CA2434674A1 - Computer security and management system - Google Patents

Computer security and management system Download PDF

Info

Publication number
CA2434674A1
CA2434674A1 CA002434674A CA2434674A CA2434674A1 CA 2434674 A1 CA2434674 A1 CA 2434674A1 CA 002434674 A CA002434674 A CA 002434674A CA 2434674 A CA2434674 A CA 2434674A CA 2434674 A1 CA2434674 A1 CA 2434674A1
Authority
CA
Canada
Prior art keywords
handler
agent
action
signature
mobile autonomous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CA002434674A
Other languages
French (fr)
Other versions
CA2434674C (en
Inventor
Craig H. Rowland
Justin Pettit
Aaron Rhodes
Vicki Irwin
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cisco Technology Inc
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Publication of CA2434674A1 publication Critical patent/CA2434674A1/en
Application granted granted Critical
Publication of CA2434674C publication Critical patent/CA2434674C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Abstract

The present invention provides a generic distributed command, control, and communication framework that allows computer systems, devices, and operation al personnel to interact with the network as a unified entity. The present invention provides these services by building upon a core communication architecture that permits local or remote execution of mobile program code, static execution of program code, flexible communication formats, self-heali ng network techniques, and expansion by the addition of new system modules, software handlers, or mobile autonomous agents.

Claims (49)

1. A computer implemented method for providing system security and resource management, comprising:
managing event messages by a master control processor between system handlers according to security system policies;
processing network messages by a network handler between client and server computers;
inserting native and third party event messages received by an insertion handler into the master control processor for processing by other system handlers;
detecting and processing event message signatures by the signature handler from alarm, system, and insertion events for conversion into system alarm messages for action by the other system handlers; and performing actions by an action handler in response to action requests from the master control processor.
2. The method according to claim 1, further comprising maintaining an execution environment by an agent handler for mobile autonomous code modules.
3. The method according to claim 1, further comprising collecting and logging event messages by a logging handler.
4. The method according to claim 1, further comprising managing system configuration parameters by a configuration handler.
5. The method according to claim 1, wherein the step of managing event messages comprises:
registering the system handlers;
passing event messages between system handlers; and managing a event queues attached to the system handlers.
6. The method according to claim 5, wherein the step of registering each system handler comprises:
reading the handler module to determine initialization requirement;

initializing the handler application programming interface;
determining if the handler is to run as a remote procedure call;
making the handler available through the remote procedure call interface if run as a remote procedure call; and initializing the handler input/output queues if not run as a remote procedure call.
7. The method according to claim 1, wherein the system handlers comprise static and dynamic system processes.
8. The method according to claim 1, further comprising;
initiating the system handlers by internal mechanisms;
initiating the system handlers by external mechanisms; and initiating the system handlers from the master control processor.
9. The method according to claim 1, wherein the system handlers have a reversible architecture to enable the system handlers to be used in either a client or server computer mode.
10. The method according to claim 1, wherein the step of processing network messages by the network handler comprises:
allowing connection only from clients and servers defined in a access control list;
authenticating protocols with clients and servers;
compressing data to minimize bandwidth requirements; and encrypting data to provide secure communication.
11. The method according to claim 1, wherein the step of inserting native and third party event messages received by the insertion handler from external programs comprises:
reading and writing messages using an insertion method selected from the group consisting of file descriptor, network sockets and named pipe;
using a native insertion mode library to directly insert messages into the master control processor; and using an external insertion mode library linked to a third party sources to directly insert messages into the master control processor.
12. The method according to claim 1, wherein the step of detecting and processing event messages received by the signature handler comprises:
accepting alarm events from the master control processor;
decoding the alarm type and originator from the alarm event;
consulting internal signature registry for alarms of the type accepted;
handing the alarm message off to the signature module for processing;
extracting alarm data macro information;
determining if an alarm has occurred;
consulting the action policy if an alarm has occurred to determine response;
and passing the resulting response message to the master control processor for action by the other system handlers.
13. The method according to claim 1, wherein the action performed by the action handler is selected from the group consisting of blocking a host with a modified route command, blocking a host with a packet filter modification command, disabling a user account, disabling a network interface, running an external user-defined command, logging an event, sending email or pager alerts, sending on-screen alerts to users or administrators, requesting server executed action, and a pluggable action defined by a user.
14. The method according to claim 1, wherein the steps of detecting and processing event messages received by the signature handler and performing actions by the action handler comprises the steps of:
receiving an event message containing a signature by the signature handler from the master control processor;
detecting an attack by the signature handler from the event message signature;
consulting action policy by the signature handler;
determining action to be taken by the signature handler;
ending the process if no action is required;
determining required action parameters by the signature handler if action is required;
sending an action request to the action handler by the signature handler via the master control processor;
processing and executing the action request by the action handler; and returning status of the executed action to the signature handler.
15. The method according to claim 2, wherein the step of maintaining an execution environment by the agent handler for mobile autonomous code modules comprises:
ensuring that the mobile autonomous code modules carry appropriate credentials, are authenticated and cryptographically signed by a trusted introducer, and able to execute on the host operating system;
distributing mobile autonomous code modules to one or more client computers;
executing the mobile autonomous code modules without interference;
allowing the mobile autonomous code modules to collect and report its results;
and shutting down the mobile autonomous code modules.
16. The method according to claim 15, wherein the step of executing the mobile autonomous code modules comprises:
verifying detected alarms;
reducing false alarm rates; and providing immediate response.
17. The method according to claim 15, wherein the step of executing the mobile autonomous code modules comprises the steps of actively looking for problems and identifying attackers when problems are detected.
18. The method according to claim 15, wherein the step of executing the mobile autonomous code modules comprises performing security and system administration tasks in self healing network environments.
19. The method according to claim 15, wherein the step of executing the mobile autonomous code modules comprises allowing self healing components of the system to move between clients and operate independently where required.
20. The method according to claim 2, wherein the step of maintaining an execution environment by the agent handler for mobile autonomous code modules comprises:
enabling self healing and adaptive networks;
facilitating distribution of updates for the mobile autonomous code modules;
and centralizing command and control functions for increased reliability.
21. The method according to claim 2, wherein the step of maintaining an execution environment by the agent handler further comprises forming a peer-to-peer defensive cluster with mobile autonomous code modules.
22. The method according to claim 2, wherein the step of maintaining an execution environment by the agent handler further comprises protecting the mobile autonomous code modules from alteration or tampering by hostile adversaries, and dispatching the mobile autonomous code modules through a predictable schedule from a central control point.
23. The method of claim 22, wherein the mobile autonomous code modules are dispatched through a random schedule.
24. The method according to claim 2, wherein the step of maintaining an execution environment by the agent handler further comprises:
programming the mobile autonomous code modules to detect and remove attackers at random;
storing code for the mobile autonomous code modules at a central location;
preventing alteration of the mobile autonomous code modules on client computers;
updating the mobile autonomous code modules with updated security detection strategies without modifying client computers;
beginning an active search for attackers when alerted to an intruder's presence;
performing automated corrective measures to remove the intruder; and saving forensic evidence.
25. The method according to claim 2, wherein security-specific mobile autonomous code modules are selected from the group consisting of forensic evidence agent, intrusion control agent, file integrity agent, host scanning agent, known intrusion agent, loadable kernel module agent, password cracking agent, log archive agent, rootkit agent, suspicious file agent, promiscuous mode agent, hidden process detection agent, unauthorized network daemon agent, self test agent, spy agent, zombie shells agent, and insider attack agent.
26. The method according to claim 25, wherein forensic evidence gathered by the forensic evidence agent from protected systems is cryptographically signed to prevent tampering.
27. The method according to claim 2, wherein network management-specific mobile autonomous code modules are selected from the group consisting of backup agent, host inventory agent, system monitor and status agent, system task agent, and Patch Watch .TM.
agent.
28. The method according to claim 3, wherein the method of logging event messages is selected from the group consisting of text-based files, a local system auditing facility, a cryptographically signed secure log format, directly to a system console, e-mail notification, direct used interface, and system wide notification.
29. The method according to claim 4, wherein the step of managing system configuration parameters comprises;
interfacing generic calls to other system handlers;
reading system configuration parameters;
writing system configuration parameters;
changing system configuration parameters;
reverting system configuration parameters back to a previous version;
deleting system configuration parameters;
backing up system configuration parameters; and providing multiple access protection mechanisms.
30. A system for providing system security and resource management, comprising:
a master control processor for managing event messages between system handlers according to security system policies;
a network handler for processing network messages between client and server computers;
an insertion handler for inserting native and third party event messages into the master control processor for processing by other system handlers;
a signature handler for detecting and processing event messages from alarm, system, and insertion events for conversion into system alarm messages for action by other system handlers; and an action handler for performing actions in response to action requests from the master control processor.
31. The system according to claim 30, further comprising:
an agent handler for maintaining an execution environment for mobile autonomous code modules;
a logging handler for collecting and logging event messages; and a configuration handler for managing system configuration parameters.
32. The system according to claim 31, wherein the system handlers auto-register themselves and their capabilities with the master control processor.
33. The system according to claim 30, wherein the action handler utilizes pluggable action modules.
34. The system according to claim 30, wherein the signature handler utilizes pluggable signature modules.
35. The system according to claim 34, wherein the pluggable signature modules auto-register with the signature handler.
36. The system according to claim 34, wherein a pluggable signature modules uses stored data from other signature modules, stores data between execution, stores data between system startup and shutdown sequences, and only processes signatures relating to the signature module.
37. The system according to claim 34, wherein the pluggable signature modules are added and removed from the system without modifying the core system code.
38. The system according to claim 31, wherein the system is installed on at least one server computer and at least one client computer.
39. The system according to claim 38, wherein the system installed on at least one client operates independently of the system installed on at least one server for reduced processing and reaction time and when network communications are disrupted.
40. The system according to claim 38, further comprising at least one graphical user interface.
41. The system according to claim 40, further comprising multiple levels of independent alarm filters on the client and server computers for reduced false alarm reporting, configuration flexibility, and system granularity.
42. The system according to claim 40, further comprising encrypted and mutually authenticated communication links between the server computer, client computer and graphical user interface.
43. The system according to claim 40, further comprising a means for re-allocating system resources to circumvent system problems or failures.
44. The system according to claim 31, wherein the system is installed on a client computer to maintain host processes, collect and forward events, process local client signatures, generate events, initiate and respond to action requests, initiate self healing counter-measures, and host mobile autonomous code agents.
45. The system according to claim 31, wherein the system is installed on a server computer to collect and store events, process enterprise client signatures, generate events, operate a central system database, schedule events, initiate and respond to action requests, initiate self healing counter-measures, maintain a graphical user interface backend structure, and manage mobile autonomous code agents.
46. The system according to claim 40, wherein the client computer has a capability to perform server computer functions in the event of failure of a server computer.
47. The system according to claim 40, wherein the server computer has a capability to perform client computer functions in the event of failure of a client computer.
48. Computer executable software code stored on a computer readable medium, the code for a computer implemented method for providing system security and resource management, comprising:

code for managing event messages by a master control processor between system handlers according to security system policies;
code for processing network messages by a network handler between client and server computers;
code for inserting native and third party event messages received by an insertion handler into the master control processor for processing by other system handlers;
code for detecting and processing event message signatures by the signature handler from alarm, system, and insertion events for conversion into system alarm messages for action by the other system handlers; and code for performing actions by an action handler in response to action requests from the master control processor.
49. The computer executable software code method of claim 48, further comprising:
code for maintaining an execution environment by an agent handler for mobile autonomous code modules;
code for collecting and logging event messages by a logging handler; and code for managing system configuration parameters by a configuration handler.
CA2434674A 2001-01-10 2002-01-10 Computer security and management system Expired - Fee Related CA2434674C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US26115501P 2001-01-10 2001-01-10
US60/261,155 2001-01-10
PCT/US2002/000900 WO2002056152A2 (en) 2001-01-10 2002-01-10 Computer security and management system

Publications (2)

Publication Number Publication Date
CA2434674A1 true CA2434674A1 (en) 2002-07-18
CA2434674C CA2434674C (en) 2010-06-08

Family

ID=22992142

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2434674A Expired - Fee Related CA2434674C (en) 2001-01-10 2002-01-10 Computer security and management system

Country Status (8)

Country Link
US (1) US7058968B2 (en)
EP (1) EP1381928B1 (en)
CN (1) CN1295904C (en)
AT (1) ATE419574T1 (en)
AU (1) AU2002239889B2 (en)
CA (1) CA2434674C (en)
DE (1) DE60230601D1 (en)
WO (1) WO2002056152A2 (en)

Families Citing this family (279)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6976093B2 (en) * 1998-05-29 2005-12-13 Yahoo! Inc. Web server content replication
US7181486B1 (en) 1998-12-07 2007-02-20 Network Ice Corporation Method and apparatus for remote installation of network drivers and software
IL152502A0 (en) 2000-04-28 2003-05-29 Internet Security Systems Inc Method and system for managing computer security information
US6907531B1 (en) 2000-06-30 2005-06-14 Internet Security Systems, Inc. Method and system for identifying, fixing, and updating security vulnerabilities
US7093239B1 (en) 2000-07-14 2006-08-15 Internet Security Systems, Inc. Computer immune system and method for detecting unwanted code in a computer system
US9027121B2 (en) 2000-10-10 2015-05-05 International Business Machines Corporation Method and system for creating a record for one or more computer security incidents
US20030028803A1 (en) * 2001-05-18 2003-02-06 Bunker Nelson Waldo Network vulnerability assessment system and method
US7145900B2 (en) 2001-05-31 2006-12-05 Go2Call.Com, Inc. Packet-switched telephony call server
WO2002097587A2 (en) 2001-05-31 2002-12-05 Internet Security Systems, Inc. Method and system for implementing security devices in a network
US7350234B2 (en) * 2001-06-11 2008-03-25 Research Triangle Institute Intrusion tolerant communication networks and associated methods
US7096503B1 (en) * 2001-06-29 2006-08-22 Mcafee, Inc. Network-based risk-assessment tool for remotely detecting local computer vulnerabilities
AUPR642401A0 (en) * 2001-07-18 2001-08-09 Precise Data Recovery Services Pty Ltd Data analysis system
US7506374B2 (en) * 2001-10-31 2009-03-17 Computer Associates Think, Inc. Memory scanning system and method
US7543056B2 (en) 2002-01-15 2009-06-02 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7257630B2 (en) 2002-01-15 2007-08-14 Mcafee, Inc. System and method for network vulnerability detection and reporting
US7336602B2 (en) * 2002-01-29 2008-02-26 Intel Corporation Apparatus and method for wireless/wired communications interface
US7873984B2 (en) * 2002-01-31 2011-01-18 Brocade Communications Systems, Inc. Network security through configuration servers in the fabric environment
US7174566B2 (en) * 2002-02-01 2007-02-06 Intel Corporation Integrated network intrusion detection
US7369532B2 (en) * 2002-02-26 2008-05-06 Intel Corporation Apparatus and method for an audio channel switching wireless device
JP3713491B2 (en) * 2002-02-28 2005-11-09 株式会社エヌ・ティ・ティ・ドコモ Server apparatus and information processing method
US7254708B2 (en) * 2002-03-05 2007-08-07 Intel Corporation Apparatus and method for wireless device set-up and authentication using audio authentication—information
AU2003220582A1 (en) * 2002-03-29 2003-10-13 Cisco Technology, Inc. Method and system for reducing the false alarm rate of network intrusion detection systems
US20030196123A1 (en) * 2002-03-29 2003-10-16 Rowland Craig H. Method and system for analyzing and addressing alarms from network intrusion detection systems
US7016883B2 (en) * 2002-04-23 2006-03-21 Sprint Communications Company L.P. Reverse caching for residential end-users to reduce usage of access links to a core communication network
US20030236652A1 (en) * 2002-05-31 2003-12-25 Battelle System and method for anomaly detection
US7519990B1 (en) 2002-07-19 2009-04-14 Fortinet, Inc. Managing network traffic flow
US7840806B2 (en) * 2002-10-16 2010-11-23 Enterprise Information Management, Inc. System and method of non-centralized zero knowledge authentication for a computer network
US8239917B2 (en) 2002-10-16 2012-08-07 Enterprise Information Management, Inc. Systems and methods for enterprise security with collaborative peer to peer architecture
US20040193923A1 (en) * 2003-01-16 2004-09-30 Hammond Frank J. Systems and methods for enterprise security with collaborative peer to peer architecture
US7549159B2 (en) * 2004-05-10 2009-06-16 Liquidware Labs, Inc. System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing connection thereto
US7386889B2 (en) * 2002-11-18 2008-06-10 Trusted Network Technologies, Inc. System and method for intrusion prevention in a communications network
US7591001B2 (en) * 2004-05-14 2009-09-15 Liquidware Labs, Inc. System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection
US7660980B2 (en) * 2002-11-18 2010-02-09 Liquidware Labs, Inc. Establishing secure TCP/IP communications using embedded IDs
US7418730B2 (en) * 2002-12-17 2008-08-26 International Business Machines Corporation Automatic client responses to worm or hacker attacks
US8327442B2 (en) * 2002-12-24 2012-12-04 Herz Frederick S M System and method for a distributed application and network security system (SDI-SCAM)
US9503470B2 (en) 2002-12-24 2016-11-22 Fred Herz Patents, LLC Distributed agent based model for security monitoring and response
US7243147B2 (en) * 2002-12-30 2007-07-10 Bellsouth Ip Corporation Systems and methods for the detection and management of network assets
JP2004234378A (en) * 2003-01-30 2004-08-19 Fujitsu Ltd Security management device and security management method
US7627891B2 (en) * 2003-02-14 2009-12-01 Preventsys, Inc. Network audit and policy assurance system
US8561175B2 (en) * 2003-02-14 2013-10-15 Preventsys, Inc. System and method for automated policy audit and remediation management
US7991751B2 (en) * 2003-04-02 2011-08-02 Portauthority Technologies Inc. Method and a system for information identification
US7254815B2 (en) * 2003-04-24 2007-08-07 International Business Machines Corporation Method and apparatus for implementing distributed event management in an embedded support processor computer system
US8065725B2 (en) * 2003-05-30 2011-11-22 Yuliang Zheng Systems and methods for enhanced network security
US8769680B2 (en) * 2003-06-12 2014-07-01 International Business Machines Corporation Alert passwords for detecting password attacks on systems
US7496959B2 (en) * 2003-06-23 2009-02-24 Architecture Technology Corporation Remote collection of computer forensic evidence
US8458805B2 (en) * 2003-06-23 2013-06-04 Architecture Technology Corporation Digital forensic analysis using empirical privilege profiling (EPP) for filtering collected data
US20050005101A1 (en) * 2003-07-03 2005-01-06 Yenduri Bhargava K. Kernel cryptographic module signature verification system and method
US20050033976A1 (en) * 2003-08-04 2005-02-10 Sbc Knowledge Ventures, L.P. Host intrusion detection and isolation
US7565690B2 (en) * 2003-08-04 2009-07-21 At&T Intellectual Property I, L.P. Intrusion detection
US7530103B2 (en) * 2003-08-07 2009-05-05 Microsoft Corporation Projection of trustworthiness from a trusted environment to an untrusted environment
US7457867B2 (en) * 2003-10-15 2008-11-25 Alcatel Lucent Reliable non-repudiable Syslog signing and acknowledgement
US7805762B2 (en) * 2003-10-15 2010-09-28 Cisco Technology, Inc. Method and system for reducing the false alarm rate of network intrusion detection systems
US7581249B2 (en) * 2003-11-14 2009-08-25 Enterasys Networks, Inc. Distributed intrusion response system
US7647631B2 (en) * 2003-12-10 2010-01-12 Hewlett-Packard Development Company Automated user interaction in application assessment
US7533407B2 (en) 2003-12-16 2009-05-12 Microsoft Corporation System and methods for providing network quarantine
US20070197877A1 (en) * 2004-01-05 2007-08-23 Stefaan Decorte Behavior Based Multi-Agent Systems As Data Types
US20050229250A1 (en) * 2004-02-26 2005-10-13 Ring Sandra E Methodology, system, computer readable medium, and product providing a security software suite for handling operating system exploitations
US8201257B1 (en) 2004-03-31 2012-06-12 Mcafee, Inc. System and method of managing network security risks
US8566946B1 (en) * 2006-04-20 2013-10-22 Fireeye, Inc. Malware containment on connection
US20050267954A1 (en) * 2004-04-27 2005-12-01 Microsoft Corporation System and methods for providing network quarantine
WO2005114541A2 (en) * 2004-05-19 2005-12-01 Computer Associates Think, Inc. Systems and methods for minimizing security logs
US8074277B2 (en) * 2004-06-07 2011-12-06 Check Point Software Technologies, Inc. System and methodology for intrusion detection and prevention
US7930742B2 (en) * 2004-06-14 2011-04-19 Lionic Corporation Multiple-level data processing system
US7581248B2 (en) * 2004-06-28 2009-08-25 International Business Machines Corporation Federated identity brokering
US7748040B2 (en) * 2004-07-12 2010-06-29 Architecture Technology Corporation Attack correlation using marked information
SG119237A1 (en) * 2004-07-30 2006-02-28 E Cop Net Pte Ltd An intrusion protection system and method
US7661135B2 (en) * 2004-08-10 2010-02-09 International Business Machines Corporation Apparatus, system, and method for gathering trace data indicative of resource activity
CN100372301C (en) * 2004-09-16 2008-02-27 华为技术有限公司 Method for transmitting warning data in network
US20060085850A1 (en) * 2004-10-14 2006-04-20 Microsoft Corporation System and methods for providing network quarantine using IPsec
US7516480B2 (en) * 2004-10-22 2009-04-07 Microsoft Corporation Secure remote configuration of targeted devices using a standard message transport protocol
JP4522413B2 (en) * 2004-11-12 2010-08-11 富士通株式会社 Resource management program, resource management method, and resource management apparatus
KR100628317B1 (en) * 2004-12-03 2006-09-27 한국전자통신연구원 Apparatus for detecting attacks toward network and method thereof
US7593930B2 (en) * 2004-12-14 2009-09-22 Sap Ag Fast channel architecture
US7600217B2 (en) 2004-12-14 2009-10-06 Sap Ag Socket-like communication API for Java
US7580915B2 (en) * 2004-12-14 2009-08-25 Sap Ag Socket-like communication API for C
US7917629B2 (en) * 2004-12-29 2011-03-29 Sap Ag Interface for external system management
US7591006B2 (en) * 2004-12-29 2009-09-15 Sap Ag Security for external system management
US8024743B2 (en) * 2004-12-30 2011-09-20 Sap Ag Connection of clients for management of systems
US7593917B2 (en) 2004-12-30 2009-09-22 Sap Ag Implementation of application management operations
US7310669B2 (en) * 2005-01-19 2007-12-18 Lockdown Networks, Inc. Network appliance for vulnerability assessment auditing over multiple networks
US20060185018A1 (en) * 2005-02-17 2006-08-17 Microsoft Corporation Systems and methods for shielding an identified vulnerability
CN100446510C (en) * 2005-02-23 2008-12-24 华为技术有限公司 System and method for implementing business integrating between interprises
US20060191007A1 (en) * 2005-02-24 2006-08-24 Sanjiva Thielamay Security force automation
US7757288B1 (en) * 2005-05-23 2010-07-13 Symantec Corporation Malicious e-mail attack inversion filter
US8201253B1 (en) * 2005-07-15 2012-06-12 Microsoft Corporation Performing security functions when a process is created
US7874001B2 (en) * 2005-07-15 2011-01-18 Microsoft Corporation Detecting user-mode rootkits
CA2614887A1 (en) * 2005-07-25 2007-02-01 Toyo Ink Mfg. Co., Ltd. Active energy beam-curable ink for injet printing
US8417949B2 (en) * 2005-10-31 2013-04-09 Microsoft Corporation Total exchange session security
US7526677B2 (en) * 2005-10-31 2009-04-28 Microsoft Corporation Fragility handling
US7665136B1 (en) * 2005-11-09 2010-02-16 Symantec Corporation Method and apparatus for detecting hidden network communication channels of rootkit tools
US20070110244A1 (en) * 2005-11-16 2007-05-17 Kapil Sood Method, apparatus and system for enabling a secure wireless platform
US7827545B2 (en) * 2005-12-15 2010-11-02 Microsoft Corporation Dynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy
US8516573B1 (en) * 2005-12-22 2013-08-20 At&T Intellectual Property Ii, L.P. Method and apparatus for port scan detection in a network
US8099495B2 (en) * 2005-12-29 2012-01-17 Intel Corporation Method, apparatus and system for platform identity binding in a network node
CN100391165C (en) * 2006-01-13 2008-05-28 华为技术有限公司 Method, system, network management server and customer terminal for obtaining warning static interpreter information
CN100391166C (en) * 2006-01-13 2008-05-28 华为技术有限公司 Method, system, network management server and customer terminal for obtaining warning static interpreter information
US20070198525A1 (en) * 2006-02-13 2007-08-23 Microsoft Corporation Computer system with update-based quarantine
US7712137B2 (en) * 2006-02-27 2010-05-04 Microsoft Corporation Configuring and organizing server security information
US7581141B2 (en) * 2006-03-01 2009-08-25 Sun Microsystems, Inc. Kernel module compatibility validation
US7975298B1 (en) * 2006-03-29 2011-07-05 Mcafee, Inc. System, method and computer program product for remote rootkit detection
US8205238B2 (en) * 2006-03-30 2012-06-19 Intel Corporation Platform posture and policy information exchange method and apparatus
US7793096B2 (en) * 2006-03-31 2010-09-07 Microsoft Corporation Network access protection
US20070237088A1 (en) * 2006-04-05 2007-10-11 Honeywell International. Inc Apparatus and method for providing network security
US8260939B2 (en) * 2006-04-28 2012-09-04 Kyocera Corporation System and method for scheduling wireless channel resources
US7739082B2 (en) * 2006-06-08 2010-06-15 Battelle Memorial Institute System and method for anomaly detection
US9015828B2 (en) * 2006-06-09 2015-04-21 Board of Regents, a Body Corporate of the State of Arizona, Acting for and on Behalf of The University of Arizona Method and system for autonomous control and protection of computer systems
US8775521B2 (en) * 2006-06-30 2014-07-08 At&T Intellectual Property Ii, L.P. Method and apparatus for detecting zombie-generated spam
US20080120699A1 (en) * 2006-11-17 2008-05-22 Mcafee, Inc. Method and system for assessing and mitigating access control to a managed network
US8099786B2 (en) * 2006-12-29 2012-01-17 Intel Corporation Embedded mechanism for platform vulnerability assessment
US20080184341A1 (en) * 2007-01-29 2008-07-31 David Jaroslav Sebesta Master-Slave Protocol for Security Devices
US8151118B2 (en) * 2007-01-29 2012-04-03 Microsoft Corporation Master-slave security devices
US7899882B2 (en) * 2007-03-29 2011-03-01 Agile Risk Management Llc System and method for providing remote forensics capability
US8533821B2 (en) * 2007-05-25 2013-09-10 International Business Machines Corporation Detecting and defending against man-in-the-middle attacks
JP4907603B2 (en) * 2007-06-27 2012-04-04 ヒューレット−パッカード デベロップメント カンパニー エル.ピー. Access control system and access control method
US9225684B2 (en) 2007-10-29 2015-12-29 Microsoft Technology Licensing, Llc Controlling network access
US8280905B2 (en) * 2007-12-21 2012-10-02 Georgetown University Automated forensic document signatures
US8312023B2 (en) * 2007-12-21 2012-11-13 Georgetown University Automated forensic document signatures
US9106630B2 (en) * 2008-02-01 2015-08-11 Mandiant, Llc Method and system for collaboration during an event
US9076342B2 (en) 2008-02-19 2015-07-07 Architecture Technology Corporation Automated execution and evaluation of network-based training exercises
US8103853B2 (en) * 2008-03-05 2012-01-24 The Boeing Company Intelligent fabric system on a chip
US8170965B2 (en) * 2008-03-12 2012-05-01 Fabian Matthew Mihelic Method for governing the operation of a generalist agent within a complex multi-agent adaptive system
JP5130997B2 (en) * 2008-03-31 2013-01-30 日本電気株式会社 Distributed resource management system, distributed resource management method, and distributed resource management program
US9355117B1 (en) * 2008-03-31 2016-05-31 Veritas Us Ip Holdings Llc Techniques for backing up replicated data
US20090254970A1 (en) * 2008-04-04 2009-10-08 Avaya Inc. Multi-tier security event correlation and mitigation
US9009796B2 (en) 2010-11-18 2015-04-14 The Boeing Company Spot beam based authentication
US8391834B2 (en) 2009-01-28 2013-03-05 Headwater Partners I Llc Security techniques for device assisted services
US8898293B2 (en) 2009-01-28 2014-11-25 Headwater Partners I Llc Service offer set publishing to device agent with on-device service selection
US8346225B2 (en) 2009-01-28 2013-01-01 Headwater Partners I, Llc Quality of service for device assisted services
US8275830B2 (en) 2009-01-28 2012-09-25 Headwater Partners I Llc Device assisted CDR creation, aggregation, mediation and billing
US8589541B2 (en) 2009-01-28 2013-11-19 Headwater Partners I Llc Device-assisted services for protecting network capacity
US8250207B2 (en) 2009-01-28 2012-08-21 Headwater Partners I, Llc Network based ambient services
US8832777B2 (en) 2009-03-02 2014-09-09 Headwater Partners I Llc Adapting network policies based on device service processor configuration
US8402111B2 (en) 2009-01-28 2013-03-19 Headwater Partners I, Llc Device assisted services install
US8406748B2 (en) 2009-01-28 2013-03-26 Headwater Partners I Llc Adaptive ambient services
US8635335B2 (en) 2009-01-28 2014-01-21 Headwater Partners I Llc System and method for wireless network offloading
US8924543B2 (en) 2009-01-28 2014-12-30 Headwater Partners I Llc Service design center for device assisted services
US8340634B2 (en) 2009-01-28 2012-12-25 Headwater Partners I, Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US8924469B2 (en) 2008-06-05 2014-12-30 Headwater Partners I Llc Enterprise access control and accounting allocation for access networks
US8548428B2 (en) 2009-01-28 2013-10-01 Headwater Partners I Llc Device group partitions and settlement platform
US8725123B2 (en) 2008-06-05 2014-05-13 Headwater Partners I Llc Communications device with secure data path processing agents
US8626115B2 (en) 2009-01-28 2014-01-07 Headwater Partners I Llc Wireless network service interfaces
US8204180B1 (en) * 2008-08-08 2012-06-19 Intervoice Limited Partnership Systems and methods for preventing sensitive information from being communicated into a non-secure environment
ES2556271T3 (en) * 2008-08-22 2016-01-14 Qualcomm Incorporated Procedure and apparatus for transmitting and receiving protected data and unprotected data
US8391882B2 (en) * 2008-10-22 2013-03-05 Qualcomm Incorporated Method and system for interference management in a spectrum shared by WAN and femto cells
US20100153550A1 (en) * 2008-12-15 2010-06-17 Broadcom Corporation Pluggable device that enables an addition of security functionality in a network
US10841839B2 (en) 2009-01-28 2020-11-17 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US9565707B2 (en) 2009-01-28 2017-02-07 Headwater Partners I Llc Wireless end-user device with wireless data attribution to multiple personas
US9858559B2 (en) 2009-01-28 2018-01-02 Headwater Research Llc Network service plan design
US9253663B2 (en) 2009-01-28 2016-02-02 Headwater Partners I Llc Controlling mobile device communications on a roaming network based on device state
US9557889B2 (en) 2009-01-28 2017-01-31 Headwater Partners I Llc Service plan design, user interfaces, application programming interfaces, and device management
US10326800B2 (en) 2009-01-28 2019-06-18 Headwater Research Llc Wireless network service interfaces
US10237757B2 (en) 2009-01-28 2019-03-19 Headwater Research Llc System and method for wireless network offloading
US9755842B2 (en) 2009-01-28 2017-09-05 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US8893009B2 (en) 2009-01-28 2014-11-18 Headwater Partners I Llc End user device that secures an association of application to service policy with an application certificate check
US9954975B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Enhanced curfew and protection associated with a device group
US8351898B2 (en) 2009-01-28 2013-01-08 Headwater Partners I Llc Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account
US10064055B2 (en) 2009-01-28 2018-08-28 Headwater Research Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US9351193B2 (en) 2009-01-28 2016-05-24 Headwater Partners I Llc Intermediate networking devices
US10484858B2 (en) 2009-01-28 2019-11-19 Headwater Research Llc Enhanced roaming services and converged carrier networks with device assisted services and a proxy
US9706061B2 (en) 2009-01-28 2017-07-11 Headwater Partners I Llc Service design center for device assisted services
US10248996B2 (en) 2009-01-28 2019-04-02 Headwater Research Llc Method for operating a wireless end-user device mobile payment agent
US9647918B2 (en) 2009-01-28 2017-05-09 Headwater Research Llc Mobile device and method attributing media services network usage to requesting application
US10715342B2 (en) 2009-01-28 2020-07-14 Headwater Research Llc Managing service user discovery and service launch object placement on a device
US10200541B2 (en) 2009-01-28 2019-02-05 Headwater Research Llc Wireless end-user device with divided user space/kernel space traffic policy system
US9270559B2 (en) 2009-01-28 2016-02-23 Headwater Partners I Llc Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow
US9578182B2 (en) 2009-01-28 2017-02-21 Headwater Partners I Llc Mobile device and service management
US10783581B2 (en) 2009-01-28 2020-09-22 Headwater Research Llc Wireless end-user device providing ambient or sponsored services
US10057775B2 (en) 2009-01-28 2018-08-21 Headwater Research Llc Virtualized policy and charging system
US9392462B2 (en) 2009-01-28 2016-07-12 Headwater Partners I Llc Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy
US9571559B2 (en) 2009-01-28 2017-02-14 Headwater Partners I Llc Enhanced curfew and protection associated with a device group
US8793758B2 (en) 2009-01-28 2014-07-29 Headwater Partners I Llc Security, fraud detection, and fraud mitigation in device-assisted services systems
US10798252B2 (en) 2009-01-28 2020-10-06 Headwater Research Llc System and method for providing user notifications
US10492102B2 (en) 2009-01-28 2019-11-26 Headwater Research Llc Intermediate networking devices
US9572019B2 (en) 2009-01-28 2017-02-14 Headwater Partners LLC Service selection set published to device agent with on-device service selection
US11218854B2 (en) 2009-01-28 2022-01-04 Headwater Research Llc Service plan design, user interfaces, application programming interfaces, and device management
US9955332B2 (en) 2009-01-28 2018-04-24 Headwater Research Llc Method for child wireless device activation to subscriber account of a master wireless device
US8745191B2 (en) 2009-01-28 2014-06-03 Headwater Partners I Llc System and method for providing user notifications
US9980146B2 (en) 2009-01-28 2018-05-22 Headwater Research Llc Communications device with secure data path processing agents
US8606911B2 (en) 2009-03-02 2013-12-10 Headwater Partners I Llc Flow tagging for service policy implementation
US10264138B2 (en) 2009-01-28 2019-04-16 Headwater Research Llc Mobile device and service management
US10779177B2 (en) 2009-01-28 2020-09-15 Headwater Research Llc Device group partitions and settlement platform
US20100205014A1 (en) * 2009-02-06 2010-08-12 Cary Sholer Method and system for providing response services
US20100269162A1 (en) 2009-04-15 2010-10-21 Jose Bravo Website authentication
US20100299430A1 (en) * 2009-05-22 2010-11-25 Architecture Technology Corporation Automated acquisition of volatile forensic evidence from network devices
US8752142B2 (en) * 2009-07-17 2014-06-10 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback
KR100942456B1 (en) * 2009-07-23 2010-02-12 주식회사 안철수연구소 Method for detecting and protecting ddos attack by using cloud computing and server thereof
US8713584B2 (en) 2009-08-13 2014-04-29 Google Inc. Event-triggered server-side macros
US20110040824A1 (en) * 2009-08-13 2011-02-17 Google Inc. Shared Server-Side Macros
US9536109B2 (en) * 2009-10-21 2017-01-03 International Business Machines Corporation Method and system for administering a secure data repository
US8683609B2 (en) * 2009-12-04 2014-03-25 International Business Machines Corporation Mobile phone and IP address correlation service
US8621636B2 (en) 2009-12-17 2013-12-31 American Express Travel Related Services Company, Inc. Systems, methods, and computer program products for collecting and reporting sensor data in a communication network
US9756076B2 (en) * 2009-12-17 2017-09-05 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transactions
US8650129B2 (en) 2010-01-20 2014-02-11 American Express Travel Related Services Company, Inc. Dynamically reacting policies and protections for securing mobile financial transaction data in transit
US8689058B2 (en) * 2010-03-26 2014-04-01 Microsoft Corporation Centralized service outage communication
CN102291248A (en) * 2010-06-18 2011-12-21 中兴通讯股份有限公司 Method and device for realizing self recovery of system
CN101860546A (en) * 2010-06-18 2010-10-13 杭州电子科技大学 Method for improving SSL handshake protocol
US8924296B2 (en) 2010-06-22 2014-12-30 American Express Travel Related Services Company, Inc. Dynamic pairing system for securing a trusted communication channel
US10360625B2 (en) 2010-06-22 2019-07-23 American Express Travel Related Services Company, Inc. Dynamically adaptive policy management for securing mobile financial transactions
US8850539B2 (en) 2010-06-22 2014-09-30 American Express Travel Related Services Company, Inc. Adaptive policies and protections for securing financial transaction data at rest
US9215244B2 (en) * 2010-11-18 2015-12-15 The Boeing Company Context aware network security monitoring for threat detection
CN102034058B (en) * 2010-11-25 2013-08-21 中国联合网络通信集团有限公司 Method for controlling safety of application software and terminal
US9063819B2 (en) 2011-01-02 2015-06-23 Cisco Technology, Inc. Extensible patch management
US10057298B2 (en) 2011-02-10 2018-08-21 Architecture Technology Corporation Configurable investigative tool
US10067787B2 (en) 2011-02-10 2018-09-04 Architecture Technology Corporation Configurable forensic investigative tool
US9154826B2 (en) 2011-04-06 2015-10-06 Headwater Partners Ii Llc Distributing content and service launch objects to mobile devices
US8838988B2 (en) 2011-04-12 2014-09-16 International Business Machines Corporation Verification of transactional integrity
CN102790690B (en) * 2011-05-18 2017-09-12 中兴通讯股份有限公司 A kind of distributed business network management method and system
US20130096980A1 (en) * 2011-10-18 2013-04-18 Mcafee, Inc. User-defined countermeasures
US9529635B2 (en) 2011-10-24 2016-12-27 Plumchoice, Inc. Systems and methods for configuring and launching automated services to a remote device
US9317672B2 (en) 2011-12-14 2016-04-19 Visa International Service Association Online account access control by mobile device
US9037630B2 (en) 2012-02-21 2015-05-19 Matthew Martin Shannon Systems and methods for provisioning digital forensics services remotely over public and private networks
AP2014007920A0 (en) 2012-02-22 2014-09-30 Visa Int Service Ass Data security system using mobile communications device
US8917826B2 (en) 2012-07-31 2014-12-23 International Business Machines Corporation Detecting man-in-the-middle attacks in electronic transactions using prompts
US9392003B2 (en) 2012-08-23 2016-07-12 Raytheon Foreground Security, Inc. Internet security cyber threat reporting system and method
US9485276B2 (en) 2012-09-28 2016-11-01 Juniper Networks, Inc. Dynamic service handling using a honeypot
CN103036959B (en) * 2012-12-07 2015-12-02 武汉邮电科学研究院 Based on implementation method and the system of the distributed deployment application program of IO decoupling zero
US9398109B2 (en) * 2012-12-21 2016-07-19 Software Ag System, messaging broker and method for managing communication between open services gateway initiative (OSGI) environments
CN103076792B (en) * 2013-01-23 2016-05-18 中禹环境工程(北京)有限公司 Perception transmission equipment administrating system
WO2014159862A1 (en) 2013-03-14 2014-10-02 Headwater Partners I Llc Automated credential porting for mobile devices
US9148418B2 (en) 2013-05-10 2015-09-29 Matthew Martin Shannon Systems and methods for remote access to computer data over public and private networks via a software switch
US20140359694A1 (en) * 2013-06-03 2014-12-04 eSentire, Inc. System and method for computer system security
US9912690B2 (en) * 2014-04-08 2018-03-06 Capital One Financial Corporation System and method for malware detection using hashing techniques
US10257017B2 (en) * 2014-06-03 2019-04-09 JumpCloud, Inc. Autonomous server agents
US9442803B2 (en) * 2014-06-24 2016-09-13 International Business Machines Corporation Method and system of distributed backup for computer devices in a network
US20160116893A1 (en) * 2014-10-24 2016-04-28 Ronald Lance Justin Autonomous control systems and methods
US9639434B2 (en) 2015-02-26 2017-05-02 Dell Products, L.P. Auto-didacted hierarchical failure recovery for remote access controllers
US9619649B1 (en) 2015-03-13 2017-04-11 Symantec Corporation Systems and methods for detecting potentially malicious applications
US10116688B1 (en) 2015-03-24 2018-10-30 Symantec Corporation Systems and methods for detecting potentially malicious files
US9798878B1 (en) * 2015-03-31 2017-10-24 Symantec Corporation Systems and methods for detecting text display manipulation attacks
CN104702627B (en) * 2015-04-01 2017-12-26 南京天溯自动化控制系统有限公司 A kind of synchronous concurrent communication method and system based on message classification
US10803766B1 (en) 2015-07-28 2020-10-13 Architecture Technology Corporation Modular training of network-based training exercises
US10083624B2 (en) 2015-07-28 2018-09-25 Architecture Technology Corporation Real-time monitoring of network-based training exercises
KR20170060598A (en) * 2015-11-24 2017-06-01 삼성전자주식회사 Smart home service server, and control method for the same
CN105573756B (en) * 2015-12-15 2018-11-30 金蝶软件(中国)有限公司 A kind of script language extensions method and event bus framework
CN113138869A (en) * 2016-01-15 2021-07-20 创新先进技术有限公司 Remote calling method and device
CN105763360A (en) * 2016-01-20 2016-07-13 上海学登信息科技有限公司 Linux-based network early warning system and network early warning method
US10650046B2 (en) 2016-02-05 2020-05-12 Sas Institute Inc. Many task computing with distributed file system
US10795935B2 (en) 2016-02-05 2020-10-06 Sas Institute Inc. Automated generation of job flow definitions
US10642896B2 (en) 2016-02-05 2020-05-05 Sas Institute Inc. Handling of data sets during execution of task routines of multiple languages
US10404822B2 (en) * 2016-04-29 2019-09-03 Cisco Technology, Inc. Predictive rollup and caching for application performance data
US10831893B2 (en) * 2016-07-14 2020-11-10 Mcafee, Llc Mitigation of ransomware
US10140844B2 (en) * 2016-08-10 2018-11-27 Honeywell International Inc. Smart device distributed security system
US10484382B2 (en) 2016-08-31 2019-11-19 Oracle International Corporation Data management for a multi-tenant identity cloud service
US10242187B1 (en) * 2016-09-14 2019-03-26 Symantec Corporation Systems and methods for providing integrated security management
US10846390B2 (en) 2016-09-14 2020-11-24 Oracle International Corporation Single sign-on functionality for a multi-tenant identity and data security management cloud service
US10511589B2 (en) 2016-09-14 2019-12-17 Oracle International Corporation Single logout functionality for a multi-tenant identity and data security management cloud service
US10594684B2 (en) 2016-09-14 2020-03-17 Oracle International Corporation Generating derived credentials for a multi-tenant identity cloud service
US10445395B2 (en) 2016-09-16 2019-10-15 Oracle International Corporation Cookie based state propagation for a multi-tenant identity cloud service
US10484243B2 (en) 2016-09-16 2019-11-19 Oracle International Corporation Application management for a multi-tenant identity cloud service
EP3513542B1 (en) 2016-09-16 2021-05-19 Oracle International Corporation Tenant and service management for a multi-tenant identity and data security management cloud service
US10904074B2 (en) * 2016-09-17 2021-01-26 Oracle International Corporation Composite event handler for a multi-tenant identity cloud service
CN106547670A (en) * 2016-10-10 2017-03-29 许昌许继软件技术有限公司 The method and device of long-range reading and writing built-in Linux application program memory variable value
USD898059S1 (en) 2017-02-06 2020-10-06 Sas Institute Inc. Display screen or portion thereof with graphical user interface
USD898060S1 (en) 2017-06-05 2020-10-06 Sas Institute Inc. Display screen or portion thereof with graphical user interface
US10831789B2 (en) 2017-09-27 2020-11-10 Oracle International Corporation Reference attribute query processing for a multi-tenant cloud service
US10705823B2 (en) 2017-09-29 2020-07-07 Oracle International Corporation Application templates and upgrade framework for a multi-tenant identity cloud service
US10503498B2 (en) 2017-11-16 2019-12-10 Sas Institute Inc. Scalable cloud-based time series analysis
US11050780B2 (en) * 2017-12-06 2021-06-29 International Business Machines Corporation Methods and systems for managing security in computing networks
US10715564B2 (en) 2018-01-29 2020-07-14 Oracle International Corporation Dynamic client registration for an identity cloud service
US11277421B2 (en) * 2018-02-20 2022-03-15 Citrix Systems, Inc. Systems and methods for detecting and thwarting attacks on an IT environment
US10642668B2 (en) * 2018-04-18 2020-05-05 Open Text GXS ULC Producer-side prioritization of message processing
US10817604B1 (en) 2018-06-19 2020-10-27 Architecture Technology Corporation Systems and methods for processing source codes to detect non-malicious faults
US10749890B1 (en) 2018-06-19 2020-08-18 Architecture Technology Corporation Systems and methods for improving the ranking and prioritization of attack-related events
US11055128B2 (en) 2018-07-30 2021-07-06 Open Text GXS ULC System and method for request isolation
US11321187B2 (en) 2018-10-19 2022-05-03 Oracle International Corporation Assured lazy rollback for a multi-tenant identity cloud service
CN109684877A (en) * 2018-12-12 2019-04-26 深圳互联先锋科技有限公司 Monitoring method, device and the computer readable storage medium of data integrity
US11429713B1 (en) 2019-01-24 2022-08-30 Architecture Technology Corporation Artificial intelligence modeling for cyber-attack simulation protocols
US11128654B1 (en) 2019-02-04 2021-09-21 Architecture Technology Corporation Systems and methods for unified hierarchical cybersecurity
US11423111B2 (en) 2019-02-25 2022-08-23 Oracle International Corporation Client API for rest based endpoints for a multi-tenant identify cloud service
US11792226B2 (en) 2019-02-25 2023-10-17 Oracle International Corporation Automatic api document generation from scim metadata
US11887505B1 (en) 2019-04-24 2024-01-30 Architecture Technology Corporation System for deploying and monitoring network-based training exercises
US11403405B1 (en) 2019-06-27 2022-08-02 Architecture Technology Corporation Portable vulnerability identification tool for embedded non-IP devices
US11870770B2 (en) 2019-09-13 2024-01-09 Oracle International Corporation Multi-tenant identity cloud service with on-premise authentication integration
US11687378B2 (en) 2019-09-13 2023-06-27 Oracle International Corporation Multi-tenant identity cloud service with on-premise authentication integration and bridge high availability
US11444974B1 (en) 2019-10-23 2022-09-13 Architecture Technology Corporation Systems and methods for cyber-physical threat modeling
US11503075B1 (en) 2020-01-14 2022-11-15 Architecture Technology Corporation Systems and methods for continuous compliance of nodes
CN112351016B (en) * 2020-10-28 2022-09-06 河南信大网御科技有限公司 One-to-many telnet remote communication method, mimicry defense architecture and medium
US11363048B1 (en) 2021-03-25 2022-06-14 Bank Of America Corporation Information security system and method for security threat detection in data transmission
CN113448562B (en) * 2021-03-31 2023-10-20 北京新氧科技有限公司 Automatic logic code generation method and device and electronic equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6311274B1 (en) * 1997-12-15 2001-10-30 Intel Corporation Network alert handling system and method
US6088804A (en) * 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US6408391B1 (en) 1998-05-06 2002-06-18 Prc Inc. Dynamic system defense for information warfare
WO2003029934A1 (en) 2001-09-28 2003-04-10 British Telecommunications Public Limited Company Agent-based intrusion detection system

Also Published As

Publication number Publication date
DE60230601D1 (en) 2009-02-12
US7058968B2 (en) 2006-06-06
ATE419574T1 (en) 2009-01-15
CN1295904C (en) 2007-01-17
CN1524361A (en) 2004-08-25
CA2434674C (en) 2010-06-08
US20020129264A1 (en) 2002-09-12
EP1381928B1 (en) 2008-12-31
AU2002239889B2 (en) 2008-01-31
EP1381928A4 (en) 2004-12-15
EP1381928A2 (en) 2004-01-21
WO2002056152A3 (en) 2003-11-06
WO2002056152A2 (en) 2002-07-18

Similar Documents

Publication Publication Date Title
CA2434674A1 (en) Computer security and management system
US11469976B2 (en) System and method for cloud-based control-plane event monitor
CN108369625B (en) Dual memory introspection for protecting multiple network endpoints
AU2002239889A1 (en) Computer security and management system
US20240054234A1 (en) Methods and systems for hardware and firmware security monitoring
US20200327236A1 (en) Using a Threat Model to Monitor Host Execution in a Virtualized Environment
US8478860B2 (en) Device detection system for monitoring use of removable media in networked computers
EP1435030B1 (en) Stateful reference monitor
US7836174B2 (en) Systems and methods for grid-based data scanning
WO2022193513A1 (en) Docker-based data processing method and related device
JP2017508220A (en) Guaranteed integrity and rebootless updates during runtime
KR20040101490A (en) Detecting and countering malicious code in enterprise networks
US7908658B1 (en) System using IM screener in a client computer to monitor bad reputation web sites in outgoing messages to prevent propagation of IM attacks
EP2946327A1 (en) Systems and methods for identifying and reporting application and file vulnerabilities
KR20070065306A (en) End user risk managemet
WO2002097587A2 (en) Method and system for implementing security devices in a network
Kelbert et al. Data usage control for distributed systems
EP1944676B1 (en) Stateful reference monitor
Karygiannis Network Security Testing Using Mobile Agents.
US20230418933A1 (en) Systems and methods for folder and file sequestration
WO2017019551A1 (en) Systems and methods for providing multi-level network security
ÇELİKTAŞ ISTANBUL TECHNICAL UNIVERSITY★ INFORMATICS INSTITUTE
Corsava et al. Autonomous agents-based security infrastructure
Stames Integrity assessment tools: fundamental protection for business critical systems, data and applications

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20180110