$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

[미국특허] System and method for active data collection in a network security system 원문보기

IPC분류정보
국가/구분 United States(US) Patent 등록
국제특허분류(IPC7판)
  • H04L-029/06
출원번호 US-0176436 (2005-07-06)
등록번호 US-8572733 (2013-10-29)
발명자 / 주소
  • Rockwood, Troy Dean
출원인 / 주소
  • Raytheon Company
대리인 / 주소
    Schwegman, Lundberg & Woessner, P.A.
인용정보 피인용 횟수 : 23  인용 특허 : 32

초록

A network security system comprises a plurality of sensors, a management server, and a data collection module. The plurality of sensors receive first data associated with potential attacks on the system. The manager server is coupled to at least one sensor and correlates at least a portion of the fi

대표청구항

1. A network security system, comprising: a plurality of sensors operable to receive first data associated with potential attacks on a network security system;a manager server coupled to at least one of the plurality of sensors and comprising a first processor, the manager server operable to: correl

이 특허에 인용된 특허 (32) 인용/피인용 타임라인 분석

  1. Sunanda D. Mitra, Adaptive vector quantization/quantizer.
  2. Ghanea Hercock,Robert A, Agent-based intrusion detection system.
  3. Steven C. Johnson ; Howard Glover, Aircraft terrain information system.
  4. Khanolkar,Rajeev; Azim,Ozakil; Asthana,Rishi; Ved,Niten; Hanrahan,Kevin; Ghildiyal,Amit; Pogaku,Shirisha; Amaratunge,Dhani; Samavenkata,K. V. Rao; Hamid,Aral Rarsh, Comprehensive security structure platform for network managers.
  5. Qian,Shen En; Hollinger,Allan B.; Gagnon,Luc, Data compression engines and real-time wideband compressor for multi-dimensional data.
  6. Wright ; Jr. Laurence E. ; Kimme Ernest G., Data compression system using source representation.
  7. Copeland, III,John A., Flow-based detection of network intrusions.
  8. Syvanne,Tuomo, Handling state information in a network element cluster.
  9. Rowan Larry (3440½Caroline Ave. Culver City CA 90230), Holographic display system.
  10. Tadashi Ohashi JP, Information collecting apparatus.
  11. Maloney Michael P. ; Suit John M. ; Scott Christopher J. ; Woodus Francis M., Information security analysis system.
  12. Dark,Susan Pittman, Intelligent feedback loop process control system.
  13. Day,Christopher W., Intrusion detection system using self-organizing clusters.
  14. Vachtesvanos, George J.; Dorrity, Lewis J.; Wang, Peng; Echauz, Javier; Mufti, Muid, Method and apparatus for analyzing an image to detect and identify patterns.
  15. Lim, Joo Hwee, Method and apparatus for indexing and retrieving images using visual keywords.
  16. Vinberg Anders ; Cass Ronald J. ; Huddleston David E. ; Pao John D. ; Barthram Phil K.,GBX ; Bayer Christopher W.,GBX, Method and apparatus for system state monitoring using pattern recognition and neural networks.
  17. Chong, Chee-Yee; Gong, Lester J.; Smythe, Erich J., Method and system for assessing attacks on computer networks using Bayesian networks.
  18. Aubrey B. Poore, Jr., Method and system for tracking multiple regional objects by multi-dimensional relaxation.
  19. Houri, Cyril, Method and systems for locating geographical locations of online users.
  20. Rowan Larry (3440½Caroline Ave. Culver CA 90230), Mobile assault logistic kinetmatic engagement device.
  21. Hild,Stefan G.; Pawlitzek,Rene; Stolze,Markus, Monitoring events in a computer network.
  22. Kimura,Keisuke; Yamamoto,Hiroyuki; Kariya,Aki; Murata,Katsutoshi; Odakura,Atsushi, Moving status information providing method and server.
  23. Fayyad, Usama; Shanmugasundaram, Jayavel, Multi-dimensional database record compression utilizing optimized cluster models.
  24. Pearlman, William A.; Said, Amir, N-dimensional data compression using set partitioning in hierarchical trees.
  25. Conklin David Allen ; Harrison John Reed, Network surveillance system.
  26. Shanklin, Steven D.; Lathem, Gerald S., Parallel intrusion detection sensors with load balancing for high speed networks.
  27. Yishai Ilani IL, Signal equalization.
  28. Stone, Cyro A.; Ybarra, Kathryn W.; Eich, Tom V., Surveillance and collision avoidance system with compound symbols.
  29. Holloway Malcolm H. ; Prorock Thomas Joseph, System and method for detecting and preventing security.
  30. Myllymaki,Jussi Petri; Ruvolo,Joann, System and method for determining network users' physical locations.
  31. Maeda Yoshiharu,JPX ; Takayama Kuniharu,JPX ; Naito Hirohisa,JPX ; Sekiguchi Minoru,JPX, System for providing guiding information for use in detecting and accessing a mobile object.
  32. Novik Dmitry A. (Washington DC), Systems and methods for interactive image data acquisition and compression.

이 특허를 인용한 특허 (23) 인용/피인용 타임라인 분석

  1. Sullivan, Gary J.; Pitkow, Jim; Brown, Marc; Chelliah, Raman, Determination and application of click quality.
  2. Diehl, David F.; Alperovitch, Dmitri; Ionescu, Ion-Alexandru; Kurtz, George Robert, Kernel-level security agent.
  3. Cabrera, Luis Felipe; Lietz, M. Shannon; Godinez, Javier, Method and apparatus for automating threat model generation and pattern identification.
  4. Weaver, Brett; Godinez, Javier; Brinkley, Capen; Bishop, Thomas; Lietz, M. Shannon; Cabrera, Luis Felipe, Method and system for comparing different versions of a cloud based application in a production environment using segregated backend systems.
  5. Lietz, M. Shannon; Cabrera, Luis Felipe, Method and system for creating enriched log data.
  6. Lietz, M. Shannon; Cabrera, Luis Felipe; Nisly, Barry J.; Neher, III, Ted R.; Godinez, Javier; Jain, Ankur, Method and system for dynamic and comprehensive vulnerability management.
  7. Cabrera, Luis Felipe; Lietz, M. Shannon, Method and system for enabling self-monitoring virtual assets to correlate external events with characteristic patterns associated with the virtual assets.
  8. Lietz, M. Shannon; Cabrera, Luis Felipe, Method and system for providing a virtual asset perimeter.
  9. Cabrera, Luis Felipe; Lietz, M. Shannon, Method and system for providing automated self-healing virtual assets.
  10. Lietz, M. Shannon; Cabrera, Luis Felipe; Price, Christian; Nikulshin, Michelle; Godinez, Javier; Philip, Sabu Kuruvila; Rambur, Brad A.; Kennedy, Scott Cruickshanks; Naugle, Erik Thomas; Bonney, William Q., Method and system for providing permissions management.
  11. Lietz, M. Shannon; Cabrera, Luis Felipe, Method and system for providing security aware applications.
  12. Lietz, M. Shannon; Cabrera, Luis Felipe; Bishop, Thomas; Weaver, Brett; Brinkley, Capen, Method and system for secure delivery of information to computing environments.
  13. Lietz, M. Shannon; Cabrera, Luis Felipe; Bishop, Thomas; Weaver, Brett; Brinkley, Capen, Method and system for secure delivery of information to computing environments.
  14. Lietz, M. Shannon; Cabrera, Luis Felipe, Method and system for virtual asset assisted extrusion and intrusion detection and threat scoring in a cloud computing environment.
  15. Pitkow, Jim; Chelliah, Raman; Brown, Marc, Network interaction monitoring appliance.
  16. Pitkow, Jim; Chelliah, Raman; Brown, Marc, Network interaction monitoring appliance.
  17. Zhao, Zhipeng; Wang, Yanlin; Singla, Anurag, Parameter adjustment for pattern discovery.
  18. Falkowitz, Oren; Syme, Philip; Darche, Blake, Remediating computer security threats using distributed sensor computers.
  19. Falkowitz, Oren; Syme, Philip; Darche, Blake, Remediating computer security threats using distributed sensor computers.
  20. Falkowitz, Oren; Syme, Philip; Darche, Blake, Remediating computer security threats using distributed sensor computers.
  21. Diehl, David F.; Alperovitch, Dmitri; Ionescu, Ion-Alexandru; Kurtz, George Robert, Security agent.
  22. Alperovitch, Dmitri; Kurtz, George Robert; Diehl, David Frederick; Krasser, Sven; Meyers, Adam S., Social sharing of security information in a group.
  23. Lietz, M. Shannon; Cabrera, Luis Felipe, System and method for providing a self-monitoring, self-reporting, and self-repairing virtual asset configured for extrusion and intrusion detection and threat scoring in a cloud computing environment.

활용도 분석정보

상세보기
다운로드
내보내기

활용도 Top5 특허

해당 특허가 속한 카테고리에서 활용도가 높은 상위 5개 콘텐츠를 보여줍니다.
더보기 버튼을 클릭하시면 더 많은 관련자료를 살펴볼 수 있습니다.

섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로