinx, Inc. | Network interface device |
US10686731B2 (en) | 2017-12-19 | 2020-06-16 | Xilinx, Inc. | Network interface device |
IL256690B (en) | 2018-01-01 | 2022-02-01 | Cognyte Tech Israel Ltd | System and method for identifying pairs of related application users |
CN110391988B (en) * | 2018-04-16 | 2023-05-02 | 阿里巴巴集团控股有限公司 | Network flow control method, system and safety protection device |
US11356517B2 (en) * | 2018-04-30 | 2022-06-07 | Google Llc | Optimizing network utilization |
US11627201B2 (en) | 2018-04-30 | 2023-04-11 | Google Llc | Optimizing network utilization |
US10838763B2 (en) | 2018-07-17 | 2020-11-17 | Xilinx, Inc. | Network interface device and host processing device |
US10659555B2 (en) | 2018-07-17 | 2020-05-19 | Xilinx, Inc. | Network interface device and host processing device |
US11113118B2 (en) * | 2018-07-20 | 2021-09-07 | Hewlett Packard Enterprise Development Lp | System and method for managing network access control privileges based on communication context awareness |
US11695783B2 (en) * | 2018-08-13 | 2023-07-04 | Ares Technologies, Inc. | Systems, devices, and methods for determining a confidence level associated with a device using heuristics of trust |
US11824882B2 (en) * | 2018-08-13 | 2023-11-21 | Ares Technologies, Inc. | Systems, devices, and methods for determining a confidence level associated with a device using heuristics of trust |
CN109246736B (en) * | 2018-08-31 | 2021-11-26 | 中建科技集团有限公司 | Sensor network monitoring system, monitor and fault analysis terminal |
US11190542B2 (en) | 2018-10-22 | 2021-11-30 | A10 Networks, Inc. | Network session traffic behavior learning system |
US11164206B2 (en) * | 2018-11-16 | 2021-11-02 | Comenity Llc | Automatically aggregating, evaluating, and providing a contextually relevant offer |
JP6603782B2 (en) * | 2018-11-22 | 2019-11-06 | 株式会社エヌ・ティ・ティ・データ | Network information output system and network information output method |
US11012472B2 (en) * | 2018-12-05 | 2021-05-18 | International Business Machines Corporation | Security rule generation based on cognitive and industry analysis |
CN109981573B (en) * | 2019-02-20 | 2021-09-10 | 新华三信息安全技术有限公司 | Security event response method and device |
GB2584018B (en) | 2019-04-26 | 2022-04-13 | Beyondtrust Software Inc | Root-level application selective configuration |
US11418493B2 (en) | 2019-08-07 | 2022-08-16 | Bank Of America Corporation | Identifying and securing unencrypted data in a production environment |
WO2021041965A1 (en) * | 2019-08-28 | 2021-03-04 | Pulse Secure, Llc | Autonomous policy enforcement point configuration for role based access control |
WO2021084439A1 (en) | 2019-11-03 | 2021-05-06 | Verint Systems Ltd. | System and method for identifying exchanges of encrypted communication traffic |
CN110855657B (en) * | 2019-11-07 | 2021-05-18 | 深圳市高德信通信股份有限公司 | Network security control system for computer network |
US11483339B1 (en) | 2019-11-27 | 2022-10-25 | Pulse Secure, Llc | Detecting attacks and quarantining malware infected devices |
US11831664B2 (en) | 2020-06-03 | 2023-11-28 | Netskope, Inc. | Systems and methods for anomaly detection |
CN112231336B (en) * | 2020-07-17 | 2023-07-25 | 北京百度网讯科技有限公司 | Method and device for identifying user, storage medium and electronic equipment |
US11909826B1 (en) * | 2022-11-03 | 2024-02-20 | Fortinet, Inc. | Systems and methods for four dimensional network session authorization |
CN116232770B (en) * | 2023-05-08 | 2023-07-21 | 中国石油大学(华东) | Enterprise network safety protection system and method based on SDN controller |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030145232A1 (en) * | 2002-01-31 | 2003-07-31 | Poletto Massimiliano Antonio | Denial of service attacks characterization |
US20040015719A1 (en) * | 2002-07-16 | 2004-01-22 | Dae-Hyung Lee | Intelligent security engine and intelligent and integrated security system using the same |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2706652B1 (en) * | 1993-06-09 | 1995-08-18 | Alsthom Cge Alcatel | Device for detecting intrusions and suspicious users for a computer system and security system comprising such a device. |
US6072778A (en) * | 1996-08-14 | 2000-06-06 | Motorola, Inc. | Method of controlling a communication system |
US6453345B2 (en) * | 1996-11-06 | 2002-09-17 | Datadirect Networks, Inc. | Network security and surveillance system |
US6424624B1 (en) * | 1997-10-16 | 2002-07-23 | Cisco Technology, Inc. | Method and system for implementing congestion detection and flow control in high speed digital network |
US6078953A (en) * | 1997-12-29 | 2000-06-20 | Ukiah Software, Inc. | System and method for monitoring quality of service over network |
US6320845B1 (en) * | 1998-04-27 | 2001-11-20 | Cisco Technology, Inc. | Traffic management and flow prioritization on a routed computer network |
US6154778A (en) * | 1998-05-19 | 2000-11-28 | Hewlett-Packard Company | Utility-based multi-category quality-of-service negotiation in distributed systems |
US6015776A (en) * | 1998-09-08 | 2000-01-18 | Chevron Chemical Company | Polyalkylene polysuccinimides and post-treated derivatives thereof |
US6286052B1 (en) * | 1998-12-04 | 2001-09-04 | Cisco Technology, Inc. | Method and apparatus for identifying network data traffic flows and for applying quality of service treatments to the flows |
US6321338B1 (en) * | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
US6643260B1 (en) * | 1998-12-18 | 2003-11-04 | Cisco Technology, Inc. | Method and apparatus for implementing a quality of service policy in a data communications network |
US6493317B1 (en) * | 1998-12-18 | 2002-12-10 | Cisco Technology, Inc. | Traffic engineering technique for routing inter-class traffic in a computer network |
US6301668B1 (en) * | 1998-12-29 | 2001-10-09 | Cisco Technology, Inc. | Method and system for adaptive network security using network vulnerability assessment |
US7120934B2 (en) * | 2000-03-30 | 2006-10-10 | Ishikawa Mark M | System, method and apparatus for detecting, identifying and responding to fraudulent requests on a network |
US20030061506A1 (en) * | 2001-04-05 | 2003-03-27 | Geoffrey Cooper | System and method for security policy |
US20020107953A1 (en) * | 2001-01-16 | 2002-08-08 | Mark Ontiveros | Method and device for monitoring data traffic and preventing unauthorized access to a network |
US20020133586A1 (en) * | 2001-01-16 | 2002-09-19 | Carter Shanklin | Method and device for monitoring data traffic and preventing unauthorized access to a network |
US7234168B2 (en) * | 2001-06-13 | 2007-06-19 | Mcafee, Inc. | Hierarchy-based method and apparatus for detecting attacks on a computer system |
US8370936B2 (en) * | 2002-02-08 | 2013-02-05 | Juniper Networks, Inc. | Multi-method gateway-based network security systems and methods |
US20030188189A1 (en) * | 2002-03-27 | 2003-10-02 | Desai Anish P. | Multi-level and multi-platform intrusion detection and response system |
US7373663B2 (en) * | 2002-05-31 | 2008-05-13 | Alcatel Canada Inc. | Secret hashing for TCP SYN/FIN correspondence |
US20030236995A1 (en) * | 2002-06-21 | 2003-12-25 | Fretwell Lyman Jefferson | Method and apparatus for facilitating detection of network intrusion |
US20040030931A1 (en) * | 2002-08-12 | 2004-02-12 | Chamandy Alexander G. | System and method for providing enhanced network security |
WO2004028121A2 (en) * | 2002-09-23 | 2004-04-01 | Wimetrics Corporation | System and method for wireless local area network monitoring and intrusion detection |
US20040123141A1 (en) * | 2002-12-18 | 2004-06-24 | Satyendra Yadav | Multi-tier intrusion detection system |
US7483972B2 (en) * | 2003-01-08 | 2009-01-27 | Cisco Technology, Inc. | Network security monitoring system |
US20040143749A1 (en) * | 2003-01-16 | 2004-07-22 | Platformlogic, Inc. | Behavior-based host-based intrusion prevention system |
US20040148520A1 (en) * | 2003-01-29 | 2004-07-29 | Rajesh Talpade | Mitigating denial of service attacks |
US20040193943A1 (en) * | 2003-02-13 | 2004-09-30 | Robert Angelino | Multiparameter network fault detection system using probabilistic and aggregation analysis |
US7681235B2 (en) * | 2003-05-19 | 2010-03-16 | Radware Ltd. | Dynamic network protection |
-
2005
- 2005-07-29 US US11/192,412 patent/US20060026680A1/en not_active Abandoned
- 2005-07-29 WO PCT/US2005/026815 patent/WO2006031302A2/en active Application Filing
- 2005-07-29 US US11/192,413 patent/US20060026681A1/en not_active Abandoned
- 2005-07-29 TW TW094125788A patent/TW200618565A/en unknown
- 2005-07-29 US US11/192,418 patent/US20060026682A1/en not_active Abandoned
- 2005-07-29 US US11/192,395 patent/US20060026669A1/en not_active Abandoned
- 2005-07-29 EP EP05814849A patent/EP1779345A2/en not_active Withdrawn
- 2005-07-29 US US11/192,409 patent/US20060026678A1/en not_active Abandoned
- 2005-07-29 US US11/192,410 patent/US20060026679A1/en not_active Abandoned
- 2005-07-29 JP JP2007523816A patent/JP2008508805A/en active Pending
-
2007
- 2007-01-25 IL IL180982A patent/IL180982A0/en unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030145232A1 (en) * | 2002-01-31 | 2003-07-31 | Poletto Massimiliano Antonio | Denial of service attacks characterization |
US20040015719A1 (en) * | 2002-07-16 | 2004-01-22 | Dae-Hyung Lee | Intelligent security engine and intelligent and integrated security system using the same |
Also Published As
Publication number | Publication date |
---|---|
EP1779345A2 (en) | 2007-05-02 |
JP2008508805A (en) | 2008-03-21 |
TW200618565A (en) | 2006-06-01 |
WO2006031302A2 (en) | 2006-03-23 |
IL180982A0 (en) | 2007-07-04 |
US20060026680A1 (en) | 2006-02-02 |
US20060026681A1 (en) | 2006-02-02 |
US20060026682A1 (en) | 2006-02-02 |
US20060026669A1 (en) | 2006-02-02 |
US20060026678A1 (en) | 2006-02-02 |
US20060026679A1 (en) | 2006-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2006031302A3 (en) | System and method of characterizing and managing electronic traffic | |
CN104113519B (en) | Network attack detecting method and its device | |
WO2006014504A3 (en) | Self configuring network management system | |
GB0022485D0 (en) | Monitoring network activity | |
US20120173712A1 (en) | Method and device for identifying p2p application connections | |
WO2006127012A3 (en) | Packet sampling flow-based detection of network intrusions | |
WO2005022440A8 (en) | Network isolation techniques suitable for virus protection | |
EP1976227A3 (en) | Method and system for monitoring a selected region of an airspace associated with local area networks of computing devices | |
WO2004088952A3 (en) | Intelligent integrated network security device | |
WO2004111785A3 (en) | Event monitoring and management | |
WO2008057521A3 (en) | Personal possession management system using short range ip based personal area network, and method for managing personal possession | |
WO2003073724A3 (en) | System and method for detecting and eliminating ip spoofing in a data transmission network | |
DE60124295D1 (en) | RIVER-BASED DETECTION OF AN INSERT INTO A NETWORK | |
WO2008096078A3 (en) | Portable electronic device and method for securing such device | |
WO2010057748A3 (en) | Network intrusion protection | |
WO2007133308A3 (en) | Centralized processing and management system | |
WO2008024501A3 (en) | System and method for mobile device application management | |
AU2003294251A1 (en) | Server resource management, analysis, and intrusion negation | |
WO2006019701A3 (en) | Inline intrusion detection using a single physical port | |
WO2007144802A3 (en) | Authentication in a multiple-access environment | |
CN101741628A (en) | Application layer service analysis-based network flow analysis method | |
CN109040140A (en) | A kind of attack detection method and device at a slow speed | |
CN110166480A (en) | A kind of analysis method and device of data packet | |
CN108234516B (en) | Method and device for detecting network flooding attack | |
Zhang et al. | Optimization of traditional Snort intrusion detection system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 180982 Country of ref document: IL |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200580025488.2 Country of ref document: CN Ref document number: 2007523816 Country of ref document: JP |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 478/KOLNP/2007 Country of ref document: IN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005814849 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2005814849 Country of ref document: EP |