$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

Real time monitoring and analysis of events from multiple network security devices 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • G06F-021/00
  • G06F-015/16
출원번호 US-0308415 (2002-12-02)
등록번호 US-7376969 (2008-05-20)
발명자 / 주소
  • Njemanze,Hugh S.
  • Kothari,Pravin S.
출원인 / 주소
  • ArcSight, Inc.
대리인 / 주소
    Fenwick & West LLP
인용정보 피인용 횟수 : 262  인용 특허 : 29

초록

Security events generated by a number of network devices are gathered and normalized to produce normalized security events in a common schema. The normalized security events are cross-correlated according to rules to generate meta-events. The security events may be gathered remotely from a system at

대표청구항

What is claimed is: 1. A method for monitoring security of a computer network, the computer network comprising network devices, the method comprising: gathering security events generated by the network devices, wherein a security event generated by a network device comprises information about opera

이 특허에 인용된 특허 (29)

  1. Hill Douglas W. ; Lynn James T., Adaptive system and method for responding to computer network security attacks.
  2. Chess,Brian; Do,Arthur; Fay,Sean; Thornton,Roger, Apparatus and method for developing secure software.
  3. Joiner,Herbert V., Comprehensive enterprise network analyzer, scanner and intrusion detection framework.
  4. Kodavalla Hanuma ; Joshi Ashok Madhukar ; Chatterjee Sumanta ; McCready Bruce, Database system with methods for appending data records by partitioning an object into multiple page chains.
  5. Urano Akihiro,JPX ; Hirata Toshiaki,JPX ; Fujino Shuji,JPX ; Morita Shinji ; Yamada Mitsugu,JPX ; Niimura Miki,JPX ; Morikawa Kazuyoshi,JPX ; Miyazaki Satoshi,JPX, Detection method of illegal access to computer system.
  6. Julie Lynn Huff ; Tracy Glenn Shelanskey ; Sheila Ann Jackson, Dynamic system defense for information warfare.
  7. Joiner,Herbert V.; Elwell,Ken W., Enterprise network analyzer zone controller system and method.
  8. David L. Drake ; David J. Webster, Event detection.
  9. Black,Steven; Debar,Herve; Garrison,John Michael; Wespi,Andreas, Hierarchical correlation of intrusion detection events.
  10. Phillip Andrew Porras ; Alfonso Valdes, Hierarchical event monitoring and analysis.
  11. Hrabik,Michael; Guilfoyle,Jeffrey; Mac Beaver,Edward, Method and apparatus for verifying the integrity and security of computer networks and implementing counter measures.
  12. Chong, Chee-Yee; Gong, Lester J.; Smythe, Erich J., Method and system for assessing attacks on computer networks using Bayesian networks.
  13. Campbell, Wayne A.; Walker, Jeffrey H., Method and system for detecting intrusion into and misuse of a data processing system.
  14. Bennett,Andrew Jonathan; Franklin,David Richard; Stewart,Kristian Jon, Method and system for efficient distribution of network event data.
  15. Farley,Timothy P.; Hammer,John M.; Williams,Bryan Douglas; Brass,Philip Charles; Young,George C.; Mezack,Derek John, Method and system for managing computer security information.
  16. Secor, Peter; Tokarsky, Tim; Perelman, Shoel, Method and system for network event impact analysis and correlation with network administrators, management policies and procedures.
  17. Steinberg, Louis A.; Wetstone, Evan R.; Belousov, Arkadiy; Deuel, John, Method and system for reducing false alarms in network fault management systems.
  18. Walker Jeffrey H., Method and system for reducing the volume of audit data and normalizing the audit data received from heterogeneous sources.
  19. Njemanze,Hugh S.; Aguilar Macias,Hector; Beedgen,Christian Friedrich, Method for batching events for transmission by software agent.
  20. Porras Phillip A. ; Valdes Alfonso, Network surveillance.
  21. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance.
  22. Porras, Phillip Andrew; Valdes, Alfonso, Network surveillance.
  23. Porras, Phillip Andrew; Fong, Martin Wayne, Network-based alert management.
  24. Michael D. Ladwig, System and method for ensuring and managing situation awareness.
  25. Hsieh Francis ; Manring Brad, System and method for network integrity management.
  26. Beavers,John B., System and method for tracking and filtering alerts in an enterprise and generating alert indications for analysis.
  27. Eschelbeck, Gerhard; Schlemmer, Andreas; Blaimschein, Peter, System and process for brokering a plurality of security applications using a modular framework in a distributed computing environment.
  28. Eschelbeck, Gerhard; Steiner, Thomas; Johannes, Mayr, System and process for maintaining a plurality of remote security applications using a modular framework in a distributed computing environment.
  29. Eschelbeck, Gerhard, System and process for reporting network events with a plurality of hierarchically-structured databases in a distributed computing environment.

이 특허를 인용한 특허 (262)

  1. Andersen, David M.; Mayer, Michael J., Active email collector.
  2. Njemanze, Hugh S.; Aguilar-Macias, Hector, Adjusting sensor time in a network security system.
  3. Petersen, Chris; Villella, Phillip; Aisa, Brad, Advanced intelligence engine.
  4. Petersen, Chris; Villella, Phillip; Aisa, Brad, Advanced intelligence engine.
  5. Myerson, Neal Robert; Justus, Darren C.; Connolly, Brian David; Holostov, Vladimir, Analyzing data and providing recommendations.
  6. Mahaffey, Kevin, Analyzing data gathered through different protocols.
  7. Stolfo, Salvatore J; Wang, Ke, Apparatus method and medium for detecting payload anomaly using N-gram distribution of normal data.
  8. Stolfo, Salvatore J., Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data.
  9. Stolfo, Salvatore J., Apparatus method and medium for tracing the origin of network transmissions using N-gram distribution of data.
  10. Kalinichenko, Michael, Application of nested behavioral rules for anti-malware processing.
  11. Chen, Lee; Oshiba, Dennis; Chiong, John, Applying security policy to an application session.
  12. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, Assessing a security state of a mobile communications device to determine access to specific tasks.
  13. Mahaffey, Kevin Patrick; Golombek, David; Evans, Daniel Lee; Richardson, David Luke; Wyatt, Timothy Micheal; Burgess, James David; Lineberry, Anthony McKay; Barton, Kyle, Assessing an application based on application data associated with the application.
  14. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Evans, Daniel Lee; Ong, Emil Barker; Strazzere, Timothy; LaMantia, Matthew John Joseph; Buck, Brian James, Assessing application authenticity and performing an action in response to an evaluation result.
  15. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, Assessing the security state of a mobile communications device.
  16. Avner, Jon; Brady, Shane; Yim, Wing Man; Shida, Haruya; Yazicioglu, Selim; Lukyanov, Andrey; Alinger, Brent; Nash, Colin, Automated recovery and escalation in complex distributed applications.
  17. Mayer, Michael J.; Johnson, Hayden S.; Johnson, Jay A.; Miller, Emerson D.; Montrois, Christopher D.; Toomey, Brian L., Automated straight-through processing in an electronic discovery system.
  18. Mayer, Michael J.; Miller, Emerson D.; Andersen, David M., Background service process for local collection of data in an electronic discovery system.
  19. Wyatt, Timothy Micheal; Anbalagapandian, Anbu; Mandal, Ayan, Client activity DNS optimization.
  20. Cosquer, Francois J. N.; Marquet, Bertrand; MacIntosh, Robert W.; Leclerc, Yvon; D'Souza, Scott David, Communication network security risk exposure management systems and methods.
  21. Tidwell, Kenny; Dash, Debabrata, Comparing events from multiple network security devices.
  22. Wyatt, Timothy Micheal; Mahaffey, Kevin; Halliday, Derek Joseph, Component analysis of software applications on computing devices.
  23. Maziak, Adrian A.; Onalan, Alp U.; Demir, Mehmet; Motwani, Sameer; Xu, Cloud, Computer monitoring and reporting infrastructure.
  24. Chauhan, Vijay; Badhani, Devendra M.; Murphey, Luke K.; Hazekamp, David, Configuring the generation of event data based on a triggering search query.
  25. Njemanze, Hugh S.; Kothari, Pravin S.; Dash, Debabrata; Wang, Shijie, Correlation engine with support for time-based rules.
  26. Wyatt, Timothy M.; Strazzere, Tim; Mahaffey, Kevin Patrick; Swami, Yogesh, Crawling multiple markets and correlating.
  27. Andersen, David M.; Miller, Emerson D.; Mayer, Michael J., Custodian management system.
  28. Andersen, David M.; Miller, Emerson D.; Mayer, Michael J., Custodian management system.
  29. Andersen, David M.; Mayer, Michael J.; Miller, Emerson D., Decryption of electronic communication in an electronic discovery enterprise system.
  30. Finkelstein, Amit; Lifschitz, Avihai; Dinerstein, Yosef; Caspi, Ziv, Delayed policy evaluation.
  31. Turnbull, Darren W., Detecting malicious resources in a network based upon active client reputation monitoring.
  32. Richardson, David; Farrakha, Ahmed Mohamed; Robinson, William Neil; Buck, Brian James, Determining source of side-loaded software.
  33. Richardson, David; Farrakha, Ahmed Mohamed; Robinson, William Neil; Buck, Brian James, Determining source of side-loaded software using signature of authorship.
  34. Larsson, Tony; Lidstrom, Mattias; Svensson, Martin, Deviating behaviour of a user terminal.
  35. Njemanze, Hugh S.; Bhatt, Rajesh P., Displaying information regarding time-based events.
  36. Agbabian, Paul, Distributed event correlation using horizontally partitioned rulesets.
  37. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Buck, Brian James; Hering, John Gunther; Gupta, Amit; Abey, Alex Cameron, Distributed monitoring, evaluation, and response for multiple devices.
  38. Dickey, Michael, Distributed processing of network data using remote capture agents.
  39. Andersen, David M.; Mayer, Michael J., Electronic communication data validation in an electronic discovery enterprise system.
  40. Richards, Phillip L.; Hobart, Eric B.; Andersen, David M.; Miller, Emerson D.; Mayer, Michael J.; Whalen, John N.; Toomey, Brian L.; Stellhorn, David W., Electronic discovery system.
  41. Richards, Phillip L.; Hobart, Eric B.; Andersen, David M.; Miller, Emerson D.; Mayer, Michael J.; Whalen, John N.; Toomey, Brian L.; Stellhorn, David W., Electronic discovery system.
  42. Richards, Phillip L.; Hobart, Eric B.; Andersen, David M.; Miller, Emerson D.; Mayer, Michael J.; Whalen, Jr., John N.; Toomey, Brian L.; Stellhorn, David W., Electronic discovery system.
  43. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, Enforcing security based on a security state assessment of a mobile device.
  44. Mahaffey, Kevin Patrick, Evaluating whether data is safe or malicious.
  45. Dash, Debabrata; Aguilar-Macias, Hector, Event aggregation in a network.
  46. Hassanzadeh, Amin; Modi, Shimon; Mulchandani, Shaan; Negm, Walid, Event correlation across heterogeneous operations.
  47. Hassanzadeh, Amin; Modi, Shimon; Mulchandani, Shaan; Negm, Walid, Event correlation across heterogeneous operations.
  48. Hassanzadeh, Amin; Modi, Shimon; Mulchandani, Shaan; Negm, Walid, Event correlation across heterogeneous operations.
  49. Childress, Rhonda L.; Dinger, John E.; Pennell, Neil Raymond; Wiggins, James Daniel, Event ownership assigner with failover for multiple event server system.
  50. Mahaffey, Kevin; Hering, John G.; Burgess, James, Event-based security state assessment and display for mobile devices.
  51. Wyatt, Timothy Micheal; Mahaffey, Kevin; Halliday, Derek Joseph; Richardson, David, Expressing intent to control behavior of application components.
  52. Wang, Yanlin; Sharan, Dhiraj, Extendable event processing through services.
  53. Huang, Wei; Zhou, Yizheng; Yu, Bin; Tang, Wenting; Beedgen, Christian F., Generating row-based and column-based chunks.
  54. Wood, Matthew S.; Levy, Joseph H.; Marston, McKay, Hardware accelerated application-based pattern matching for real time classification and recording of network traffic.
  55. Tidwell, Kenny; Beedgen, Christian; Njemanze, Hugh S.; Kothari, Pravin S., Hierarchical architecture in a network security system.
  56. Tidwell, Kenny; Beedgen, Christian; Njemanze, Hugh S.; Kothari, Pravin S., Hierarchical architecture in a network security system.
  57. Akitomi, Tomoaki; Ara, Koji; Sato, Nobuo; Tsuji, Satomi; Yano, Kazuo, Information processing system, management server and information processing method.
  58. Wiemer, Douglas; Gustave, Christophe; Chow, Stanley TaiHai; McFarlane, Bradley Kenneth, Information system service-level security risk analysis.
  59. Mankovski, Serge, Information technology system collaboration.
  60. Mayer, Michael J.; Toomey, Brian L.; Andersen, David M.; Miller, Emerson D.; Richards, Phillip L., Labeling electronic data in an electronic discovery enterprise system.
  61. Thompson, Micheal, Location determination for user authentication.
  62. Thompson, Micheal, Location determination for user authentication.
  63. Thompson, Micheal, Location determination for user authentication.
  64. Thompson, Micheal, Location determination for user authentication.
  65. Tsuchiya, Kazuhide; Abe, Masamichi; Kageyama, Tetsuya; Kawaguchi, Hiroshi; Washio, Hiroyuki; Umaki, Atsushi; Shiode, Ippei; Kimura, Masahiro; Fujimoto, Hiroshi; Takechi, Hiroshi, Log analysis system.
  66. Petersen, Chris; Villella, Phillip, Log collection, structuring and processing.
  67. Petersen, Chris; Villella, Phillip, Log collection, structuring and processing.
  68. Villella, Phillip; Petersen, Chris, Log collection, structuring and processing.
  69. Aguilar-Macias, Hector; Subrahmanyam, Rajiv, Message parsing in a network security system.
  70. Black, Robert Barth, Method and aparatus for presence based resource management.
  71. Larosa, Jeanette; Spielman, Chaim, Method and apparatus for analyzing source internet protocol activity in a network.
  72. Buck, Brian James; Wang, Jinggang, Method and apparatus for auxiliary communications with mobile communications device.
  73. Datla, Krishnam Raju; Beereddy, Srinivasa; Vengalam, Praveen; Guntakala, Chandrasekhar; Somepalli, Prasanthi, Method and apparatus for configuration syntax and semantic validation.
  74. Kay, James, Method and apparatus for electronic mail filtering.
  75. Kay, James, Method and apparatus for electronic mail filtering.
  76. Kay, James, Method and apparatus for electronic mail filtering.
  77. Porras, Phillip Andrew; Zhang, Jian, Method and apparatus for generating highly predictive blacklists.
  78. Vermeulen, Allan H.; Scharf, Jr., James E., Method and apparatus for measuring latency in web services.
  79. Merkey, Jeffery V.; Sparks, Bryan W., Method and apparatus for network packet capture distributed storage system.
  80. Merkey, Jeffrey V; Sparks, Bryan W, Method and apparatus for network packet capture distributed storage system.
  81. Black, Robert Barth, Method and apparatus for presence based resource management.
  82. Wood, Matthew Scott; Tveit, Paal; Edginton, Brian; Shillingford, Steve; Brown, James, Method and apparatus of network artifact indentification and extraction.
  83. Datla, Krishnam Raju; Beereddy, Srinivasa; Vengalam, Praveen; Guntakala, Chandrasekhar; Manubothu, Chandrareddy; Venkatavaradhan, Parthasarathy; Thunuguntlu, Muni, Method and apparatus providing programmable network intelligence.
  84. Datla, Krishnam Raju; Beereddy, Srinivasa; Somepalli, Prasanthi; Venkatavaradhan, Parthasarathy, Method and apparatus providing unified compliant network audit.
  85. Purcell, Stacy P.; Ross, Alan D.; Baca, Jim S.; Aissi, Selim; Kohlenberg, Tobias M.; Morgan, Dennis M., Method and device for managing security events.
  86. Tse, Edwin; Petersen, Robert; Power, John, Method and management agent for event notifications correlation.
  87. Tse, Edwin; Petersen, Robert; Power, John, Method and management agent for event notifications correlation.
  88. Seminaro, Michael D.; Mar, Christopher E.; Greaves, Jon D., Method and system for filtering and suppression of telemetry data.
  89. Kay, James, Method and system for filtering electronic messages.
  90. Doshi, Rutvik; Shankaranarayanan, Kartik; Mohapatra, Saurav, Method and system for management and configuration of remote agents.
  91. Buck, Brian James, Method and system for protecting privacy and enhancing security on an electronic device.
  92. Troyansky, Lidror, Method and system for protection against information stealing software.
  93. Troyansky, Lidror, Method and system for protection against information stealing software.
  94. Troyansky, Lidror, Method and system for protection against information stealing software.
  95. Troyansky, Lidror, Method and system for protection against information stealing software.
  96. Troyansky, Lidror; Bruckner, Sharon; Hubbard, Daniel Lyle, Method and system for protection against information stealing software.
  97. Troyansky, Lidror; Bruckner, Sharon; Hubbard, Daniel Lyle, Method and system for protection against information stealing software.
  98. Stevenson, Thomas Edward; Matyger, Jr., Allan Michael; Smith, Paul; Sachen, Sean, Method and system for providing information from third party applications to devices.
  99. Krishna, Kothuri Venkata Vamsi; Bhatt, Rajesh P., Method and system for sorting and bucketizing alerts in a virtualization environment.
  100. Krishna, Kothuri Venkata Vamsi; Bhatt, Rajesh P., Method and system for sorting and bucketizing alerts in a virtualization environment.
  101. Roll, Stuart L., Method and system for time-based correlation of events.
  102. Doshi, Rutvik; Shankaranarayanan, Kartik; Mohapatra, Saurav, Method and system of alert notification.
  103. Kay, James, Method and systems for collecting addresses for remotely accessible information sources.
  104. Njemanze, Hugh S.; Aguilar-Macias, Hector; Beedgen, Christian Friedrich, Method for batching events for transmission by software agent.
  105. Won, Jong Seoung; Ryu, Jin Sang, Method for detecting real-time event and server using the same.
  106. Lin, Ying Dar; Cheng, Tsung Huan; Lai, Yuan Cheng; Chen, I Wei, Method for recording, recovering, and replaying real traffic.
  107. Sweeney, Matthew S.; Pokines, Benjamin B., Method for the continuous calculation of a cyber security risk index.
  108. Pauly, Duncan Gunther, Method of identifying a root cause of a network event.
  109. Kraemer, Jeffrey A.; Costello, Brian F.; Grecu, Dan L.; Rangamani, Venkat R.; Gladstone, Philip J. S.; Kirby, Alan J., Methods and apparatus for automated creation of security policy.
  110. Toomey, Brian L.; Whalen, Jr., John N.; Hobart, Eric B., Methods and apparatuses for communicating preservation notices and surveys.
  111. Schulzrinne, Henning G.; Srinivasan, Suman Ramkumar, Methods and media for exchanging data between nodes of disconnected networks.
  112. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David; Grkov, Vance; Richardson, David Luke; Mandal, Ayan; Mangat, Cherry; Buck, Brian James; Robinson, William, Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such.
  113. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James David; Grubb, Jonathan Pantera; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Wyatt, Timothy Micheal, Methods and systems for blocking the installation of an application to improve the functioning of a mobile communications device.
  114. Mahaffey, Kevin Patrick; Buck, Brian James; Robinson, William; Hering, John G.; Burgess, James David; Wyatt, Timothy Micheal; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Salomon, Ariel; Grubb, Jonathan Pantera; Wootton, Bruce; Strazzere, Timothy; Swami, Yogesh, Methods and systems for sharing risk responses between collections of mobile communications devices.
  115. Mahaffey, Kevin Patrick; Buck, Brian James; Robinson, William; Hering, John G.; Burgess, James David; Wyatt, Timothy Micheal; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Salomon, Ariel; Grubb, Jonathan Pantera; Wootton, Bruce; Strazzere, Timothy; Swami, Yogesh, Methods and systems for sharing risk responses to improve the functioning of mobile communications devices.
  116. Forte, Andrea G.; Schulzrinne, Henning G., Methods, media, and devices for moving a connection from one point of access to another point of access.
  117. Forte, Andrea G.; Schulzrinne, Henning G., Methods, media, and devices for moving a connection from one point of access to another point of access.
  118. Forte, Andrea G.; Schulzrinne, Henning G., Methods, media, and devices for moving a connection from one point of access to another point of access.
  119. Stolfo, Salvatore J.; Ciocarlie, Gabriela F.; Frias-Martinez, Vanessa; Parekh, Janak; Keromytis, Angelos D.; Sherrick, Joseph, Methods, media, and systems for securing communications between a first node and a second node.
  120. Stolfo, Salvatore J.; Ciocarlie, Gabriela F.; Frias-Martinez, Vanessa; Parekh, Janak; Keromytis, Angelos D.; Sherrick, Joseph, Methods, media, and systems for securing communications between a first node and a second node.
  121. Stolfo, Salvatore J.; Ciocarlie, Gabriela F.; Frias-Martinez, Vanessa; Parekh, Janak; Keromytis, Angelos D.; Sherrick, Joseph, Methods, media, and systems for securing communications between a first node and a second node.
  122. Salomon, Ariel; Mahaffey, Kevin Patrick, Mobile communications device payment method utilizing location information.
  123. Wyatt, Timothy Micheal; Anbalagapandian, Anbu; Mandal, Ayan, Mobile device DNS optimization.
  124. Mahaffey, Kevin Patrick, Mobile device geolocation.
  125. Buck, Brian James; Mahaffey, Kevin Patrick, Modifying mobile device settings for resource conservation.
  126. Njemanze, Hugh S.; Aguilar-Macias, Hector; Zeng, Qiang; Beedgen, Christian Friedrich, Modular agent for network security intrusion detection system.
  127. Njemanze, Hugh S.; Aguilar-Macias, Hector; Zeng, Qiang; Beedgen, Christian Friedrich, Modular agent for network security intrusion detection system.
  128. Legrand, Veronique; Maciejak, David; Saraydaryan, Jacques; Pautet, Laurent; Briguet, Christophe; Benali, Fatiha, Monitoring a message associated with an action.
  129. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Evans, Daniel Lee; Ong, Emil Barker; Strazzere, Timothy; LaMantia, Matthew John Joseph; Buck, Brian James, Monitoring installed applications on user devices.
  130. John, Pramod; Wang, Yingxian; Marti, Ramachandran V.; Erlund, Maxine R., Monitoring network traffic by using event log information.
  131. Chandramouli, Devaki; Liebhart, Rainer, Monitoring suspicious events in a cellular network.
  132. Mahaffey, Kevin Patrick; Richardson, David Luke; Salomon, Ariel; Croy, R. Tyler; Walker, Samuel Alexander; Buck, Brian James; Marcin Gorrino, Sergio Ivan; Golombek, David, Multi-factor authentication and comprehensive login system for client-server networks.
  133. Strayer, William Timothy; Milliken, Walter; Watro, Ronald Joseph, Multi-tiered scalable network monitoring.
  134. Terzis, Andreas; Murgia, Marco A.; Baskaran, Ashwin, Multilayer access control security system.
  135. Christodoulou, Athena; Taylor, Richard; Tofts, Christopher, Network analysis.
  136. Figlin, Igal; Zavalkovsky, Arthur; Arzi, Lior; Hudis, Efim; LeMond, Jennifer R.; Fitzgerald, Robert Eric; Ahmed, Khaja E.; Williams, Jeffrey S.; Hardy, Edward W., Network intrusion detection with distributed correlation.
  137. Figlin, Igal; Zavalkovsky, Arthur; Arzi, Lior; Hudis, Efim; Lemond, Jennifer R.; Fitzgerald, Robert Eric; Ahmed, Khaja E.; Williams, Jeffrey S.; Hardy, Edward W., Network intrusion detection with distributed correlation.
  138. Njemanze, Hugh S.; Aguilar-Macias, Hector; Zeng, Qiang; Beedgen, Christian Friedrich; Kothari, Pravin S., Network security monitoring system employing bi-directional communication.
  139. Tidwell, Kenny; Beedgen, Christian, Network zone identification in a network security system.
  140. Ward, Chad; Lahoti, Ankur; Tidwell, Kenny, Object reference in a system.
  141. Ward, Chad; Lahoti, Ankur; Tidwell, Kenny, Object reference in a system.
  142. Saurabh,Kumar; Tidwell,Kenny, Pattern discovery in a network security system.
  143. Saurabh, Kumar; Tidwell, Kenny C., Pattern discovery in a network system.
  144. Mayer, Michael J.; Miller, Emerson D.; Andersen, David M., Positive identification and bulk addition of custodians to a case within an electronic discovery system.
  145. Sankararaman, Srinivasan; Kolingivadi, Deepakeswaran, Potential data leakage reporting system, method, and computer program product.
  146. Richards, Phillip L.; Andersen, David M.; Miller, Emerson D.; Clark, Benjamin; Knox, Jeffrey V.; Mayer, Michael J., Predictive coding of documents in an electronic discovery system.
  147. Wood, Matthew Scott; Tveit, Paal; Edginton, Brian; Shillingford, Steve; Brown, James; Levy, Joseph H; Arnold, Daniel M, Presentation of an extracted artifact based on an indexing technique.
  148. Andersen, David M.; Miller, Emerson D., Profile scanner.
  149. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, Providing access levels to services based on mobile device security state.
  150. Sanders, Derek; Jagannathan, Rangaswamy; Lee, Rosanna, Push pull data collection.
  151. Carasso, R. David; Delfino, Micah James; Hwang, Johnvey, Real time indication of previously extracted data fields for regular expressions.
  152. Njemanze, Hugh S.; Kothari, Pravin S., Real time monitoring and analysis of events from multiple network security devices.
  153. Lahoti, Ankur; Huang, Hui; Beedgen, Christian F., Real-time identification of an asset model and categorization of an asset to assist in computer network security.
  154. Wu, Mark; Farouk, Laila; Cai, Elsa, Remote real-time storage system monitoring and management.
  155. Lopez, Claudio Marcelo, Remotely managing enterprise resources.
  156. Lopez, Claudio Marcelo, Remotely managing enterprise resources.
  157. Lopez, Claudio Marcelo, Remotely managing enterprise resources.
  158. Nash, Alistair, Resource access filtering system and database structure for use therewith.
  159. Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal; Buck, Brian James; Hering, John Gunther; Gupta, Amit; Abey, Alex Cameron, Response generation after distributed monitoring and evaluation of multiple devices.
  160. Hayes, Matthew Terence; Eilebrecht, Eric Lynn; Kasiolas, Anastasios; Jager, Marcus J.; Power, Marc Andrew; Sandke, Steven Robert, Rule-based system for client-side quality-of-service tracking and reporting.
  161. Petersen, Chris; Villella, Phillip; Aisa, Brad, Scalable analytical processing of structured data.
  162. Miller, Emerson D.; Mayer, Michael J.; Richards, Phillip L., Search term hit counts in an electronic discovery system.
  163. Mayer, Michael J.; Toomey, Brian L.; Hobart, Eric B., Search term management in an electronic discovery system.
  164. Dash, Debabrata; Aguilar-Macias, Hector, Security event aggregation at software agent.
  165. Patel, Rajesh, Security event data normalization.
  166. Newton, Christopher D.; Bird, William, Security incident manager.
  167. Mahaffey, Kevin; Hering, John G.; Burgess, James, Security status and information display system.
  168. Mahaffey, Kevin; Hering, John G.; Burgess, James, Security status and information display system.
  169. Mahaffey, Kevin; Hering, John G.; Burgess, James, Security status assessment using mobile device security information database.
  170. Anurag, Singla, Security threat detection associated with security events and an actor category model.
  171. Gustave, Christophe; Chow, Stanley TaiHai; Wiemer, Douglas, Security vulnerability information aggregation.
  172. Mahaffey, Kevin Patrick, Server-assisted analysis of data for a mobile device.
  173. Andersen, David M.; Miller, Emerson D., Shared drive data collection tool for an electronic discovery system.
  174. Deng, Yungang; Li, Kun; Pan, Nengyi, Signature rule processing method, server, and intrusion prevention system.
  175. Deng, Yungang; Li, Kun; Pan, Nengyi, Signature rule processing method, server, and intrusion prevention system.
  176. Olguin Olguin, Daniel; Jaanu, Tuomas; Heyman, Derek; Waber, Benjamin, Social sensing and behavioral analysis system.
  177. Mayer, Michael J.; Andersen, David M., Source-to-processing file conversion in an electronic discovery enterprise system.
  178. Mayer, Michael J.; Andersen, David M., Source-to-processing file conversion in an electronic discovery enterprise system.
  179. Mayer, Michael J.; Andersen, David M., Source-to-processing file conversion in an electronic discovery enterprise system.
  180. Nos, Kathrin, Standard metadata model for analyzing events with fraud, attack, or any other malicious background.
  181. Huang, Wei; Zhou, Yizheng; Yu, Bin; Tang, Wenting; Beedgen, Christian F., Storing log data efficiently while supporting querying.
  182. Huang, Wei; Tang, Wenting; Beedgen, Christian F., Storing log data efficiently while supporting querying to assist in computer network security.
  183. Njemanze, Hugh S., Synchronizing network security devices within a network security system.
  184. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David, System and method for a mobile cross-platform software system.
  185. Mahaffey, Kevin; Hering, John G.; Burgess, James, System and method for a mobile cross-platform software system.
  186. Wootton, Bruce; Mahaffey, Kevin Patrick; Wyatt, Timothy Micheal, System and method for a scanning API.
  187. Hubbard, Daniel Lyle, System and method for adding context to prevent data leakage over a computer network.
  188. Hubbard, Daniel Lyle, System and method for adding context to prevent data leakage over a computer network.
  189. Mahaffey, Kevin Patrick; Golombek, David; Richardson, David Luke; Wyatt, Timothy Micheal; Burgess, James David; Hering, John G., System and method for adverse mobile application identification.
  190. Troyansky, Lidror, System and method for analysis of electronic information dissemination events.
  191. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James David; Grubb, Jonathan Pantera; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Wyatt, Timothy Micheal, System and method for assessing an application to be installed on a mobile communications device.
  192. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for assessing data objects on mobile communications devices.
  193. Mahaffey, Kevin, System and method for attack and malware prevention.
  194. Mahaffey, Kevin Patrick, System and method for attack and malware prevention.
  195. Mahaffey, Kevin Patrick, System and method for attack and malware prevention.
  196. Patrick, Robert; Key, Christopher; Holzberger, Paul, System and method for coordinating network incident response activities.
  197. Mahaffey, Kevin Patrick, System and method for creating and applying categorization-based policy to secure a mobile communications device from access to certain data objects.
  198. Wyatt, Timothy Micheal; Mahaffey, Kevin Patrick; Richardson, David Luke; Buck, Brian James; Rogers, Marc William, System and method for creating and assigning a policy for a mobile communications device based on personal data.
  199. Walker, Samuel Alexander; Mandal, Ayan Kanti; Senapati, Devesh; Mahaffey, Kevin Patrick; Richardson, David Luke; Buck, Brian James, System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security.
  200. Levy, Joseph H.; Wood, Matthew Scott; Arnold, Daniel; Foisy, Kenny; Tubbs, Dave, System and method for hypertext transfer protocol layered reconstruction.
  201. Hering, John G.; Mahaffey, Kevin; Burgess, James, System and method for identifying and assessing vulnerabilities on a mobile communication device.
  202. Hering, John G.; Mahaffey, Kevin; Burgess, James, System and method for identifying and assessing vulnerabilities on a mobile communications device.
  203. Mahaffey, Kevin Patrick; Hering, John G.; Burgess, James David; Grubb, Jonathan Pantera; Golombek, David; Richardson, David Luke; Lineberry, Anthony McKay; Wyatt, Timothy Micheal, System and method for mobile communication device application advisement.
  204. Salomon, Ariel; Mahaffey, Kevin Patrick, System and method for mobile device push communications.
  205. Mahaffey, Kevin Patrick; Burgess, James David; Hering, John G, System and method for mobile device replacement.
  206. Mahaffey, Kevin, System and method for monitoring and analyzing multiple interfaces and multiple protocols.
  207. Mahaffey, Kevin, System and method for monitoring and analyzing multiple interfaces and multiple protocols.
  208. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for preventing malware on a mobile communication device.
  209. Mahaffey, Kevin Patrick; Burgess, James David; Hering, John Gunther, System and method for providing offers for mobile devices.
  210. Griffin, Mark; Rosenberg, David; Daskalopoulos, Vasil V, System and method for real-time analysis of incoming data.
  211. Mahaffey, Kevin; Hering, John G.; Bergess, James, System and method for remotely securing or recovering a mobile device.
  212. Grkov, Vance; Richardson, David; Mandal, Ayan; Mangat, Cherry; Mahaffey, Kevin, System and method for remotely-initiated audio communication.
  213. Mahaffey, Kevin Patrick; Golombek, David; Evans, Daniel Lee; Richardson, David Luke; Wyatt, Timothy Micheal; Burgess, James David; Lineberry, Anthony McKay; Barton, Kyle, System and method for security data collection and analysis.
  214. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for server-coupled application re-analysis to obtain characterization assessment.
  215. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for server-coupled application re-analysis to obtain trust, distribution and ratings assessment.
  216. Mahaffey, Kevin Patrick; Burgess, James David; Golombek, David; Wyatt, Timothy Micheal; Lineberry, Anthony McKay; Barton, Kyle; Evans, Daniel Lee; Richardson, David Luke; Salomon, Ariel, System and method for server-coupled malware prevention.
  217. Buck, Brian James; Mahaffey, Kevin Patrick; Yerra, Kesava Abhinav; LaMantia, Matthew John Joseph, System and method for uploading location information based on device movement.
  218. Walker, Samuel Alexander; Mandal, Ayan Kanti; Senapati, Devesh; Mahaffey, Kevin Patrick; Richardson, David Luke; Buck, Brian James, System and method for using context models to control operation of a mobile communications device.
  219. Hubbard, Dan; Tse, Alan, System and method of analyzing web addresses.
  220. Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph; Kester, Harold M., System and method of monitoring and controlling application files.
  221. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  222. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  223. Kester, Harold M.; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  224. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  225. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  226. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  227. Kester, Harold M.; Hegli, Ronald B.; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  228. Kester, Harold M.; Hegli, Ronald B; Dimm, John Ross; Anderson, Mark Richard, System and method of monitoring and controlling application files.
  229. Kester, Harold M.; Kester Jones, legal representative, Nicole; Dimm, John Ross; Anderson, Mark Richard; Papa, Joseph, System and method of monitoring and controlling application files.
  230. Chen, Lee; Chiong, John; Wang, Xin, System and method to associate a private user identity with a public user identity.
  231. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  232. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  233. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  234. Wang, Xin; Chen, Lee; Chiong, John, System and method to associate a private user identity with a public user identity.
  235. Yu, Sounil, System for determining effectiveness and allocation of information security technologies.
  236. Yu, Sounil, System for determining effectiveness and allocation of information security technologies.
  237. Yu, Sounil, System for determining effectiveness and allocation of information security technologies.
  238. Sharifi Mehr, Nima, System for determining network anomalies.
  239. Richman, Lawrence, System for real time security monitoring.
  240. Hadden, Allen; Rogers, Kenneth Allen, System for tracking data security threats and method for same.
  241. Hadden, Allen; Rogers, Kenneth Allen, System for tracking data security threats and method for same.
  242. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for applying a security policy to a device based on a comparison of locations.
  243. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for applying a security policy to a device based on location.
  244. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for device broadcast of location information when battery is low.
  245. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for displaying location information of a device.
  246. Singla, Anurag, Systems and methods for distributed rule-based correlation of events.
  247. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  248. Barkan, Roy; Lazarov, David; Menaker, Yevgeny; Troyansky, Lidror, Systems and methods for efficient detection of fingerprinted data and information.
  249. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for locking and disabling a device in response to a request.
  250. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for remotely controlling a lost mobile communications device.
  251. Mahaffey, Kevin Patrick; Hering, John Gunther; Burgess, James, Systems and methods for transmitting a communication based on a device leaving or entering an area.
  252. Chen, Lee; Chiong, John; Yu, Yang, Systems and methods for user access authentication based on network access point.
  253. McFarlane, Bradley Kenneth; Wiemer, Douglas; McNamee, Kevin, Systems and methods of associating security vulnerabilities and assets.
  254. Krynski, Tevye Rachelson, Systems and methods of classifying sessions.
  255. Krynski, Tevye Rachelson, Systems and methods of classifying sessions.
  256. Tidwell, Kenny C.; Saurabh, Kumar; Dash, Debabrata; Njemanze, Hugh S.; Kothari, Pravin S., Threat detection in a network security system.
  257. Njemanze, Hugh S., Timestamp modification in a network security system.
  258. Singla, Anurag; Saurabh, Kumar; Tidwell, Kenny C., Tracking changing state data to assist in computer network security.
  259. Cockerill, Aaron; Richardson, David; Thanos, Daniel; Robinson, William Neil; Buck, Brian James; Mahaffey, Kevin Patrick, Use of device risk evaluation to manage access to services.
  260. Chen, Lee; Chiong, John; Yu, Yang, User access authentication based on network access point.
  261. Mahaffey, Kevin; Buck, Brian James; Nguyen, Thomson Van, User classification based on data gathered from a computing device.
  262. Njemanze, Hugh S.; Bhatt, Rajesh P., User interface for network security console.
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로