会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • SYSTEMS, METHODS, AND MEDIA FOR ENFORCING A SECURITY POLICY IN A NETWORK INCLUDING A PLURALITY OF COMPONENTS
    • 用于执行网络中的安全策略的系统,方法和媒体,包括大量组件
    • US20100235879A1
    • 2010-09-16
    • US12632934
    • 2009-12-08
    • Matthew BurnsideAngelos D. Keromytis
    • Matthew BurnsideAngelos D. Keromytis
    • G06F11/00G06F17/00H04L29/06G06F15/16G06F17/30
    • H04L63/0263G06F2221/2101H04L63/1416H04L63/1425
    • Systems, methods, and media for enforcing a security policy in a network are provided, including, for example, receiving a plurality of events describing component behavior detected by a plurality of sensors, each sensor monitoring a different component of a plurality of components; attributing a first event of the plurality of events to a first principal; attributing a second event of the plurality of events to a second principal; determining whether the first and second events are correlated; storing a data structure that attributes each of the first and second events to the first principal, if it is determined that the first and second events are correlated; comparing the second event to the security policy; and modifying network behavior to enforce the security policy against the first principal based on the comparison of the second event to the security policy and the attribution of the second event to the first principal.
    • 提供了用于在网络中实施安全策略的系统,方法和媒体,包括例如接收描述由多个传感器检测到的组件行为的多个事件,每个传感器监视多个组件的不同组件; 将所述多个事件的第一事件归因于第一主体; 将所述多个事件的第二事件归因于第二主体; 确定所述第一和第二事件是否相关; 如果确定所述第一和第二事件相关,则存储将所述第一和第二事件中的每一个归属于所述第一主体的数据结构; 将第二个事件与安全策略进行比较; 以及基于所述第二事件与所述安全策略的比较以及所述第二事件对所述第一主体的归属,修改网络行为以对所述第一主体执行所述安全策略。
    • 2. 发明授权
    • Systems, methods, and media for enforcing a security policy in a network including a plurality of components
    • 用于在包括多个组件的网络中执行安全策略的系统,方法和媒体
    • US08516575B2
    • 2013-08-20
    • US12632934
    • 2009-12-08
    • Matthew BurnsideAngelos D. Keromytis
    • Matthew BurnsideAngelos D. Keromytis
    • H04L29/06G06F11/00G06F12/14G06F12/16G08B23/00
    • H04L63/0263G06F2221/2101H04L63/1416H04L63/1425
    • Systems, methods, and media for enforcing a security policy in a network are provided, including, for example, receiving a plurality of events describing component behavior detected by a plurality of sensors, each sensor monitoring a different component of a plurality of components; attributing a first event of the plurality of events to a first principal; attributing a second event of the plurality of events to a second principal; determining whether the first and second events are correlated; storing a data structure that attributes each of the first and second events to the first principal, if it is determined that the first and second events are correlated; comparing the second event to the security policy; and modifying network behavior to enforce the security policy against the first principal based on the comparison of the second event to the security policy and the attribution of the second event to the first principal.
    • 提供了用于在网络中实施安全策略的系统,方法和媒体,包括例如接收描述由多个传感器检测到的组件行为的多个事件,每个传感器监视多个组件的不同组件; 将所述多个事件的第一事件归因于第一主体; 将所述多个事件的第二事件归因于第二主体; 确定所述第一和第二事件是否相关; 如果确定所述第一和第二事件相关,则存储将所述第一和第二事件中的每一个归属于所述第一主体的数据结构; 将第二个事件与安全策略进行比较; 以及基于所述第二事件与所述安全策略的比较以及所述第二事件对所述第一主体的归属,修改网络行为以对所述第一主体执行所述安全策略。
    • 5. 发明授权
    • Systems and methods for inhibiting attacks with a network
    • 用于抑制网络攻击的系统和方法
    • US09344418B2
    • 2016-05-17
    • US14103430
    • 2013-12-11
    • Angelos StavrouAngelos D. Keromytis
    • Angelos StavrouAngelos D. Keromytis
    • H04L29/06
    • H04L63/1458H04L63/08H04L63/0823H04L63/12H04L63/123H04L63/1416H04L2463/141
    • Systems and methods for inhibiting attacks with a network are provided. In some embodiments, methods for inhibiting attacks by forwarding packets through a plurality of intermediate nodes when being transmitted from a source node to a destination node are provided, the methods comprising: receiving a packet at one of the plurality of intermediate nodes; determining at the selected intermediate node whether the packet has been sent to the correct one of the plurality of intermediate nodes based on a pseudo random function; and forwarding the packet to the destination node, based on the determining. In some embodiments an intermediate node is selected based on a pseudo random function. In some embodiments, systems and methods for establishing access to a multi-path network are provided.
    • 提供了用于抑制网络攻击的系统和方法。 在一些实施例中,提供了当从源节点发送到目的地节点时通过将多个中间节点转发分组来抑制攻击的方法,所述方法包括:在所述多个中间节点之一处接收分组; 在所选择的中间节点处,确定所述分组是否已经基于伪随机函数发送到所述多个中间节点中的正确的一个; 以及基于所述确定将所述分组转发到所述目的地节点。 在一些实施例中,基于伪随机函数来选择中间节点。 在一些实施例中,提供了用于建立对多路径网络的访问的系统和方法。