WO2006034201A3 - Quarantine network - Google Patents

Quarantine network Download PDF

Info

Publication number
WO2006034201A3
WO2006034201A3 PCT/US2005/033495 US2005033495W WO2006034201A3 WO 2006034201 A3 WO2006034201 A3 WO 2006034201A3 US 2005033495 W US2005033495 W US 2005033495W WO 2006034201 A3 WO2006034201 A3 WO 2006034201A3
Authority
WO
WIPO (PCT)
Prior art keywords
network
security
host
vulnerabilities
attempt
Prior art date
Application number
PCT/US2005/033495
Other languages
French (fr)
Other versions
WO2006034201A2 (en
Inventor
Aron Hall
Andrew B Bernard
Original Assignee
Hobnob Inc
Aron Hall
Andrew B Bernard
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hobnob Inc, Aron Hall, Andrew B Bernard filed Critical Hobnob Inc
Publication of WO2006034201A2 publication Critical patent/WO2006034201A2/en
Publication of WO2006034201A3 publication Critical patent/WO2006034201A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Abstract

Various network security systems and methods are provided. The system (104) can apply security policies based on user and/or system responses to security probes generated by the system. The system can automatically apply prophylactic protection to an end user network host to prevent the host from being exploited by various types of attacks or malicious network traffic (106). The system may also be configured to attempt to exploit unpatched security vulnerabilities on a target system or network (106). If the exploitation attempt is successful, network access to the vulnerable system can be restricted until the vulnerabilities are corrected.
PCT/US2005/033495 2004-09-17 2005-09-19 Quarantine network WO2006034201A2 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US61076404P 2004-09-17 2004-09-17
US60/610,764 2004-09-17

Publications (2)

Publication Number Publication Date
WO2006034201A2 WO2006034201A2 (en) 2006-03-30
WO2006034201A3 true WO2006034201A3 (en) 2006-06-29

Family

ID=36090575

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2005/033495 WO2006034201A2 (en) 2004-09-17 2005-09-19 Quarantine network

Country Status (1)

Country Link
WO (1) WO2006034201A2 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9705911B2 (en) 2005-06-30 2017-07-11 Nokia Technologies Oy System and method for using quarantine networks to protect cellular networks from viruses and worms
US7979569B2 (en) * 2005-12-01 2011-07-12 Firestar Software, Inc. System and method for exchanging information among exchange applications
US8532303B2 (en) 2007-12-14 2013-09-10 Intel Corporation Symmetric key distribution framework for the internet
CN101877710B (en) * 2010-07-13 2012-10-17 成都市华为赛门铁克科技有限公司 Proxy gateway anti-virus implement method, pre-sorter and proxy gateway
US10022073B2 (en) 2015-03-20 2018-07-17 Intel Corproation Wearable apparatus with a stretch sensor

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6131163A (en) * 1998-02-17 2000-10-10 Cisco Technology, Inc. Network gateway mechanism having a protocol stack proxy
US20030056116A1 (en) * 2001-05-18 2003-03-20 Bunker Nelson Waldo Reporter
US6550012B1 (en) * 1998-12-11 2003-04-15 Network Associates, Inc. Active firewall system and methodology
US20030163728A1 (en) * 2002-02-27 2003-08-28 Intel Corporation On connect security scan and delivery by a network security authority
US6772345B1 (en) * 2002-02-08 2004-08-03 Networks Associates Technology, Inc. Protocol-level malware scanner

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6131163A (en) * 1998-02-17 2000-10-10 Cisco Technology, Inc. Network gateway mechanism having a protocol stack proxy
US6550012B1 (en) * 1998-12-11 2003-04-15 Network Associates, Inc. Active firewall system and methodology
US20030056116A1 (en) * 2001-05-18 2003-03-20 Bunker Nelson Waldo Reporter
US6772345B1 (en) * 2002-02-08 2004-08-03 Networks Associates Technology, Inc. Protocol-level malware scanner
US20030163728A1 (en) * 2002-02-27 2003-08-28 Intel Corporation On connect security scan and delivery by a network security authority

Also Published As

Publication number Publication date
WO2006034201A2 (en) 2006-03-30

Similar Documents

Publication Publication Date Title
Khan et al. Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid
US7225468B2 (en) Methods and apparatus for computer network security using intrusion detection and prevention
EP1895738B1 (en) Intelligent network interface controller
US7984493B2 (en) DNS based enforcement for confinement and detection of network malicious activities
US20070005987A1 (en) Wireless detection and/or containment of compromised electronic devices in multiple power states
US20070294759A1 (en) Wireless network control and protection system
JP2006074760A (en) Enabling network device inside virtual network to keep up communication while network communication is restricted due to security threat
WO2006034201A3 (en) Quarantine network
Watkins et al. Hack the stack: Using snort and ethereal to master the 8 layers of an insecure network
JP4304249B2 (en) Scanning attack intrusion prevention device
KR102035582B1 (en) Apparatus and method for attack source traceback
Tankard New rules for combating new threats
Толстых et al. Analytical review of methods of information security in wireless networks
Al-Akhras Wireless network security implementation in universities
Hommes et al. Detecting stealthy backdoors with association rule mining
Valli Wireless Snort-A WIDS in progress.
Yosinov et al. IPS (Intrusion Prevention System) and IDS (Intrusion Detection Systems)
PANJuan Security risk analysis and countermeasures for intelligent video surveillance device
Klein Prevent viruses on enterprise WLANs.
Osmëni et al. Introduction to Cyber Tensions Preventative Analysis and Honeypotting Strategy
Harrison et al. A protocol layer survey of network security
Tolly Space invaders: you and WIPS
MELIKHOVA et al. INTERNET OF THINGS: SECURITY OF SMART THINGS
Kaur et al. An Empirical study on Network security threats and Solutions.
Singh et al. Wlan security their vulnerability, threats and alternative solutions

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV LY MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU LV MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase