会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 41. 发明授权
    • Systems, methods, and media for enforcing a security policy in a network including a plurality of components
    • 用于在包括多个组件的网络中执行安全策略的系统,方法和媒体
    • US08516575B2
    • 2013-08-20
    • US12632934
    • 2009-12-08
    • Matthew BurnsideAngelos D. Keromytis
    • Matthew BurnsideAngelos D. Keromytis
    • H04L29/06G06F11/00G06F12/14G06F12/16G08B23/00
    • H04L63/0263G06F2221/2101H04L63/1416H04L63/1425
    • Systems, methods, and media for enforcing a security policy in a network are provided, including, for example, receiving a plurality of events describing component behavior detected by a plurality of sensors, each sensor monitoring a different component of a plurality of components; attributing a first event of the plurality of events to a first principal; attributing a second event of the plurality of events to a second principal; determining whether the first and second events are correlated; storing a data structure that attributes each of the first and second events to the first principal, if it is determined that the first and second events are correlated; comparing the second event to the security policy; and modifying network behavior to enforce the security policy against the first principal based on the comparison of the second event to the security policy and the attribution of the second event to the first principal.
    • 提供了用于在网络中实施安全策略的系统,方法和媒体,包括例如接收描述由多个传感器检测到的组件行为的多个事件,每个传感器监视多个组件的不同组件; 将所述多个事件的第一事件归因于第一主体; 将所述多个事件的第二事件归因于第二主体; 确定所述第一和第二事件是否相关; 如果确定所述第一和第二事件相关,则存储将所述第一和第二事件中的每一个归属于所述第一主体的数据结构; 将第二个事件与安全策略进行比较; 以及基于所述第二事件与所述安全策略的比较以及所述第二事件对所述第一主体的归属,修改网络行为以对所述第一主体执行所述安全策略。
    • 43. 发明申请
    • METHODS, MEDIA, AND SYSTEMS FOR DETECTING ANOMALOUS PROGRAM EXECUTIONS
    • 检测异常程序执行的方法,媒体和系统
    • US20120151270A1
    • 2012-06-14
    • US13301741
    • 2011-11-21
    • Salvatore J. StolfoAngelos D. KeromytisStylianos Sidiroglou
    • Salvatore J. StolfoAngelos D. KeromytisStylianos Sidiroglou
    • G06F11/00
    • G06F11/0772G06F11/0718G06F11/0751G06F11/079G06F11/3652
    • Methods, media, and systems for detecting anomalous program executions are provided. In some embodiments, methods for detecting anomalous program executions are provided, comprising: executing at least a part of a program in an emulator; comparing a function call made in the emulator to a model of function calls for the at least a part of the program; and identifying the function call as anomalous based on the comparison. In some embodiments, methods for detecting anomalous program executions are provided, comprising: modifying a program to include indicators of program-level function calls being made during execution of the program; comparing at least one of the indicators of program-level function calls made in the emulator to a model of function calls for the at least a part of the program; and identifying a function call corresponding to the at least one of the indicators as anomalous based on the comparison.
    • 提供了用于检测异常程序执行的方法,介质和系统。 在一些实施例中,提供了用于检测异常程序执行的方法,包括:在仿真器中执行程序的至少一部分; 将在仿真器中产生的函数调用与所述程序的至少一部分的函数调用模型进行比较; 并根据比较将功能调用识别为异常。 在一些实施例中,提供了用于检测异常程序执行的方法,包括:修改程序以包括程序执行期间进行的程序级函数调用的指示; 将在仿真器中进行的程序级功能调用的至少一个指标与所述程序的至少一部分的函数调用模型进行比较; 以及基于所述比较,将与所述至少一个所述指示符相对应的功能调用识别为异常。