会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 1. 发明申请
    • MECHANISM FOR IDENTIFYING MALICIOUS CONTENT, DoS ATTACKS, AND ILLEGAL IPTV SERVICES
    • 识别恶意内容的机制,DoS攻击和非法IPTV服务
    • US20100071062A1
    • 2010-03-18
    • US12233561
    • 2008-09-18
    • VINOD K. CHOYIPIERRICK GUINGOFAUD A. KHAN
    • VINOD K. CHOYIPIERRICK GUINGOFAUD A. KHAN
    • G06F21/00
    • H04L63/1408H04L41/0213H04L63/1441H04L65/4076H04L2463/141H04N21/6405H04N21/64322H04N21/64723
    • Mechanism for identifying malicious content, DoS attacks, and illegal IPTV services. By monitoring the characteristics of various control messages being transmitted within a network that services Internet protocol television (IPTV) content to identify suspicious behavior (e.g., such as that associated with malicious content, denial of service (DoS) attacks, IPTV service stealing, etc.). In addition to monitoring control messages within such a network, deep packet inspection (DPI) may be performed for individual packets within an IPTV stream to identify malicious content therein (e.g., worms, viruses, etc. actually within the IPTV stream itself). By monitoring control messages and/or actual IPTV content within a network (e.g., vs. at the perimeter of a network only), protection against both outside and inside attacks can be effectuated. This network level basis of operation effectively guards against promulgation of malicious content to other devices within the network.
    • 识别恶意内容,DoS攻击和非法IPTV服务的机制。 通过监视在网络内正在传输的各种控制消息的特征,服务于互联网协议电视(IPTV)内容以识别可疑行为(例如与恶意内容,拒绝服务(DoS)攻击,IPTV服务窃取等)相关联的行为 。)。 除了监视这样的网络内的控制消息之外,可以对IPTV流内的各个分组执行深度分组检查(DPI),以识别其中的实际在IPTV流本身内的恶意内容(例如,蠕虫,病毒等)。 通过监视网络内的控制消息和/或实际IPTV内容(例如,仅在网络的周边),可以实现对外部和内部攻击的保护。 这种网络级操作基础有效防止恶意内容向网络内的其他设备发布。
    • 2. 发明授权
    • Mechanism for identifying malicious content, DoS attacks, and illegal IPTV services
    • 识别恶意内容,DoS攻击和非法IPTV服务的机制
    • US08769682B2
    • 2014-07-01
    • US12233561
    • 2008-09-18
    • Vinod K. ChoyiPierrick GuingoFaud A. Khan
    • Vinod K. ChoyiPierrick GuingoFaud A. Khan
    • H04L29/06H04L12/24
    • H04L63/1408H04L41/0213H04L63/1441H04L65/4076H04L2463/141H04N21/6405H04N21/64322H04N21/64723
    • Mechanism for identifying malicious content, DoS attacks, and illegal IPTV services. By monitoring the characteristics of various control messages being transmitted within a network that services Internet protocol television (IPTV) content to identify suspicious behavior (e.g., such as that associated with malicious content, denial of service (DoS) attacks, IPTV service stealing, etc.). In addition to monitoring control messages within such a network, deep packet inspection (DPI) may be performed for individual packets within an IPTV stream to identify malicious content therein (e.g., worms, viruses, etc. actually within the IPTV stream itself). By monitoring control messages and/or actual IPTV content within a network (e.g., vs. at the perimeter of a network only), protection against both outside and inside attacks can be effectuated. This network level basis of operation effectively guards against promulgation of malicious content to other devices within the network.
    • 识别恶意内容,DoS攻击和非法IPTV服务的机制。 通过监视在网络内正在传输的各种控制消息的特征,服务于互联网协议电视(IPTV)内容以识别可疑行为(例如与恶意内容,拒绝服务(DoS)攻击,IPTV服务窃取等)相关联的行为 。)。 除了监视这样的网络内的控制消息之外,可以对IPTV流内的各个分组执行深度分组检查(DPI),以识别其中的实际在IPTV流本身内的恶意内容(例如,蠕虫,病毒等)。 通过监视网络内的控制消息和/或实际IPTV内容(例如,仅在网络的周边),可以实现对外部和内部攻击的保护。 这种网络级操作基础有效防止恶意内容向网络内的其他设备发布。
    • 5. 发明申请
    • Routing configuration validation apparatus and methods
    • 路由配置验证设备和方法
    • US20070047464A1
    • 2007-03-01
    • US11213010
    • 2005-08-26
    • Pierrick GuingoFernando Cuervo
    • Pierrick GuingoFernando Cuervo
    • H04L12/28
    • H04L41/00H04L45/00
    • Apparatus, methods, and related data structures for validating a routing configuration in a communication system are disclosed. Routing information in a communication system is passively collected, illustratively from routing protocol advertisement messages. A routing configuration of the communication system is validated based on the collected routing information. Validation may involve comparing information associated with electronic addresses in an address space of the communication system with the collected routing information, and also or instead comparing an intended routing configuration with an explicit routing configuration, for example. A data structure may include information indicating an electronic address and information indicating a result of validating a routing configuration associated with the electronic address.
    • 公开了用于验证通信系统中的路由配置的装置,方法和相关数据结构。 说明性地从路由协议广告消息收集通信系统中的路由信息​​。 基于所收集的路由信息​​,对通信系统的路由配置进行验证。 验证可以包括将与通信系统的地址空间中的电子地址相关联的信息与收集的路由信息​​进行比较,并且还可以或者替代地将预期路由配置与显式路由配置进行比较。 数据结构可以包括指示电子地址的信息和指示验证与电子地址相关联的路由配置的结果的信息。
    • 6. 发明授权
    • Packet sequence number network monitoring system
    • 分组序列号网络监控系统
    • US07313141B2
    • 2007-12-25
    • US10267813
    • 2002-10-09
    • Chao KanPierrick GuingoEmanuele JonesHubert OgierThierry Labbe
    • Chao KanPierrick GuingoEmanuele JonesHubert OgierThierry Labbe
    • H04L12/28H04L12/56
    • H04L69/16H04L41/0213H04L41/5009H04L43/00H04L43/026H04L43/028H04L43/0817H04L43/0829H04L43/0858H04L43/087H04L43/0888H04L43/12H04L43/16H04L43/18
    • A network monitoring system (60). The system comprises storage circuitry (32) for storing network packet information, wherein the network packet information includes a predicted identifier. The network monitoring system also comprises at least one monitoring circuit (36) coupled to a network (70) along which network traffic flows in a form of packets. The at least one monitoring circuit programmed to perform the steps (44) of receiving a packet communicated along the network and determining whether the received packet is communicated between a source and destination in a first set of network nodes. Each packet in a sequence of communications between the source and the destination comprises a packet identifier that uniquely identifies the packet from all other communications in a flow between the source and the destination. The at least one monitoring circuit programmed to perform the step of, responsive to determining the received packet is communicated between a source and destination in the first set of network nodes, comparing the packet identifier of the received packet to the predicted identifier to determine an identifier deviation between the packet identifier and the predicted identifier for identifying an irregularity in the network traffic.
    • 网络监控系统(60)。 该系统包括用于存储网络分组信息的存储电路(32),其中网络分组信息包括预测的标识符。 网络监视系统还包括耦合到网络(70)的至少一个监控电路(36),网络业务以这种形式以分组形式流过网络。 所述至少一个监视电路被编程为执行步骤(44),以接收沿着所述网络传送的分组,并且确定所接收的分组是否在第一组网络节点中的源和目的地之间通信。 源和目的地之间的一系列通信中的每个分组包括从源和目的地之间的流中的所有其他通信唯一地标识分组的分组标识符。 所述至少一个监视电路被编程为响应于确定所接收的分组在所述第一组网络节点中的源和目的地之间进行通信,将所接收分组的分组标识符与所述预测标识符进行比较,以确定标识符 分组标识符与用于识别网络业务中的不规则性的预测标识符之间的偏差。
    • 10. 发明授权
    • Passive network monitoring system
    • 被动网络监控系统
    • US07483379B2
    • 2009-01-27
    • US10147830
    • 2002-05-17
    • Chao KanPierrick Guingo
    • Chao KanPierrick Guingo
    • G06F11/00H04L12/26
    • H04L43/0829H04L43/08H04L43/16
    • A network monitoring system (10). The system comprises a database (32) and at least one monitoring circuit (36) coupled to a network (20). Network traffic flows along the network in a form of packets. The at least one monitoring circuit is programmed to perform the steps of receiving a packet communicated along the network and determining whether data in the packet satisfies a rule set. Further, the at least one monitoring circuit is responsive to determining that data in the packet satisfies a rule set by copying information relating to the packet to be stored into the database. The system also comprises circuitry for querying the information communicated by the at least one monitoring circuit to the database to identify an irregularity in the network traffic.
    • 网络监控系统(10)。 该系统包括数据库(32)和耦合到网络(20)的至少一个监控电路(36)。 网络流量沿着网络以数据包的形式流动。 至少一个监控电路被编程为执行接收沿着网络传送的分组并确定分组中的数据是否满足规则集的步骤。 此外,至少一个监视电路响应于通过复制与要存储到数据库中的数据包相关的信息来确定分组中的数据满足规则集。 该系统还包括用于向数据库查询由至少一个监控电路传送的信息以识别网络业务中的不规则性的电路。