CA2434674A1 - Computer security and management system - Google Patents
Computer security and management system Download PDFInfo
- Publication number
- CA2434674A1 CA2434674A1 CA002434674A CA2434674A CA2434674A1 CA 2434674 A1 CA2434674 A1 CA 2434674A1 CA 002434674 A CA002434674 A CA 002434674A CA 2434674 A CA2434674 A CA 2434674A CA 2434674 A1 CA2434674 A1 CA 2434674A1
- Authority
- CA
- Canada
- Prior art keywords
- handler
- agent
- action
- signature
- mobile autonomous
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Abstract
The present invention provides a generic distributed command, control, and communication framework that allows computer systems, devices, and operation al personnel to interact with the network as a unified entity. The present invention provides these services by building upon a core communication architecture that permits local or remote execution of mobile program code, static execution of program code, flexible communication formats, self-heali ng network techniques, and expansion by the addition of new system modules, software handlers, or mobile autonomous agents.
Claims (49)
1. A computer implemented method for providing system security and resource management, comprising:
managing event messages by a master control processor between system handlers according to security system policies;
processing network messages by a network handler between client and server computers;
inserting native and third party event messages received by an insertion handler into the master control processor for processing by other system handlers;
detecting and processing event message signatures by the signature handler from alarm, system, and insertion events for conversion into system alarm messages for action by the other system handlers; and performing actions by an action handler in response to action requests from the master control processor.
managing event messages by a master control processor between system handlers according to security system policies;
processing network messages by a network handler between client and server computers;
inserting native and third party event messages received by an insertion handler into the master control processor for processing by other system handlers;
detecting and processing event message signatures by the signature handler from alarm, system, and insertion events for conversion into system alarm messages for action by the other system handlers; and performing actions by an action handler in response to action requests from the master control processor.
2. The method according to claim 1, further comprising maintaining an execution environment by an agent handler for mobile autonomous code modules.
3. The method according to claim 1, further comprising collecting and logging event messages by a logging handler.
4. The method according to claim 1, further comprising managing system configuration parameters by a configuration handler.
5. The method according to claim 1, wherein the step of managing event messages comprises:
registering the system handlers;
passing event messages between system handlers; and managing a event queues attached to the system handlers.
registering the system handlers;
passing event messages between system handlers; and managing a event queues attached to the system handlers.
6. The method according to claim 5, wherein the step of registering each system handler comprises:
reading the handler module to determine initialization requirement;
initializing the handler application programming interface;
determining if the handler is to run as a remote procedure call;
making the handler available through the remote procedure call interface if run as a remote procedure call; and initializing the handler input/output queues if not run as a remote procedure call.
reading the handler module to determine initialization requirement;
initializing the handler application programming interface;
determining if the handler is to run as a remote procedure call;
making the handler available through the remote procedure call interface if run as a remote procedure call; and initializing the handler input/output queues if not run as a remote procedure call.
7. The method according to claim 1, wherein the system handlers comprise static and dynamic system processes.
8. The method according to claim 1, further comprising;
initiating the system handlers by internal mechanisms;
initiating the system handlers by external mechanisms; and initiating the system handlers from the master control processor.
initiating the system handlers by internal mechanisms;
initiating the system handlers by external mechanisms; and initiating the system handlers from the master control processor.
9. The method according to claim 1, wherein the system handlers have a reversible architecture to enable the system handlers to be used in either a client or server computer mode.
10. The method according to claim 1, wherein the step of processing network messages by the network handler comprises:
allowing connection only from clients and servers defined in a access control list;
authenticating protocols with clients and servers;
compressing data to minimize bandwidth requirements; and encrypting data to provide secure communication.
allowing connection only from clients and servers defined in a access control list;
authenticating protocols with clients and servers;
compressing data to minimize bandwidth requirements; and encrypting data to provide secure communication.
11. The method according to claim 1, wherein the step of inserting native and third party event messages received by the insertion handler from external programs comprises:
reading and writing messages using an insertion method selected from the group consisting of file descriptor, network sockets and named pipe;
using a native insertion mode library to directly insert messages into the master control processor; and using an external insertion mode library linked to a third party sources to directly insert messages into the master control processor.
reading and writing messages using an insertion method selected from the group consisting of file descriptor, network sockets and named pipe;
using a native insertion mode library to directly insert messages into the master control processor; and using an external insertion mode library linked to a third party sources to directly insert messages into the master control processor.
12. The method according to claim 1, wherein the step of detecting and processing event messages received by the signature handler comprises:
accepting alarm events from the master control processor;
decoding the alarm type and originator from the alarm event;
consulting internal signature registry for alarms of the type accepted;
handing the alarm message off to the signature module for processing;
extracting alarm data macro information;
determining if an alarm has occurred;
consulting the action policy if an alarm has occurred to determine response;
and passing the resulting response message to the master control processor for action by the other system handlers.
accepting alarm events from the master control processor;
decoding the alarm type and originator from the alarm event;
consulting internal signature registry for alarms of the type accepted;
handing the alarm message off to the signature module for processing;
extracting alarm data macro information;
determining if an alarm has occurred;
consulting the action policy if an alarm has occurred to determine response;
and passing the resulting response message to the master control processor for action by the other system handlers.
13. The method according to claim 1, wherein the action performed by the action handler is selected from the group consisting of blocking a host with a modified route command, blocking a host with a packet filter modification command, disabling a user account, disabling a network interface, running an external user-defined command, logging an event, sending email or pager alerts, sending on-screen alerts to users or administrators, requesting server executed action, and a pluggable action defined by a user.
14. The method according to claim 1, wherein the steps of detecting and processing event messages received by the signature handler and performing actions by the action handler comprises the steps of:
receiving an event message containing a signature by the signature handler from the master control processor;
detecting an attack by the signature handler from the event message signature;
consulting action policy by the signature handler;
determining action to be taken by the signature handler;
ending the process if no action is required;
determining required action parameters by the signature handler if action is required;
sending an action request to the action handler by the signature handler via the master control processor;
processing and executing the action request by the action handler; and returning status of the executed action to the signature handler.
receiving an event message containing a signature by the signature handler from the master control processor;
detecting an attack by the signature handler from the event message signature;
consulting action policy by the signature handler;
determining action to be taken by the signature handler;
ending the process if no action is required;
determining required action parameters by the signature handler if action is required;
sending an action request to the action handler by the signature handler via the master control processor;
processing and executing the action request by the action handler; and returning status of the executed action to the signature handler.
15. The method according to claim 2, wherein the step of maintaining an execution environment by the agent handler for mobile autonomous code modules comprises:
ensuring that the mobile autonomous code modules carry appropriate credentials, are authenticated and cryptographically signed by a trusted introducer, and able to execute on the host operating system;
distributing mobile autonomous code modules to one or more client computers;
executing the mobile autonomous code modules without interference;
allowing the mobile autonomous code modules to collect and report its results;
and shutting down the mobile autonomous code modules.
ensuring that the mobile autonomous code modules carry appropriate credentials, are authenticated and cryptographically signed by a trusted introducer, and able to execute on the host operating system;
distributing mobile autonomous code modules to one or more client computers;
executing the mobile autonomous code modules without interference;
allowing the mobile autonomous code modules to collect and report its results;
and shutting down the mobile autonomous code modules.
16. The method according to claim 15, wherein the step of executing the mobile autonomous code modules comprises:
verifying detected alarms;
reducing false alarm rates; and providing immediate response.
verifying detected alarms;
reducing false alarm rates; and providing immediate response.
17. The method according to claim 15, wherein the step of executing the mobile autonomous code modules comprises the steps of actively looking for problems and identifying attackers when problems are detected.
18. The method according to claim 15, wherein the step of executing the mobile autonomous code modules comprises performing security and system administration tasks in self healing network environments.
19. The method according to claim 15, wherein the step of executing the mobile autonomous code modules comprises allowing self healing components of the system to move between clients and operate independently where required.
20. The method according to claim 2, wherein the step of maintaining an execution environment by the agent handler for mobile autonomous code modules comprises:
enabling self healing and adaptive networks;
facilitating distribution of updates for the mobile autonomous code modules;
and centralizing command and control functions for increased reliability.
enabling self healing and adaptive networks;
facilitating distribution of updates for the mobile autonomous code modules;
and centralizing command and control functions for increased reliability.
21. The method according to claim 2, wherein the step of maintaining an execution environment by the agent handler further comprises forming a peer-to-peer defensive cluster with mobile autonomous code modules.
22. The method according to claim 2, wherein the step of maintaining an execution environment by the agent handler further comprises protecting the mobile autonomous code modules from alteration or tampering by hostile adversaries, and dispatching the mobile autonomous code modules through a predictable schedule from a central control point.
23. The method of claim 22, wherein the mobile autonomous code modules are dispatched through a random schedule.
24. The method according to claim 2, wherein the step of maintaining an execution environment by the agent handler further comprises:
programming the mobile autonomous code modules to detect and remove attackers at random;
storing code for the mobile autonomous code modules at a central location;
preventing alteration of the mobile autonomous code modules on client computers;
updating the mobile autonomous code modules with updated security detection strategies without modifying client computers;
beginning an active search for attackers when alerted to an intruder's presence;
performing automated corrective measures to remove the intruder; and saving forensic evidence.
programming the mobile autonomous code modules to detect and remove attackers at random;
storing code for the mobile autonomous code modules at a central location;
preventing alteration of the mobile autonomous code modules on client computers;
updating the mobile autonomous code modules with updated security detection strategies without modifying client computers;
beginning an active search for attackers when alerted to an intruder's presence;
performing automated corrective measures to remove the intruder; and saving forensic evidence.
25. The method according to claim 2, wherein security-specific mobile autonomous code modules are selected from the group consisting of forensic evidence agent, intrusion control agent, file integrity agent, host scanning agent, known intrusion agent, loadable kernel module agent, password cracking agent, log archive agent, rootkit agent, suspicious file agent, promiscuous mode agent, hidden process detection agent, unauthorized network daemon agent, self test agent, spy agent, zombie shells agent, and insider attack agent.
26. The method according to claim 25, wherein forensic evidence gathered by the forensic evidence agent from protected systems is cryptographically signed to prevent tampering.
27. The method according to claim 2, wherein network management-specific mobile autonomous code modules are selected from the group consisting of backup agent, host inventory agent, system monitor and status agent, system task agent, and Patch Watch .TM.
agent.
agent.
28. The method according to claim 3, wherein the method of logging event messages is selected from the group consisting of text-based files, a local system auditing facility, a cryptographically signed secure log format, directly to a system console, e-mail notification, direct used interface, and system wide notification.
29. The method according to claim 4, wherein the step of managing system configuration parameters comprises;
interfacing generic calls to other system handlers;
reading system configuration parameters;
writing system configuration parameters;
changing system configuration parameters;
reverting system configuration parameters back to a previous version;
deleting system configuration parameters;
backing up system configuration parameters; and providing multiple access protection mechanisms.
interfacing generic calls to other system handlers;
reading system configuration parameters;
writing system configuration parameters;
changing system configuration parameters;
reverting system configuration parameters back to a previous version;
deleting system configuration parameters;
backing up system configuration parameters; and providing multiple access protection mechanisms.
30. A system for providing system security and resource management, comprising:
a master control processor for managing event messages between system handlers according to security system policies;
a network handler for processing network messages between client and server computers;
an insertion handler for inserting native and third party event messages into the master control processor for processing by other system handlers;
a signature handler for detecting and processing event messages from alarm, system, and insertion events for conversion into system alarm messages for action by other system handlers; and an action handler for performing actions in response to action requests from the master control processor.
a master control processor for managing event messages between system handlers according to security system policies;
a network handler for processing network messages between client and server computers;
an insertion handler for inserting native and third party event messages into the master control processor for processing by other system handlers;
a signature handler for detecting and processing event messages from alarm, system, and insertion events for conversion into system alarm messages for action by other system handlers; and an action handler for performing actions in response to action requests from the master control processor.
31. The system according to claim 30, further comprising:
an agent handler for maintaining an execution environment for mobile autonomous code modules;
a logging handler for collecting and logging event messages; and a configuration handler for managing system configuration parameters.
an agent handler for maintaining an execution environment for mobile autonomous code modules;
a logging handler for collecting and logging event messages; and a configuration handler for managing system configuration parameters.
32. The system according to claim 31, wherein the system handlers auto-register themselves and their capabilities with the master control processor.
33. The system according to claim 30, wherein the action handler utilizes pluggable action modules.
34. The system according to claim 30, wherein the signature handler utilizes pluggable signature modules.
35. The system according to claim 34, wherein the pluggable signature modules auto-register with the signature handler.
36. The system according to claim 34, wherein a pluggable signature modules uses stored data from other signature modules, stores data between execution, stores data between system startup and shutdown sequences, and only processes signatures relating to the signature module.
37. The system according to claim 34, wherein the pluggable signature modules are added and removed from the system without modifying the core system code.
38. The system according to claim 31, wherein the system is installed on at least one server computer and at least one client computer.
39. The system according to claim 38, wherein the system installed on at least one client operates independently of the system installed on at least one server for reduced processing and reaction time and when network communications are disrupted.
40. The system according to claim 38, further comprising at least one graphical user interface.
41. The system according to claim 40, further comprising multiple levels of independent alarm filters on the client and server computers for reduced false alarm reporting, configuration flexibility, and system granularity.
42. The system according to claim 40, further comprising encrypted and mutually authenticated communication links between the server computer, client computer and graphical user interface.
43. The system according to claim 40, further comprising a means for re-allocating system resources to circumvent system problems or failures.
44. The system according to claim 31, wherein the system is installed on a client computer to maintain host processes, collect and forward events, process local client signatures, generate events, initiate and respond to action requests, initiate self healing counter-measures, and host mobile autonomous code agents.
45. The system according to claim 31, wherein the system is installed on a server computer to collect and store events, process enterprise client signatures, generate events, operate a central system database, schedule events, initiate and respond to action requests, initiate self healing counter-measures, maintain a graphical user interface backend structure, and manage mobile autonomous code agents.
46. The system according to claim 40, wherein the client computer has a capability to perform server computer functions in the event of failure of a server computer.
47. The system according to claim 40, wherein the server computer has a capability to perform client computer functions in the event of failure of a client computer.
48. Computer executable software code stored on a computer readable medium, the code for a computer implemented method for providing system security and resource management, comprising:
code for managing event messages by a master control processor between system handlers according to security system policies;
code for processing network messages by a network handler between client and server computers;
code for inserting native and third party event messages received by an insertion handler into the master control processor for processing by other system handlers;
code for detecting and processing event message signatures by the signature handler from alarm, system, and insertion events for conversion into system alarm messages for action by the other system handlers; and code for performing actions by an action handler in response to action requests from the master control processor.
code for managing event messages by a master control processor between system handlers according to security system policies;
code for processing network messages by a network handler between client and server computers;
code for inserting native and third party event messages received by an insertion handler into the master control processor for processing by other system handlers;
code for detecting and processing event message signatures by the signature handler from alarm, system, and insertion events for conversion into system alarm messages for action by the other system handlers; and code for performing actions by an action handler in response to action requests from the master control processor.
49. The computer executable software code method of claim 48, further comprising:
code for maintaining an execution environment by an agent handler for mobile autonomous code modules;
code for collecting and logging event messages by a logging handler; and code for managing system configuration parameters by a configuration handler.
code for maintaining an execution environment by an agent handler for mobile autonomous code modules;
code for collecting and logging event messages by a logging handler; and code for managing system configuration parameters by a configuration handler.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US26115501P | 2001-01-10 | 2001-01-10 | |
US60/261,155 | 2001-01-10 | ||
PCT/US2002/000900 WO2002056152A2 (en) | 2001-01-10 | 2002-01-10 | Computer security and management system |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2434674A1 true CA2434674A1 (en) | 2002-07-18 |
CA2434674C CA2434674C (en) | 2010-06-08 |
Family
ID=22992142
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2434674A Expired - Fee Related CA2434674C (en) | 2001-01-10 | 2002-01-10 | Computer security and management system |
Country Status (8)
Country | Link |
---|---|
US (1) | US7058968B2 (en) |
EP (1) | EP1381928B1 (en) |
CN (1) | CN1295904C (en) |
AT (1) | ATE419574T1 (en) |
AU (1) | AU2002239889B2 (en) |
CA (1) | CA2434674C (en) |
DE (1) | DE60230601D1 (en) |
WO (1) | WO2002056152A2 (en) |
Families Citing this family (279)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6976093B2 (en) * | 1998-05-29 | 2005-12-13 | Yahoo! Inc. | Web server content replication |
US7181486B1 (en) | 1998-12-07 | 2007-02-20 | Network Ice Corporation | Method and apparatus for remote installation of network drivers and software |
IL152502A0 (en) | 2000-04-28 | 2003-05-29 | Internet Security Systems Inc | Method and system for managing computer security information |
US6907531B1 (en) | 2000-06-30 | 2005-06-14 | Internet Security Systems, Inc. | Method and system for identifying, fixing, and updating security vulnerabilities |
US7093239B1 (en) | 2000-07-14 | 2006-08-15 | Internet Security Systems, Inc. | Computer immune system and method for detecting unwanted code in a computer system |
US9027121B2 (en) | 2000-10-10 | 2015-05-05 | International Business Machines Corporation | Method and system for creating a record for one or more computer security incidents |
US20030028803A1 (en) * | 2001-05-18 | 2003-02-06 | Bunker Nelson Waldo | Network vulnerability assessment system and method |
US7145900B2 (en) | 2001-05-31 | 2006-12-05 | Go2Call.Com, Inc. | Packet-switched telephony call server |
WO2002097587A2 (en) | 2001-05-31 | 2002-12-05 | Internet Security Systems, Inc. | Method and system for implementing security devices in a network |
US7350234B2 (en) * | 2001-06-11 | 2008-03-25 | Research Triangle Institute | Intrusion tolerant communication networks and associated methods |
US7096503B1 (en) * | 2001-06-29 | 2006-08-22 | Mcafee, Inc. | Network-based risk-assessment tool for remotely detecting local computer vulnerabilities |
AUPR642401A0 (en) * | 2001-07-18 | 2001-08-09 | Precise Data Recovery Services Pty Ltd | Data analysis system |
US7506374B2 (en) * | 2001-10-31 | 2009-03-17 | Computer Associates Think, Inc. | Memory scanning system and method |
US7543056B2 (en) | 2002-01-15 | 2009-06-02 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7257630B2 (en) | 2002-01-15 | 2007-08-14 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7336602B2 (en) * | 2002-01-29 | 2008-02-26 | Intel Corporation | Apparatus and method for wireless/wired communications interface |
US7873984B2 (en) * | 2002-01-31 | 2011-01-18 | Brocade Communications Systems, Inc. | Network security through configuration servers in the fabric environment |
US7174566B2 (en) * | 2002-02-01 | 2007-02-06 | Intel Corporation | Integrated network intrusion detection |
US7369532B2 (en) * | 2002-02-26 | 2008-05-06 | Intel Corporation | Apparatus and method for an audio channel switching wireless device |
JP3713491B2 (en) * | 2002-02-28 | 2005-11-09 | 株式会社エヌ・ティ・ティ・ドコモ | Server apparatus and information processing method |
US7254708B2 (en) * | 2002-03-05 | 2007-08-07 | Intel Corporation | Apparatus and method for wireless device set-up and authentication using audio authentication—information |
AU2003220582A1 (en) * | 2002-03-29 | 2003-10-13 | Cisco Technology, Inc. | Method and system for reducing the false alarm rate of network intrusion detection systems |
US20030196123A1 (en) * | 2002-03-29 | 2003-10-16 | Rowland Craig H. | Method and system for analyzing and addressing alarms from network intrusion detection systems |
US7016883B2 (en) * | 2002-04-23 | 2006-03-21 | Sprint Communications Company L.P. | Reverse caching for residential end-users to reduce usage of access links to a core communication network |
US20030236652A1 (en) * | 2002-05-31 | 2003-12-25 | Battelle | System and method for anomaly detection |
US7519990B1 (en) | 2002-07-19 | 2009-04-14 | Fortinet, Inc. | Managing network traffic flow |
US7840806B2 (en) * | 2002-10-16 | 2010-11-23 | Enterprise Information Management, Inc. | System and method of non-centralized zero knowledge authentication for a computer network |
US8239917B2 (en) | 2002-10-16 | 2012-08-07 | Enterprise Information Management, Inc. | Systems and methods for enterprise security with collaborative peer to peer architecture |
US20040193923A1 (en) * | 2003-01-16 | 2004-09-30 | Hammond Frank J. | Systems and methods for enterprise security with collaborative peer to peer architecture |
US7549159B2 (en) * | 2004-05-10 | 2009-06-16 | Liquidware Labs, Inc. | System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing connection thereto |
US7386889B2 (en) * | 2002-11-18 | 2008-06-10 | Trusted Network Technologies, Inc. | System and method for intrusion prevention in a communications network |
US7591001B2 (en) * | 2004-05-14 | 2009-09-15 | Liquidware Labs, Inc. | System, apparatuses, methods and computer-readable media for determining the security status of a computer before establishing a network connection |
US7660980B2 (en) * | 2002-11-18 | 2010-02-09 | Liquidware Labs, Inc. | Establishing secure TCP/IP communications using embedded IDs |
US7418730B2 (en) * | 2002-12-17 | 2008-08-26 | International Business Machines Corporation | Automatic client responses to worm or hacker attacks |
US8327442B2 (en) * | 2002-12-24 | 2012-12-04 | Herz Frederick S M | System and method for a distributed application and network security system (SDI-SCAM) |
US9503470B2 (en) | 2002-12-24 | 2016-11-22 | Fred Herz Patents, LLC | Distributed agent based model for security monitoring and response |
US7243147B2 (en) * | 2002-12-30 | 2007-07-10 | Bellsouth Ip Corporation | Systems and methods for the detection and management of network assets |
JP2004234378A (en) * | 2003-01-30 | 2004-08-19 | Fujitsu Ltd | Security management device and security management method |
US7627891B2 (en) * | 2003-02-14 | 2009-12-01 | Preventsys, Inc. | Network audit and policy assurance system |
US8561175B2 (en) * | 2003-02-14 | 2013-10-15 | Preventsys, Inc. | System and method for automated policy audit and remediation management |
US7991751B2 (en) * | 2003-04-02 | 2011-08-02 | Portauthority Technologies Inc. | Method and a system for information identification |
US7254815B2 (en) * | 2003-04-24 | 2007-08-07 | International Business Machines Corporation | Method and apparatus for implementing distributed event management in an embedded support processor computer system |
US8065725B2 (en) * | 2003-05-30 | 2011-11-22 | Yuliang Zheng | Systems and methods for enhanced network security |
US8769680B2 (en) * | 2003-06-12 | 2014-07-01 | International Business Machines Corporation | Alert passwords for detecting password attacks on systems |
US7496959B2 (en) * | 2003-06-23 | 2009-02-24 | Architecture Technology Corporation | Remote collection of computer forensic evidence |
US8458805B2 (en) * | 2003-06-23 | 2013-06-04 | Architecture Technology Corporation | Digital forensic analysis using empirical privilege profiling (EPP) for filtering collected data |
US20050005101A1 (en) * | 2003-07-03 | 2005-01-06 | Yenduri Bhargava K. | Kernel cryptographic module signature verification system and method |
US20050033976A1 (en) * | 2003-08-04 | 2005-02-10 | Sbc Knowledge Ventures, L.P. | Host intrusion detection and isolation |
US7565690B2 (en) * | 2003-08-04 | 2009-07-21 | At&T Intellectual Property I, L.P. | Intrusion detection |
US7530103B2 (en) * | 2003-08-07 | 2009-05-05 | Microsoft Corporation | Projection of trustworthiness from a trusted environment to an untrusted environment |
US7457867B2 (en) * | 2003-10-15 | 2008-11-25 | Alcatel Lucent | Reliable non-repudiable Syslog signing and acknowledgement |
US7805762B2 (en) * | 2003-10-15 | 2010-09-28 | Cisco Technology, Inc. | Method and system for reducing the false alarm rate of network intrusion detection systems |
US7581249B2 (en) * | 2003-11-14 | 2009-08-25 | Enterasys Networks, Inc. | Distributed intrusion response system |
US7647631B2 (en) * | 2003-12-10 | 2010-01-12 | Hewlett-Packard Development Company | Automated user interaction in application assessment |
US7533407B2 (en) | 2003-12-16 | 2009-05-12 | Microsoft Corporation | System and methods for providing network quarantine |
US20070197877A1 (en) * | 2004-01-05 | 2007-08-23 | Stefaan Decorte | Behavior Based Multi-Agent Systems As Data Types |
US20050229250A1 (en) * | 2004-02-26 | 2005-10-13 | Ring Sandra E | Methodology, system, computer readable medium, and product providing a security software suite for handling operating system exploitations |
US8201257B1 (en) | 2004-03-31 | 2012-06-12 | Mcafee, Inc. | System and method of managing network security risks |
US8566946B1 (en) * | 2006-04-20 | 2013-10-22 | Fireeye, Inc. | Malware containment on connection |
US20050267954A1 (en) * | 2004-04-27 | 2005-12-01 | Microsoft Corporation | System and methods for providing network quarantine |
WO2005114541A2 (en) * | 2004-05-19 | 2005-12-01 | Computer Associates Think, Inc. | Systems and methods for minimizing security logs |
US8074277B2 (en) * | 2004-06-07 | 2011-12-06 | Check Point Software Technologies, Inc. | System and methodology for intrusion detection and prevention |
US7930742B2 (en) * | 2004-06-14 | 2011-04-19 | Lionic Corporation | Multiple-level data processing system |
US7581248B2 (en) * | 2004-06-28 | 2009-08-25 | International Business Machines Corporation | Federated identity brokering |
US7748040B2 (en) * | 2004-07-12 | 2010-06-29 | Architecture Technology Corporation | Attack correlation using marked information |
SG119237A1 (en) * | 2004-07-30 | 2006-02-28 | E Cop Net Pte Ltd | An intrusion protection system and method |
US7661135B2 (en) * | 2004-08-10 | 2010-02-09 | International Business Machines Corporation | Apparatus, system, and method for gathering trace data indicative of resource activity |
CN100372301C (en) * | 2004-09-16 | 2008-02-27 | 华为技术有限公司 | Method for transmitting warning data in network |
US20060085850A1 (en) * | 2004-10-14 | 2006-04-20 | Microsoft Corporation | System and methods for providing network quarantine using IPsec |
US7516480B2 (en) * | 2004-10-22 | 2009-04-07 | Microsoft Corporation | Secure remote configuration of targeted devices using a standard message transport protocol |
JP4522413B2 (en) * | 2004-11-12 | 2010-08-11 | 富士通株式会社 | Resource management program, resource management method, and resource management apparatus |
KR100628317B1 (en) * | 2004-12-03 | 2006-09-27 | 한국전자통신연구원 | Apparatus for detecting attacks toward network and method thereof |
US7593930B2 (en) * | 2004-12-14 | 2009-09-22 | Sap Ag | Fast channel architecture |
US7600217B2 (en) | 2004-12-14 | 2009-10-06 | Sap Ag | Socket-like communication API for Java |
US7580915B2 (en) * | 2004-12-14 | 2009-08-25 | Sap Ag | Socket-like communication API for C |
US7917629B2 (en) * | 2004-12-29 | 2011-03-29 | Sap Ag | Interface for external system management |
US7591006B2 (en) * | 2004-12-29 | 2009-09-15 | Sap Ag | Security for external system management |
US8024743B2 (en) * | 2004-12-30 | 2011-09-20 | Sap Ag | Connection of clients for management of systems |
US7593917B2 (en) | 2004-12-30 | 2009-09-22 | Sap Ag | Implementation of application management operations |
US7310669B2 (en) * | 2005-01-19 | 2007-12-18 | Lockdown Networks, Inc. | Network appliance for vulnerability assessment auditing over multiple networks |
US20060185018A1 (en) * | 2005-02-17 | 2006-08-17 | Microsoft Corporation | Systems and methods for shielding an identified vulnerability |
CN100446510C (en) * | 2005-02-23 | 2008-12-24 | 华为技术有限公司 | System and method for implementing business integrating between interprises |
US20060191007A1 (en) * | 2005-02-24 | 2006-08-24 | Sanjiva Thielamay | Security force automation |
US7757288B1 (en) * | 2005-05-23 | 2010-07-13 | Symantec Corporation | Malicious e-mail attack inversion filter |
US8201253B1 (en) * | 2005-07-15 | 2012-06-12 | Microsoft Corporation | Performing security functions when a process is created |
US7874001B2 (en) * | 2005-07-15 | 2011-01-18 | Microsoft Corporation | Detecting user-mode rootkits |
CA2614887A1 (en) * | 2005-07-25 | 2007-02-01 | Toyo Ink Mfg. Co., Ltd. | Active energy beam-curable ink for injet printing |
US8417949B2 (en) * | 2005-10-31 | 2013-04-09 | Microsoft Corporation | Total exchange session security |
US7526677B2 (en) * | 2005-10-31 | 2009-04-28 | Microsoft Corporation | Fragility handling |
US7665136B1 (en) * | 2005-11-09 | 2010-02-16 | Symantec Corporation | Method and apparatus for detecting hidden network communication channels of rootkit tools |
US20070110244A1 (en) * | 2005-11-16 | 2007-05-17 | Kapil Sood | Method, apparatus and system for enabling a secure wireless platform |
US7827545B2 (en) * | 2005-12-15 | 2010-11-02 | Microsoft Corporation | Dynamic remediation of a client computer seeking access to a network with a quarantine enforcement policy |
US8516573B1 (en) * | 2005-12-22 | 2013-08-20 | At&T Intellectual Property Ii, L.P. | Method and apparatus for port scan detection in a network |
US8099495B2 (en) * | 2005-12-29 | 2012-01-17 | Intel Corporation | Method, apparatus and system for platform identity binding in a network node |
CN100391165C (en) * | 2006-01-13 | 2008-05-28 | 华为技术有限公司 | Method, system, network management server and customer terminal for obtaining warning static interpreter information |
CN100391166C (en) * | 2006-01-13 | 2008-05-28 | 华为技术有限公司 | Method, system, network management server and customer terminal for obtaining warning static interpreter information |
US20070198525A1 (en) * | 2006-02-13 | 2007-08-23 | Microsoft Corporation | Computer system with update-based quarantine |
US7712137B2 (en) * | 2006-02-27 | 2010-05-04 | Microsoft Corporation | Configuring and organizing server security information |
US7581141B2 (en) * | 2006-03-01 | 2009-08-25 | Sun Microsystems, Inc. | Kernel module compatibility validation |
US7975298B1 (en) * | 2006-03-29 | 2011-07-05 | Mcafee, Inc. | System, method and computer program product for remote rootkit detection |
US8205238B2 (en) * | 2006-03-30 | 2012-06-19 | Intel Corporation | Platform posture and policy information exchange method and apparatus |
US7793096B2 (en) * | 2006-03-31 | 2010-09-07 | Microsoft Corporation | Network access protection |
US20070237088A1 (en) * | 2006-04-05 | 2007-10-11 | Honeywell International. Inc | Apparatus and method for providing network security |
US8260939B2 (en) * | 2006-04-28 | 2012-09-04 | Kyocera Corporation | System and method for scheduling wireless channel resources |
US7739082B2 (en) * | 2006-06-08 | 2010-06-15 | Battelle Memorial Institute | System and method for anomaly detection |
US9015828B2 (en) * | 2006-06-09 | 2015-04-21 | Board of Regents, a Body Corporate of the State of Arizona, Acting for and on Behalf of The University of Arizona | Method and system for autonomous control and protection of computer systems |
US8775521B2 (en) * | 2006-06-30 | 2014-07-08 | At&T Intellectual Property Ii, L.P. | Method and apparatus for detecting zombie-generated spam |
US20080120699A1 (en) * | 2006-11-17 | 2008-05-22 | Mcafee, Inc. | Method and system for assessing and mitigating access control to a managed network |
US8099786B2 (en) * | 2006-12-29 | 2012-01-17 | Intel Corporation | Embedded mechanism for platform vulnerability assessment |
US20080184341A1 (en) * | 2007-01-29 | 2008-07-31 | David Jaroslav Sebesta | Master-Slave Protocol for Security Devices |
US8151118B2 (en) * | 2007-01-29 | 2012-04-03 | Microsoft Corporation | Master-slave security devices |
US7899882B2 (en) * | 2007-03-29 | 2011-03-01 | Agile Risk Management Llc | System and method for providing remote forensics capability |
US8533821B2 (en) * | 2007-05-25 | 2013-09-10 | International Business Machines Corporation | Detecting and defending against man-in-the-middle attacks |
JP4907603B2 (en) * | 2007-06-27 | 2012-04-04 | ヒューレット−パッカード デベロップメント カンパニー エル.ピー. | Access control system and access control method |
US9225684B2 (en) | 2007-10-29 | 2015-12-29 | Microsoft Technology Licensing, Llc | Controlling network access |
US8280905B2 (en) * | 2007-12-21 | 2012-10-02 | Georgetown University | Automated forensic document signatures |
US8312023B2 (en) * | 2007-12-21 | 2012-11-13 | Georgetown University | Automated forensic document signatures |
US9106630B2 (en) * | 2008-02-01 | 2015-08-11 | Mandiant, Llc | Method and system for collaboration during an event |
US9076342B2 (en) | 2008-02-19 | 2015-07-07 | Architecture Technology Corporation | Automated execution and evaluation of network-based training exercises |
US8103853B2 (en) * | 2008-03-05 | 2012-01-24 | The Boeing Company | Intelligent fabric system on a chip |
US8170965B2 (en) * | 2008-03-12 | 2012-05-01 | Fabian Matthew Mihelic | Method for governing the operation of a generalist agent within a complex multi-agent adaptive system |
JP5130997B2 (en) * | 2008-03-31 | 2013-01-30 | 日本電気株式会社 | Distributed resource management system, distributed resource management method, and distributed resource management program |
US9355117B1 (en) * | 2008-03-31 | 2016-05-31 | Veritas Us Ip Holdings Llc | Techniques for backing up replicated data |
US20090254970A1 (en) * | 2008-04-04 | 2009-10-08 | Avaya Inc. | Multi-tier security event correlation and mitigation |
US9009796B2 (en) | 2010-11-18 | 2015-04-14 | The Boeing Company | Spot beam based authentication |
US8391834B2 (en) | 2009-01-28 | 2013-03-05 | Headwater Partners I Llc | Security techniques for device assisted services |
US8898293B2 (en) | 2009-01-28 | 2014-11-25 | Headwater Partners I Llc | Service offer set publishing to device agent with on-device service selection |
US8346225B2 (en) | 2009-01-28 | 2013-01-01 | Headwater Partners I, Llc | Quality of service for device assisted services |
US8275830B2 (en) | 2009-01-28 | 2012-09-25 | Headwater Partners I Llc | Device assisted CDR creation, aggregation, mediation and billing |
US8589541B2 (en) | 2009-01-28 | 2013-11-19 | Headwater Partners I Llc | Device-assisted services for protecting network capacity |
US8250207B2 (en) | 2009-01-28 | 2012-08-21 | Headwater Partners I, Llc | Network based ambient services |
US8832777B2 (en) | 2009-03-02 | 2014-09-09 | Headwater Partners I Llc | Adapting network policies based on device service processor configuration |
US8402111B2 (en) | 2009-01-28 | 2013-03-19 | Headwater Partners I, Llc | Device assisted services install |
US8406748B2 (en) | 2009-01-28 | 2013-03-26 | Headwater Partners I Llc | Adaptive ambient services |
US8635335B2 (en) | 2009-01-28 | 2014-01-21 | Headwater Partners I Llc | System and method for wireless network offloading |
US8924543B2 (en) | 2009-01-28 | 2014-12-30 | Headwater Partners I Llc | Service design center for device assisted services |
US8340634B2 (en) | 2009-01-28 | 2012-12-25 | Headwater Partners I, Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US8924469B2 (en) | 2008-06-05 | 2014-12-30 | Headwater Partners I Llc | Enterprise access control and accounting allocation for access networks |
US8548428B2 (en) | 2009-01-28 | 2013-10-01 | Headwater Partners I Llc | Device group partitions and settlement platform |
US8725123B2 (en) | 2008-06-05 | 2014-05-13 | Headwater Partners I Llc | Communications device with secure data path processing agents |
US8626115B2 (en) | 2009-01-28 | 2014-01-07 | Headwater Partners I Llc | Wireless network service interfaces |
US8204180B1 (en) * | 2008-08-08 | 2012-06-19 | Intervoice Limited Partnership | Systems and methods for preventing sensitive information from being communicated into a non-secure environment |
ES2556271T3 (en) * | 2008-08-22 | 2016-01-14 | Qualcomm Incorporated | Procedure and apparatus for transmitting and receiving protected data and unprotected data |
US8391882B2 (en) * | 2008-10-22 | 2013-03-05 | Qualcomm Incorporated | Method and system for interference management in a spectrum shared by WAN and femto cells |
US20100153550A1 (en) * | 2008-12-15 | 2010-06-17 | Broadcom Corporation | Pluggable device that enables an addition of security functionality in a network |
US10841839B2 (en) | 2009-01-28 | 2020-11-17 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US9565707B2 (en) | 2009-01-28 | 2017-02-07 | Headwater Partners I Llc | Wireless end-user device with wireless data attribution to multiple personas |
US9858559B2 (en) | 2009-01-28 | 2018-01-02 | Headwater Research Llc | Network service plan design |
US9253663B2 (en) | 2009-01-28 | 2016-02-02 | Headwater Partners I Llc | Controlling mobile device communications on a roaming network based on device state |
US9557889B2 (en) | 2009-01-28 | 2017-01-31 | Headwater Partners I Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US10326800B2 (en) | 2009-01-28 | 2019-06-18 | Headwater Research Llc | Wireless network service interfaces |
US10237757B2 (en) | 2009-01-28 | 2019-03-19 | Headwater Research Llc | System and method for wireless network offloading |
US9755842B2 (en) | 2009-01-28 | 2017-09-05 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US8893009B2 (en) | 2009-01-28 | 2014-11-18 | Headwater Partners I Llc | End user device that secures an association of application to service policy with an application certificate check |
US9954975B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Enhanced curfew and protection associated with a device group |
US8351898B2 (en) | 2009-01-28 | 2013-01-08 | Headwater Partners I Llc | Verifiable device assisted service usage billing with integrated accounting, mediation accounting, and multi-account |
US10064055B2 (en) | 2009-01-28 | 2018-08-28 | Headwater Research Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US9351193B2 (en) | 2009-01-28 | 2016-05-24 | Headwater Partners I Llc | Intermediate networking devices |
US10484858B2 (en) | 2009-01-28 | 2019-11-19 | Headwater Research Llc | Enhanced roaming services and converged carrier networks with device assisted services and a proxy |
US9706061B2 (en) | 2009-01-28 | 2017-07-11 | Headwater Partners I Llc | Service design center for device assisted services |
US10248996B2 (en) | 2009-01-28 | 2019-04-02 | Headwater Research Llc | Method for operating a wireless end-user device mobile payment agent |
US9647918B2 (en) | 2009-01-28 | 2017-05-09 | Headwater Research Llc | Mobile device and method attributing media services network usage to requesting application |
US10715342B2 (en) | 2009-01-28 | 2020-07-14 | Headwater Research Llc | Managing service user discovery and service launch object placement on a device |
US10200541B2 (en) | 2009-01-28 | 2019-02-05 | Headwater Research Llc | Wireless end-user device with divided user space/kernel space traffic policy system |
US9270559B2 (en) | 2009-01-28 | 2016-02-23 | Headwater Partners I Llc | Service policy implementation for an end-user device having a control application or a proxy agent for routing an application traffic flow |
US9578182B2 (en) | 2009-01-28 | 2017-02-21 | Headwater Partners I Llc | Mobile device and service management |
US10783581B2 (en) | 2009-01-28 | 2020-09-22 | Headwater Research Llc | Wireless end-user device providing ambient or sponsored services |
US10057775B2 (en) | 2009-01-28 | 2018-08-21 | Headwater Research Llc | Virtualized policy and charging system |
US9392462B2 (en) | 2009-01-28 | 2016-07-12 | Headwater Partners I Llc | Mobile end-user device with agent limiting wireless data communication for specified background applications based on a stored policy |
US9571559B2 (en) | 2009-01-28 | 2017-02-14 | Headwater Partners I Llc | Enhanced curfew and protection associated with a device group |
US8793758B2 (en) | 2009-01-28 | 2014-07-29 | Headwater Partners I Llc | Security, fraud detection, and fraud mitigation in device-assisted services systems |
US10798252B2 (en) | 2009-01-28 | 2020-10-06 | Headwater Research Llc | System and method for providing user notifications |
US10492102B2 (en) | 2009-01-28 | 2019-11-26 | Headwater Research Llc | Intermediate networking devices |
US9572019B2 (en) | 2009-01-28 | 2017-02-14 | Headwater Partners LLC | Service selection set published to device agent with on-device service selection |
US11218854B2 (en) | 2009-01-28 | 2022-01-04 | Headwater Research Llc | Service plan design, user interfaces, application programming interfaces, and device management |
US9955332B2 (en) | 2009-01-28 | 2018-04-24 | Headwater Research Llc | Method for child wireless device activation to subscriber account of a master wireless device |
US8745191B2 (en) | 2009-01-28 | 2014-06-03 | Headwater Partners I Llc | System and method for providing user notifications |
US9980146B2 (en) | 2009-01-28 | 2018-05-22 | Headwater Research Llc | Communications device with secure data path processing agents |
US8606911B2 (en) | 2009-03-02 | 2013-12-10 | Headwater Partners I Llc | Flow tagging for service policy implementation |
US10264138B2 (en) | 2009-01-28 | 2019-04-16 | Headwater Research Llc | Mobile device and service management |
US10779177B2 (en) | 2009-01-28 | 2020-09-15 | Headwater Research Llc | Device group partitions and settlement platform |
US20100205014A1 (en) * | 2009-02-06 | 2010-08-12 | Cary Sholer | Method and system for providing response services |
US20100269162A1 (en) | 2009-04-15 | 2010-10-21 | Jose Bravo | Website authentication |
US20100299430A1 (en) * | 2009-05-22 | 2010-11-25 | Architecture Technology Corporation | Automated acquisition of volatile forensic evidence from network devices |
US8752142B2 (en) * | 2009-07-17 | 2014-06-10 | American Express Travel Related Services Company, Inc. | Systems, methods, and computer program products for adapting the security measures of a communication network based on feedback |
KR100942456B1 (en) * | 2009-07-23 | 2010-02-12 | 주식회사 안철수연구소 | Method for detecting and protecting ddos attack by using cloud computing and server thereof |
US8713584B2 (en) | 2009-08-13 | 2014-04-29 | Google Inc. | Event-triggered server-side macros |
US20110040824A1 (en) * | 2009-08-13 | 2011-02-17 | Google Inc. | Shared Server-Side Macros |
US9536109B2 (en) * | 2009-10-21 | 2017-01-03 | International Business Machines Corporation | Method and system for administering a secure data repository |
US8683609B2 (en) * | 2009-12-04 | 2014-03-25 | International Business Machines Corporation | Mobile phone and IP address correlation service |
US8621636B2 (en) | 2009-12-17 | 2013-12-31 | American Express Travel Related Services Company, Inc. | Systems, methods, and computer program products for collecting and reporting sensor data in a communication network |
US9756076B2 (en) * | 2009-12-17 | 2017-09-05 | American Express Travel Related Services Company, Inc. | Dynamically reacting policies and protections for securing mobile financial transactions |
US8650129B2 (en) | 2010-01-20 | 2014-02-11 | American Express Travel Related Services Company, Inc. | Dynamically reacting policies and protections for securing mobile financial transaction data in transit |
US8689058B2 (en) * | 2010-03-26 | 2014-04-01 | Microsoft Corporation | Centralized service outage communication |
CN102291248A (en) * | 2010-06-18 | 2011-12-21 | 中兴通讯股份有限公司 | Method and device for realizing self recovery of system |
CN101860546A (en) * | 2010-06-18 | 2010-10-13 | 杭州电子科技大学 | Method for improving SSL handshake protocol |
US8924296B2 (en) | 2010-06-22 | 2014-12-30 | American Express Travel Related Services Company, Inc. | Dynamic pairing system for securing a trusted communication channel |
US10360625B2 (en) | 2010-06-22 | 2019-07-23 | American Express Travel Related Services Company, Inc. | Dynamically adaptive policy management for securing mobile financial transactions |
US8850539B2 (en) | 2010-06-22 | 2014-09-30 | American Express Travel Related Services Company, Inc. | Adaptive policies and protections for securing financial transaction data at rest |
US9215244B2 (en) * | 2010-11-18 | 2015-12-15 | The Boeing Company | Context aware network security monitoring for threat detection |
CN102034058B (en) * | 2010-11-25 | 2013-08-21 | 中国联合网络通信集团有限公司 | Method for controlling safety of application software and terminal |
US9063819B2 (en) | 2011-01-02 | 2015-06-23 | Cisco Technology, Inc. | Extensible patch management |
US10057298B2 (en) | 2011-02-10 | 2018-08-21 | Architecture Technology Corporation | Configurable investigative tool |
US10067787B2 (en) | 2011-02-10 | 2018-09-04 | Architecture Technology Corporation | Configurable forensic investigative tool |
US9154826B2 (en) | 2011-04-06 | 2015-10-06 | Headwater Partners Ii Llc | Distributing content and service launch objects to mobile devices |
US8838988B2 (en) | 2011-04-12 | 2014-09-16 | International Business Machines Corporation | Verification of transactional integrity |
CN102790690B (en) * | 2011-05-18 | 2017-09-12 | 中兴通讯股份有限公司 | A kind of distributed business network management method and system |
US20130096980A1 (en) * | 2011-10-18 | 2013-04-18 | Mcafee, Inc. | User-defined countermeasures |
US9529635B2 (en) | 2011-10-24 | 2016-12-27 | Plumchoice, Inc. | Systems and methods for configuring and launching automated services to a remote device |
US9317672B2 (en) | 2011-12-14 | 2016-04-19 | Visa International Service Association | Online account access control by mobile device |
US9037630B2 (en) | 2012-02-21 | 2015-05-19 | Matthew Martin Shannon | Systems and methods for provisioning digital forensics services remotely over public and private networks |
AP2014007920A0 (en) | 2012-02-22 | 2014-09-30 | Visa Int Service Ass | Data security system using mobile communications device |
US8917826B2 (en) | 2012-07-31 | 2014-12-23 | International Business Machines Corporation | Detecting man-in-the-middle attacks in electronic transactions using prompts |
US9392003B2 (en) | 2012-08-23 | 2016-07-12 | Raytheon Foreground Security, Inc. | Internet security cyber threat reporting system and method |
US9485276B2 (en) | 2012-09-28 | 2016-11-01 | Juniper Networks, Inc. | Dynamic service handling using a honeypot |
CN103036959B (en) * | 2012-12-07 | 2015-12-02 | 武汉邮电科学研究院 | Based on implementation method and the system of the distributed deployment application program of IO decoupling zero |
US9398109B2 (en) * | 2012-12-21 | 2016-07-19 | Software Ag | System, messaging broker and method for managing communication between open services gateway initiative (OSGI) environments |
CN103076792B (en) * | 2013-01-23 | 2016-05-18 | 中禹环境工程(北京)有限公司 | Perception transmission equipment administrating system |
WO2014159862A1 (en) | 2013-03-14 | 2014-10-02 | Headwater Partners I Llc | Automated credential porting for mobile devices |
US9148418B2 (en) | 2013-05-10 | 2015-09-29 | Matthew Martin Shannon | Systems and methods for remote access to computer data over public and private networks via a software switch |
US20140359694A1 (en) * | 2013-06-03 | 2014-12-04 | eSentire, Inc. | System and method for computer system security |
US9912690B2 (en) * | 2014-04-08 | 2018-03-06 | Capital One Financial Corporation | System and method for malware detection using hashing techniques |
US10257017B2 (en) * | 2014-06-03 | 2019-04-09 | JumpCloud, Inc. | Autonomous server agents |
US9442803B2 (en) * | 2014-06-24 | 2016-09-13 | International Business Machines Corporation | Method and system of distributed backup for computer devices in a network |
US20160116893A1 (en) * | 2014-10-24 | 2016-04-28 | Ronald Lance Justin | Autonomous control systems and methods |
US9639434B2 (en) | 2015-02-26 | 2017-05-02 | Dell Products, L.P. | Auto-didacted hierarchical failure recovery for remote access controllers |
US9619649B1 (en) | 2015-03-13 | 2017-04-11 | Symantec Corporation | Systems and methods for detecting potentially malicious applications |
US10116688B1 (en) | 2015-03-24 | 2018-10-30 | Symantec Corporation | Systems and methods for detecting potentially malicious files |
US9798878B1 (en) * | 2015-03-31 | 2017-10-24 | Symantec Corporation | Systems and methods for detecting text display manipulation attacks |
CN104702627B (en) * | 2015-04-01 | 2017-12-26 | 南京天溯自动化控制系统有限公司 | A kind of synchronous concurrent communication method and system based on message classification |
US10803766B1 (en) | 2015-07-28 | 2020-10-13 | Architecture Technology Corporation | Modular training of network-based training exercises |
US10083624B2 (en) | 2015-07-28 | 2018-09-25 | Architecture Technology Corporation | Real-time monitoring of network-based training exercises |
KR20170060598A (en) * | 2015-11-24 | 2017-06-01 | 삼성전자주식회사 | Smart home service server, and control method for the same |
CN105573756B (en) * | 2015-12-15 | 2018-11-30 | 金蝶软件(中国)有限公司 | A kind of script language extensions method and event bus framework |
CN113138869A (en) * | 2016-01-15 | 2021-07-20 | 创新先进技术有限公司 | Remote calling method and device |
CN105763360A (en) * | 2016-01-20 | 2016-07-13 | 上海学登信息科技有限公司 | Linux-based network early warning system and network early warning method |
US10650046B2 (en) | 2016-02-05 | 2020-05-12 | Sas Institute Inc. | Many task computing with distributed file system |
US10795935B2 (en) | 2016-02-05 | 2020-10-06 | Sas Institute Inc. | Automated generation of job flow definitions |
US10642896B2 (en) | 2016-02-05 | 2020-05-05 | Sas Institute Inc. | Handling of data sets during execution of task routines of multiple languages |
US10404822B2 (en) * | 2016-04-29 | 2019-09-03 | Cisco Technology, Inc. | Predictive rollup and caching for application performance data |
US10831893B2 (en) * | 2016-07-14 | 2020-11-10 | Mcafee, Llc | Mitigation of ransomware |
US10140844B2 (en) * | 2016-08-10 | 2018-11-27 | Honeywell International Inc. | Smart device distributed security system |
US10484382B2 (en) | 2016-08-31 | 2019-11-19 | Oracle International Corporation | Data management for a multi-tenant identity cloud service |
US10242187B1 (en) * | 2016-09-14 | 2019-03-26 | Symantec Corporation | Systems and methods for providing integrated security management |
US10846390B2 (en) | 2016-09-14 | 2020-11-24 | Oracle International Corporation | Single sign-on functionality for a multi-tenant identity and data security management cloud service |
US10511589B2 (en) | 2016-09-14 | 2019-12-17 | Oracle International Corporation | Single logout functionality for a multi-tenant identity and data security management cloud service |
US10594684B2 (en) | 2016-09-14 | 2020-03-17 | Oracle International Corporation | Generating derived credentials for a multi-tenant identity cloud service |
US10445395B2 (en) | 2016-09-16 | 2019-10-15 | Oracle International Corporation | Cookie based state propagation for a multi-tenant identity cloud service |
US10484243B2 (en) | 2016-09-16 | 2019-11-19 | Oracle International Corporation | Application management for a multi-tenant identity cloud service |
EP3513542B1 (en) | 2016-09-16 | 2021-05-19 | Oracle International Corporation | Tenant and service management for a multi-tenant identity and data security management cloud service |
US10904074B2 (en) * | 2016-09-17 | 2021-01-26 | Oracle International Corporation | Composite event handler for a multi-tenant identity cloud service |
CN106547670A (en) * | 2016-10-10 | 2017-03-29 | 许昌许继软件技术有限公司 | The method and device of long-range reading and writing built-in Linux application program memory variable value |
USD898059S1 (en) | 2017-02-06 | 2020-10-06 | Sas Institute Inc. | Display screen or portion thereof with graphical user interface |
USD898060S1 (en) | 2017-06-05 | 2020-10-06 | Sas Institute Inc. | Display screen or portion thereof with graphical user interface |
US10831789B2 (en) | 2017-09-27 | 2020-11-10 | Oracle International Corporation | Reference attribute query processing for a multi-tenant cloud service |
US10705823B2 (en) | 2017-09-29 | 2020-07-07 | Oracle International Corporation | Application templates and upgrade framework for a multi-tenant identity cloud service |
US10503498B2 (en) | 2017-11-16 | 2019-12-10 | Sas Institute Inc. | Scalable cloud-based time series analysis |
US11050780B2 (en) * | 2017-12-06 | 2021-06-29 | International Business Machines Corporation | Methods and systems for managing security in computing networks |
US10715564B2 (en) | 2018-01-29 | 2020-07-14 | Oracle International Corporation | Dynamic client registration for an identity cloud service |
US11277421B2 (en) * | 2018-02-20 | 2022-03-15 | Citrix Systems, Inc. | Systems and methods for detecting and thwarting attacks on an IT environment |
US10642668B2 (en) * | 2018-04-18 | 2020-05-05 | Open Text GXS ULC | Producer-side prioritization of message processing |
US10817604B1 (en) | 2018-06-19 | 2020-10-27 | Architecture Technology Corporation | Systems and methods for processing source codes to detect non-malicious faults |
US10749890B1 (en) | 2018-06-19 | 2020-08-18 | Architecture Technology Corporation | Systems and methods for improving the ranking and prioritization of attack-related events |
US11055128B2 (en) | 2018-07-30 | 2021-07-06 | Open Text GXS ULC | System and method for request isolation |
US11321187B2 (en) | 2018-10-19 | 2022-05-03 | Oracle International Corporation | Assured lazy rollback for a multi-tenant identity cloud service |
CN109684877A (en) * | 2018-12-12 | 2019-04-26 | 深圳互联先锋科技有限公司 | Monitoring method, device and the computer readable storage medium of data integrity |
US11429713B1 (en) | 2019-01-24 | 2022-08-30 | Architecture Technology Corporation | Artificial intelligence modeling for cyber-attack simulation protocols |
US11128654B1 (en) | 2019-02-04 | 2021-09-21 | Architecture Technology Corporation | Systems and methods for unified hierarchical cybersecurity |
US11423111B2 (en) | 2019-02-25 | 2022-08-23 | Oracle International Corporation | Client API for rest based endpoints for a multi-tenant identify cloud service |
US11792226B2 (en) | 2019-02-25 | 2023-10-17 | Oracle International Corporation | Automatic api document generation from scim metadata |
US11887505B1 (en) | 2019-04-24 | 2024-01-30 | Architecture Technology Corporation | System for deploying and monitoring network-based training exercises |
US11403405B1 (en) | 2019-06-27 | 2022-08-02 | Architecture Technology Corporation | Portable vulnerability identification tool for embedded non-IP devices |
US11870770B2 (en) | 2019-09-13 | 2024-01-09 | Oracle International Corporation | Multi-tenant identity cloud service with on-premise authentication integration |
US11687378B2 (en) | 2019-09-13 | 2023-06-27 | Oracle International Corporation | Multi-tenant identity cloud service with on-premise authentication integration and bridge high availability |
US11444974B1 (en) | 2019-10-23 | 2022-09-13 | Architecture Technology Corporation | Systems and methods for cyber-physical threat modeling |
US11503075B1 (en) | 2020-01-14 | 2022-11-15 | Architecture Technology Corporation | Systems and methods for continuous compliance of nodes |
CN112351016B (en) * | 2020-10-28 | 2022-09-06 | 河南信大网御科技有限公司 | One-to-many telnet remote communication method, mimicry defense architecture and medium |
US11363048B1 (en) | 2021-03-25 | 2022-06-14 | Bank Of America Corporation | Information security system and method for security threat detection in data transmission |
CN113448562B (en) * | 2021-03-31 | 2023-10-20 | 北京新氧科技有限公司 | Automatic logic code generation method and device and electronic equipment |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6311274B1 (en) * | 1997-12-15 | 2001-10-30 | Intel Corporation | Network alert handling system and method |
US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
US6408391B1 (en) | 1998-05-06 | 2002-06-18 | Prc Inc. | Dynamic system defense for information warfare |
WO2003029934A1 (en) | 2001-09-28 | 2003-04-10 | British Telecommunications Public Limited Company | Agent-based intrusion detection system |
-
2002
- 2002-01-10 WO PCT/US2002/000900 patent/WO2002056152A2/en active Search and Examination
- 2002-01-10 AT AT02705761T patent/ATE419574T1/en not_active IP Right Cessation
- 2002-01-10 CN CNB028048385A patent/CN1295904C/en not_active Expired - Fee Related
- 2002-01-10 AU AU2002239889A patent/AU2002239889B2/en not_active Ceased
- 2002-01-10 US US09/683,507 patent/US7058968B2/en active Active
- 2002-01-10 CA CA2434674A patent/CA2434674C/en not_active Expired - Fee Related
- 2002-01-10 DE DE60230601T patent/DE60230601D1/de not_active Expired - Lifetime
- 2002-01-10 EP EP02705761A patent/EP1381928B1/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
DE60230601D1 (en) | 2009-02-12 |
US7058968B2 (en) | 2006-06-06 |
ATE419574T1 (en) | 2009-01-15 |
CN1295904C (en) | 2007-01-17 |
CN1524361A (en) | 2004-08-25 |
CA2434674C (en) | 2010-06-08 |
US20020129264A1 (en) | 2002-09-12 |
EP1381928B1 (en) | 2008-12-31 |
AU2002239889B2 (en) | 2008-01-31 |
EP1381928A4 (en) | 2004-12-15 |
EP1381928A2 (en) | 2004-01-21 |
WO2002056152A3 (en) | 2003-11-06 |
WO2002056152A2 (en) | 2002-07-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2434674A1 (en) | Computer security and management system | |
US11469976B2 (en) | System and method for cloud-based control-plane event monitor | |
CN108369625B (en) | Dual memory introspection for protecting multiple network endpoints | |
AU2002239889A1 (en) | Computer security and management system | |
US20240054234A1 (en) | Methods and systems for hardware and firmware security monitoring | |
US20200327236A1 (en) | Using a Threat Model to Monitor Host Execution in a Virtualized Environment | |
US8478860B2 (en) | Device detection system for monitoring use of removable media in networked computers | |
EP1435030B1 (en) | Stateful reference monitor | |
US7836174B2 (en) | Systems and methods for grid-based data scanning | |
WO2022193513A1 (en) | Docker-based data processing method and related device | |
JP2017508220A (en) | Guaranteed integrity and rebootless updates during runtime | |
KR20040101490A (en) | Detecting and countering malicious code in enterprise networks | |
US7908658B1 (en) | System using IM screener in a client computer to monitor bad reputation web sites in outgoing messages to prevent propagation of IM attacks | |
EP2946327A1 (en) | Systems and methods for identifying and reporting application and file vulnerabilities | |
KR20070065306A (en) | End user risk managemet | |
WO2002097587A2 (en) | Method and system for implementing security devices in a network | |
Kelbert et al. | Data usage control for distributed systems | |
EP1944676B1 (en) | Stateful reference monitor | |
Karygiannis | Network Security Testing Using Mobile Agents. | |
US20230418933A1 (en) | Systems and methods for folder and file sequestration | |
WO2017019551A1 (en) | Systems and methods for providing multi-level network security | |
ÇELİKTAŞ | ISTANBUL TECHNICAL UNIVERSITY★ INFORMATICS INSTITUTE | |
Corsava et al. | Autonomous agents-based security infrastructure | |
Stames | Integrity assessment tools: fundamental protection for business critical systems, data and applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20180110 |