$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

System, method and computer program product for automatic response to computer system misuse using active response modules 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-011/34
출원번호 US-0081825 (1998-05-20)
발명자 / 주소
  • Bernhard Thomas
  • Escamilla Terry
  • Leddy William
  • Letsinger Richard
  • Marks Crosby
  • Smaha Steven E.
  • Snapp Steven R.
출원인 / 주소
  • Network Associates, Inc.
대리인 / 주소
    Pennie & Edmonds LLP
인용정보 피인용 횟수 : 237  인용 특허 : 5

초록

A system, method and computer program product for automatic response to computer system misuse using active response modules (ARMs). ARMs are tools that allow static intrusion detection system applications the ability to dynamically increase security levels by allowing real-time responses to detecte

대표청구항

[ What is claimed is:] [1.]1. A method for automatically responding to an instance of computer misuse, comprising the steps of:(1) selecting an active response module (ARM) from a plurality of available ARMs;(2) linking said ARM to a computer misuse;(3) invoking said ARM in response to an instance o

이 특허에 인용된 특허 (5)

  1. Smaha Stephen E. (Austin TX) Snapp Steven R. (Austin TX), Method and system for detecting intrusion into and misuse of a data processing system.
  2. Hershey Paul C. (Manassas VA) Johnson Donald B. (Manassas VA) Le An V. (Manassas VA) Matyas Stephen M. (Manassas VA) Waclawsky John G. (Frederick MD) Wilkins John D. (Somerville VA), Network security system and method using a parallel finite state machine adaptive active monitor and responder.
  3. Ginter Karl L. ; Shear Victor H. ; Spahn Francis J. ; Van Wie David M., System and methods for secure transaction management and electronic rights protection.
  4. Ginter Karl L. ; Shear Victor H. ; Sibert W. Olin ; Spahn Francis J. ; Van Wie David M., Systems and methods for secure transaction management and electronic rights protection.
  5. Ji Shuang (Foster City CA) Chen Eva (Cupertino CA), Virus detection and removal apparatus for computer networks.

이 특허를 인용한 특허 (237)

  1. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Access and control system for network-enabled devices.
  2. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Access and control system for network-enabled devices.
  3. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Access and control system for network-enabled devices.
  4. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Access and control system for network-enabled devices.
  5. Hesselink,Lambertus; Rizal,Dharmarus; Bjornson,Eric S., Access and control system for network-enabled devices.
  6. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  7. Alperovitch, Dmitri; Greve, Paula; Krasser, Sven; Foote-Lennox, Tomo, Adjusting filter or classification control settings.
  8. Njemanze, Hugh S.; Aguilar-Macias, Hector, Adjusting sensor time in a network security system.
  9. Thomas, Anil Francis; Kramer, Michael; Costea, Mihai; Hudis, Efim; Bahl, Pradeep; Dadhia, Rajesh K.; Edery, Yigal, Aggregating the knowledge base of computer systems to proactively protect a computer from malware.
  10. Thomas, Anil Francis; Kramer, Michael; Costea, Mihai; Hudis, Efim; Bahl, Pradeep; Dadhia, Rajesh K; Edery, Yigal, Aggregating the knowledge base of computer systems to proactively protect a computer from malware.
  11. Sharp,Gordon P.; Schwartz,Jeffrey P.; Buzzeo,David J.; Desrochers,Eric M.; Farrington,David L., Air quality monitoring systems and methods.
  12. van der Made, Peter A. J., Analytical virtual machine.
  13. van der Made,Peter A. J., Analytical virtual machine.
  14. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  15. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  16. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  17. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  18. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  19. Oliphant, Brett M.; Blignaut, John P., Anti-vulnerability system, method, and computer program product.
  20. Porras,Phillip Andrew; Almgren,Magnus; Lindqvist,Ulf E.; Dawson,Steven Mark, Application-layer anomaly and misuse detection.
  21. Piesco,Albert L.; Walsh,Julia H., Attack impact prediction system.
  22. Enstone, Mark Richard; Cureington, James Anthony, Automated immune response for a computer.
  23. Dalcher, Gregory William; Nadkarni, Hemang Satish, Automated local exception rule generation system, method and computer program product.
  24. Dalcher, Gregory William; Nadkarni, Hemang Satish, Automated local exception rule generation system, method and computer program product.
  25. Koestler, Luke, Automatic regeneration of computer files.
  26. Edelhaus, Shimon, Communication device for obtaining an application image or configuration from a service provider.
  27. van der Made,Peter A. J., Computer immune system and method for detecting unwanted code in a P-code or partially compiled native-code program executing within a virtual machine.
  28. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  29. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  30. Oliphant, Brett M.; Blignaut, John P., Computer program product and apparatus for multi-path remediation.
  31. Njemanze, Hugh S.; Kothari, Pravin S.; Dash, Debabrata; Wang, Shijie, Correlation engine with support for time-based rules.
  32. Wetherall, David J.; Savage, Stefan R.; Anderson, Thomas E., Detecting and preventing undesirable network traffic from being sourced out of a network domain.
  33. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  34. Alperovitch, Dmitri; Black, Nick; Gould, Jeremy; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Detecting image spam.
  35. Fujita, Takashi; Kikuchi, Kenichi; Hayashi, Hideto, Digital camera.
  36. Jiao,Fan, Directory-enabled network elements.
  37. Njemanze, Hugh S.; Bhatt, Rajesh P., Displaying information regarding time-based events.
  38. Pierce, John Clifton, Distributed behavior based anomaly detection.
  39. Kramer, Michael; Shelest, Art; Carter-Schwendler, Carl M; Henderson, Gary S; Field, Scott A; Reasor, Sterling M, Dynamic protection of unpatched machines.
  40. Unchida, Jiyunji; Hara, Yoshinobu, Electronic file management system.
  41. Shay, A. David; Berger, Joubert; Leima, Patricia Joy; Alexander, Jonathan; Xuan, Chaoting, Establishing secure TCP/IP communications using embedded IDs.
  42. Dash, Debabrata; Aguilar-Macias, Hector, Event aggregation in a network.
  43. Maria, Arturo, Floating intrusion detection platforms.
  44. Copeland, III,John A., Flow-based detection of network intrusions.
  45. Copeland, III,John A., Flow-based detection of network intrusions.
  46. Tang, Yuchun; He, Yuanchen, Granular support vector machine with random granularity.
  47. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  48. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas; Sanchez, Luis; Partridge, Craig, Hash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses.
  49. Milliken, Walter Clark; Strayer, William Timothy; Milligan, Stephen Douglas, Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail.
  50. Tidwell, Kenny; Beedgen, Christian; Njemanze, Hugh S.; Kothari, Pravin S., Hierarchical architecture in a network security system.
  51. Tidwell, Kenny; Beedgen, Christian; Njemanze, Hugh S.; Kothari, Pravin S., Hierarchical architecture in a network security system.
  52. Cahill,Conor P.; Wexelblat,David Eli; Aoki,Norihiro Edwin; Carriere,Jeromy; Roskind,James; Toomey,Christopher Newell, Identity based service system.
  53. Yoshimi, Hideo, Information processing apparatus and method, and program.
  54. Zuk, Nir, Intelligent integrated network security device.
  55. Zuk, Nir, Intelligent integrated network security device.
  56. Zuk, Nir, Intelligent integrated network security device.
  57. Zuk, Nir, Intelligent integrated network security device.
  58. Zuk, Nir; Mao, Yu Ming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  59. Zuk, Nir; Mao, Yu Ming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  60. Zuk, Nir; Mao, Yu Ming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  61. Zuk, Nir; Mao, Yuming; Guruswamy, Kowsik, Intelligent integrated network security device for high-availability applications.
  62. Teal, Daniel M., Intrusion detection system and method having dynamically loaded signatures.
  63. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  64. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  65. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  66. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  67. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  68. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  69. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  70. Hesselink, Lambertus; Rizal, Dharmarus; Bjornson, Eric S., Managed peer-to-peer applications, systems and methods for distributed data access and storage.
  71. Aguilar-Macias, Hector; Subrahmanyam, Rajiv, Message parsing in a network security system.
  72. Judge, Paul; Rajan, Guru; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Message profiling systems and methods.
  73. Nord, Joseph H.; Hoy, David Randal, Method and a system for responding locally to requests for file metadata associated with files stored remotely.
  74. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and apparatus for assigning access control levels in providing access to networked content files.
  75. Simmons, Timothy, Method and apparatus for associating tickets in a ticket hierarchy.
  76. Hammond, Nicolas J., Method and apparatus for auditing network security.
  77. Ko,Cheuk W., Method and apparatus for content-based instrusion detection using an agile kernel-based auditor.
  78. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  79. Laborczfalvi, Lee; Roychoudhry, Anil; Borzycki, Andrew; Muir, Jeffrey; Chin, Huai; Mazzaferri, Richard; Bissett, Nicholas Alexander, Method and apparatus for moving processes between isolation environments.
  80. Ide, Curtis E.; Brass, Philip C.; Doty, Theodore R., Method and apparatus for network assessment and authentication.
  81. Ide,Curtis E.; Brass,Philip C.; Doty,Theodore R., Method and apparatus for network assessment and authentication.
  82. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James, Method and apparatus for providing an aggregate view of enumerated system resources from various isolation layers.
  83. Braddy, Ricky Gene; Simmons, Timothy Ernest; Stone, David Sean, Method and apparatus for providing authorized remote access to application sessions.
  84. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Chin, Huai Chiun; Mazzaferri, Richard James; Semaan, Pierre, Method and apparatus for providing file-type associations to multiple applications.
  85. Braddy, Ricky Gene; Simmons, Timothy Ernest; Calvin, Phillip N., Method and apparatus for providing policy-based document control.
  86. Braddy, Ricky Gene; Simmons, Timothy Ernest, Method and apparatus for reducing disclosure of proprietary data in a networked environment.
  87. Lum, Clinton Edward, Method and apparatus for remote installation of network drivers and software.
  88. Brown,Michael Wayne; Kaply,Michael Aaron; Reed,Aaron Keith; Ullmann,Cristi Nesbitt, Method and apparatus for removing information from a server.
  89. Frenkel,Ilan; Geller,Roman; Ramberg,Yoram; Snir,Yoram, Method and apparatus for retrieving network quality of service policy information from a directory in a quality of service policy management system.
  90. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Chin, Huai Chiun; Mazzaferri, Richard James, Method and apparatus for virtualizing window information.
  91. Pedersen, Bradley J.; Nord, Joseph H.; Hoy, David Randal, Method and system for accessing a remote file in a directory structure associated with an application program executing locally.
  92. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  93. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  94. Braddy, Ricky Gene; Simmons, Timothy Ernest; Cockerill, Aaron David, Method and system for assigning access control levels in providing access to networked content files.
  95. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  96. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  97. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  98. Nord, Joseph; Hoy, David; Chinta, Madhav, Method and system for communicating between isolation environments.
  99. Kasper,James W.; Beriswill,Paul A.; Wiley,Kevin L., Method and system for configurable network intrusion detection.
  100. Zobel, Robert David; Dodd, Timothy David; Millar, Sharon A.; Nesfeder, Jr., David Gerald; Singer, Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  101. Zobel,Robert David; Dodd,Timothy David; Millar,Sharon A.; Nesfeder, Jr.,David Gerald; Singer,Christopher S., Method and system for configuring and scheduling security audits of a computer network.
  102. Hammer, John M.; Ge, Rixin; Burke, Charles D.; Hubbard, Charles, Method and system for creating a record for one or more computer security incidents.
  103. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  104. Rivera, Juan, Method and system for dynamically associating access rights with a resource.
  105. Kennis, Peter H., Method and system for intrusion detection in a computer network.
  106. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method and system for locating and accessing resources.
  107. Palmer, Jr., Bernard Paul; Graham, Robert David, Method and system for protecting computer networks by altering unwanted network data traffic.
  108. Rowland, Craig H., Method and system for reducing the false alarm rate of network intrusion detection systems.
  109. Rowland, Craig H.; Rhodes, Aaron L., Method and system for reducing the false alarm rate of network intrusion detection systems.
  110. Innes, Andrew; Mayers, Chris; Syms, Mark James; Otway, David John, Method and system for requesting and granting membership in a server farm.
  111. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  112. Rao, Goutham; McCarthy, Lewis; Simmons, Timothy Ernest, Method and system for verification of an endpoint security scan.
  113. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Method for accessing, by application programs, resources residing inside an application isolation scope.
  114. Njemanze, Hugh S.; Aguilar-Macias, Hector; Beedgen, Christian Friedrich, Method for batching events for transmission by software agent.
  115. Massam, Christopher James; Monks, Dennis Warren, Method for network device configuration.
  116. Lotem, Amnon; Cohen, Gideon; Ben Naon, Lior, Method for simulation aided security event management.
  117. Mazzaferri, Richard James; Parry-Barwick, Stephen; Low, Anthony Edward, Methods and servers for establishing a connection between a client system and a virtual machine executing in a terminal services session and hosting a requested computing environment.
  118. Bissett, Nicholas Alexander; Roychoudhry, Anil; Mazzaferri, Richard James, Methods and systems for accessing, by application programs, resources provided by an operating system.
  119. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for executing, by a virtual machine, an application program requested by a client machine.
  120. Judge, Paul; Alperovitch, Dmitri; Caracciolo, Joel Joseph; Hernandez, Alejandro Manuel; Krasser, Sven; Schneck, Phyllis Adele, Methods and systems for exposing messaging reputation to an end user.
  121. Wookey, Michael; Low, Anthony Edward; Parry-Barwick, Stephen, Methods and systems for interacting, via a hypermedium page, with a virtual machine executing in a terminal services session.
  122. Chinta, Madhav; Raj, Sam Arun, Methods and systems for launching applications into existing isolation environments.
  123. Chinta, Madhav; Raj, SamArun, Methods and systems for launching applications into existing isolation environments.
  124. Mazzaferri, Richard James; Robinson, David Neil, Methods and systems for providing access to a computing environment.
  125. Low, Anthony Edward; Croft, Richard Jason; Mazzaferri, Richard James; Ryman, Paul Adam; Bissett, Nicholas Alexander; Wookey, Michael; Hackett, Donovan Ross, Methods and systems for providing access to a computing environment provided by a virtual machine executing in a hypervisor executing in a terminal services session.
  126. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Robinson, David Neil; Pedersen, Bradley J., Methods and systems for providing remote access to a computing environment provided by a virtual machine.
  127. Croft, Richard Jason; Low, Anthony Edward; Mazzaferri, Richard James; Pedersen, Bradley J., Methods and systems for selecting a method for execution, by a virtual machine, of an application program.
  128. Njemanze, Hugh S.; Aguilar-Macias, Hector; Zeng, Qiang; Beedgen, Christian Friedrich, Modular agent for network security intrusion detection system.
  129. Njemanze, Hugh S.; Aguilar-Macias, Hector; Zeng, Qiang; Beedgen, Christian Friedrich, Modular agent for network security intrusion detection system.
  130. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  131. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  132. Alperovitch, Dmitri; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander, Multi-dimensional reputation scoring.
  133. Alperovitch, Dmitri; Stecher, Martin; Tang, Yuchun; Trivedi, Aarjav Jyotindra Neeta; Willis, Lamar Lorenzo; Yang, Weilai; Zdziarski, Jonathan Alexander; Foote-Lennox, Tomo; Gould, Jeremy; Greve, Paula; Hernandez, Alejandro Manuel; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele, Multi-dimensional reputation scoring.
  134. Zuk, Nir; Guruswamy, Kowsik, Multi-method gateway-based network security systems and methods.
  135. Zuk, Nir; Guruswamy, Kowsik, Multi-method gateway-based network security systems and methods.
  136. Zuk, Nir; Guruswamy, Kowsik, Multi-method gateway-based network security systems and methods.
  137. Oliphant, Brett M.; Blignaut, John P., Multi-path remediation.
  138. Taylor, Kevin R.; Murugesan, Ganesh; Tajalli, Homayoon, Network access control system and method using adaptive proxies.
  139. Taylor,Kevin R.; Murugesan,Ganesh; Tajalli,Homayoon, Network access control system and method using adaptive proxies.
  140. Newton, Chris, Network intelligence system.
  141. Copeland, III, John A., Network port profiling.
  142. Copeland, III,John A., Network port profiling.
  143. Njemanze, Hugh S.; Aguilar-Macias, Hector; Zeng, Qiang; Beedgen, Christian Friedrich; Kothari, Pravin S., Network security monitoring system employing bi-directional communication.
  144. Jerrim, John; Copeland, John A., Network service zone locking.
  145. Porras, Phillip Andrew; Valdes, Alfonso De Jesus, Network surveillance.
  146. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance using long-term and short-term statistical profiles to determine suspicious network activity.
  147. Tidwell, Kenny; Beedgen, Christian, Network zone identification in a network security system.
  148. Porras, Phillip Andrew; Fong, Martin Wayne, Network-based alert management system.
  149. Ward, Chad; Lahoti, Ankur; Tidwell, Kenny, Object reference in a system.
  150. Ward, Chad; Lahoti, Ankur; Tidwell, Kenny, Object reference in a system.
  151. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang, Operating system and data protection.
  152. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang, Operating system and data protection.
  153. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang, Operating system and data protection.
  154. Zuk, Nir; Mao, Yu Ming, Packet processing in a multiple processor system.
  155. Zuk, Nir; Mao, Yu Ming, Packet processing in a multiple processor system.
  156. Zuk, Nir; Mao, Yu Ming, Packet processing in a multiple processor system.
  157. Zuk, Nir; Mao, Yu Ming, Packet processing in a multiple processor system.
  158. Copeland,John A.; Jerrim,John, Packet sampling flow-based detection of network intrusions.
  159. Saurabh, Kumar; Tidwell, Kenny C., Pattern discovery in a network system.
  160. Gardner, Philip B., Persistent servicing agent.
  161. Gardner, Philip B., Persistent servicing agent.
  162. Alperovitch, Dmitri; Greve, Paula; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele, Prioritizing network traffic.
  163. Alperovitch, Dmitri; Krasser, Sven; Greve, Paula; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  164. Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Torrez, Jonathan, Prioritizing network traffic.
  165. Hesselink, Lambertus; Rizal, Dharmarus; van Beurden, Joep; Bjornson, Eric S., Program recording webification.
  166. Njemanze, Hugh S.; Kothari, Pravin S., Real time monitoring and analysis of events from multiple network security devices.
  167. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  168. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  169. Oliphant, Brett M.; Blignaut, John P., Real-time vulnerability monitoring.
  170. Alperovitch, Dmitri; Judge, Paul; Krasser, Sven; Schneck, Phyllis Adele; Trivedi, Aarjav Jyotindra Neeta; Yang, Weilai, Reputation based connection throttling.
  171. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  172. Alperovitch, Dmitri; Krasser, Sven; Judge, Paul; Willis, Lamar Lorenzo, Reputation based load balancing.
  173. Alperovitch, Dmitri; Krasser, Sven, Reputation based message processing.
  174. Magdych, James S.; Rahmanovic, Tarik; McDonald, John R.; Tellier, Brock E.; Osborne, Anthony C.; Herath, Nishad P., Secure gateway with firewall and intrusion detection capabilities.
  175. Dash, Debabrata; Aguilar-Macias, Hector, Security event aggregation at software agent.
  176. Lin, Ching-Yung; Song, Yale; Wen, Zhen, Sequential anomaly detection.
  177. Gladstone, Philip J. S.; Kraemer, Jeffrey A., Stateful reference monitor.
  178. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang; Vohariwatt, Janet; Murray, Timothy John, Stored memory recovery system.
  179. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang; Vohariwatt, Janet; Murray, Timothy John, Stored memory recovery system.
  180. Shen, Andrew W.; Sun, Hanxiang; Jian, Zhang; Vohariwatt, Janet; Murray, Timothy John, Stored memory recovery system.
  181. Shen,Andrew W.; Sun,Hanxiang; Jian,Zhang; Vohariwatt,Janet; Murray,Timothy John, Stored memory recovery system.
  182. Njemanze, Hugh S., Synchronizing network security devices within a network security system.
  183. Seeber,Ren챕, System and method for compiling images from a database and comparing the compiled images with known images.
  184. Seeber,Ren��, System and method for compiling images from a database and comparing the compiled images with known images.
  185. Patrick, Robert; Key, Christopher; Holzberger, Paul, System and method for coordinating network incident response activities.
  186. Sharp, Clifford F.; Dark, Susan P., System and method for detecting and eliminating IP spoofing in a data transmission network.
  187. Sharp,Clifford F.; Dark,Susan Pittman, System and method for detecting and eliminating IP spoofing in a data transmission network.
  188. Christiansen, Bernd Oliver, System and method for dynamically altering videoconference bit rates and layout based on participant activity.
  189. Shay,A. David, System and method for intrusion prevention in a communications network.
  190. Jackson, Eric S.; Song, Douglas J.; Fleis, Lawrence Benjamin; Dysart, Aidan Christopher; Malan, Gerald R., System and method for managing computer networks.
  191. Jackson,Eric S; Song,Douglas J; Fleis,Lawrence Benjamin; Dysart,Aidan Christopher; Malan,Gerald R, System and method for managing computer networks.
  192. Krishna, Girish R., System and method for monitoring processing in a document processing peripheral.
  193. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  194. Graham,Robert David; Kavaler,Peter, System and method for preventing network misuse.
  195. Cohen, Gideon; Meiseles, Moshe; Reshef, Eran, System and method for risk detection and analysis in a computer network.
  196. Cohen, Gideon; Meiseles, Moshe; Reshef, Eran, System and method for risk detection and analysis in a computer network.
  197. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  198. Satterlee, Thomas James; Hackenberger, William Frank, System and method for the managed security control of processes on a computer system.
  199. Mualem,Hezi I.; Black,Nick; Molnar,John; Lunz,Jason, System and method for threat detection and response.
  200. Suuronen, Janne; Bergenwall, Martin, System and method of providing virus protection at a gateway.
  201. Palazzo, Robert Charles; Luu, Michael Sea, System and methods for computer network security involving user confirmation of network connections.
  202. Shay, A. David, System and methods for identification and tracking of user and/or source initiating communication in a computer network.
  203. Laborczfalvi, Lee George; Roychoudhry, Anil; Borzycki, Andrew Gerard; Muir, Jeffrey Dale; Chin, Huai Chiun; Mazzaferri, Richard James, System for virtualizing access to named system objects using rule action associated with request.
  204. Shay, A. David, System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection.
  205. Shay, A. David, System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing connection thereto.
  206. Shay, A. David, System, apparatuses, methods, and computer-readable media using identification data in packet communications.
  207. Calvert,Christopher L., System, method and program product for automatically collecting state information for computer system intrusion analysis.
  208. Oliphant, Brett M.; Blignaut, John P., System, method, and computer program product for reporting an occurrence in different manners.
  209. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  210. Judge, Paul; Rajan, Guru, Systems and methods for adaptive message interrogation through multiple queues.
  211. Judge,Paul; Rajan,Guru, Systems and methods for adaptive message interrogation through multiple queues.
  212. Judge, Paul; Rajan, Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  213. Judge,Paul; Rajan,Guru, Systems and methods for anomaly detection in patterns of monitored communications.
  214. Judge, Paul; Alperovitch, Dmitri; Moyer, Matt; Krasser, Sven, Systems and methods for classification of messaging entities.
  215. Judge, Paul; Moyer, Matt; Rajan, Guru; Alperovitch, Dmitri, Systems and methods for classification of messaging entities.
  216. Sheymov, Victor I.; Turner, Roger B., Systems and methods for distributed network protection.
  217. Sheymov,Victor I.; Turner,Roger B., Systems and methods for distributed network protection.
  218. Sheymov,Victor I; Turner,Roger B, Systems and methods for distributed network protection.
  219. Sheymov,Victor I; Turner,Roger B, Systems and methods for distributed network protection.
  220. Judge,Paul; Rajan,Guru, Systems and methods for enhancing electronic communication security.
  221. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Sellakannu, Arasendran; Willis, Lamar Lorenzo, Systems and methods for graphically displaying messaging traffic.
  222. Judge, Paul; Alperovitch, Dmitri; Krasser, Sven; Schneck, Phyllis Adele; Zdziarski, Jonathan Alexander, Systems and methods for identifying potentially malicious messages.
  223. Judge, Paul, Systems and methods for message threat management.
  224. Judge, Paul, Systems and methods for message threat management.
  225. Judge, Paul, Systems and methods for message threat management.
  226. Judge, Paul, Systems and methods for message threat management.
  227. Judge,Paul, Systems and methods for message threat management.
  228. Judge,Paul, Systems and methods for message threat management.
  229. Day, Jeff; Valdes, Roberto, Systems and methods for providing authentication credentials across application environments.
  230. Judge, Paul; Rajan, Guru, Systems and methods for secure communication delivery.
  231. Judge,Paul, Systems and methods for upstream threat pushback.
  232. Tidwell, Kenny C.; Saurabh, Kumar; Dash, Debabrata; Njemanze, Hugh S.; Kothari, Pravin S., Threat detection in a network security system.
  233. Njemanze, Hugh S., Timestamp modification in a network security system.
  234. Njemanze, Hugh S.; Bhatt, Rajesh P., User interface for network security console.
  235. Hesselink, Lambertus; Rizal, Dharmarus; van Beurden, Joep; Bjornson, Eric S., VCR webification.
  236. Taylor,Patrick; Mewett,Scott; Brass,Philip C.; Doty,Theodore R., Vulnerability assessment and authentication of a computer by a local scanner.
  237. Alperovitch, Dmitri; Foote-Lennox, Tomo; Greve, Paula; Judge, Paul; Krasser, Sven; Lange, Tim; Schneck, Phyllis Adele; Stecher, Martin; Tang, Yuchun; Zdziarski, Jonathan Alexander, Web reputation scoring.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로