会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 3. 发明授权
    • Mechanism to correlate the presence of worms in a network
    • 关联网络中蠕虫的存在的机制
    • US07971256B2
    • 2011-06-28
    • US11254592
    • 2005-10-20
    • Bhargav BhikkajiBalaji Venkat
    • Bhargav BhikkajiBalaji Venkat
    • G06F11/00G06F12/14G06F12/16G08B23/00
    • H04L63/145H04L63/1408
    • A method and a system for preventing a network attack, the attack being caused by the presence of worms in the network, is provided. The method includes determining the number of packets being transmitted from each source in the network to a plurality of destinations, the packets being transmitted from a source with a set of characteristics. If the number of packets with the set of characteristics, being transmitted from a source, exceeds a predefined first threshold, then the signature of the packets is stored. Subsequently, if at least one of the pluralities of destinations of the packets identified with the source becomes a source of new packets, the new packets being transmitted to more than one destination; then the new packets are compared with the signature. If at least one new packet matches with the signature, then the worm is to be detected.
    • 提供了一种用于防止网络攻击的方法和系统,该攻击是由网络中蠕虫的存在引起的。 该方法包括确定从网络中的每个源发送到多个目的地的分组的数量,该分组是从具有一组特征的源发送的。 如果从源发送的具有一组特征的分组的数量超过预定义的第一阈值,则存储分组的签名。 随后,如果用源标识的分组的多个目的地中的至少一个成为新分组的源,则新分组被发送到多于一个目的地; 那么将新的数据包与签名进行比较。 如果至少有一个新的数据包与签名相匹配,则会检测该蠕虫。
    • 4. 发明申请
    • Mechanism to correlate the presence of worms in a network
    • 关联网络中蠕虫的存在的机制
    • US20070094730A1
    • 2007-04-26
    • US11254592
    • 2005-10-20
    • Bhargav BhikkajiBalaji Venkat
    • Bhargav BhikkajiBalaji Venkat
    • G06F12/14
    • H04L63/145H04L63/1408
    • A method and a system for preventing a network attack, the attack being cause by the presence of worms in the network, is provided. The method includes determining the number of packets being transmitted from each source in the network to a plurality of destinations, the packets being transmitted from a source with a set of characteristics. If the number of packets with the set of characteristics, being transmitted from a source, exceeds a predefined first threshold, then the signature of the packets is stored. Subsequently, if at least one of the pluralities of destinations of the packets identified with the source becomes a source of new packets, the new packets being transmitted to more than one destination; then the new packets are compared with the signature. If at least one new packet matches with the signature, then the worm is to be detected.
    • 提供一种用于防止网络攻击的方法和系统,该网络中存在蠕虫引起的攻击。 该方法包括确定从网络中的每个源发送到多个目的地的分组的数量,该分组是从具有一组特征的源发送的。 如果从源发送的具有一组特征的分组的数量超过预定义的第一阈值,则存储分组的签名。 随后,如果用源标识的分组的多个目的地中的至少一个成为新分组的源,则新分组被发送到多于一个目的地; 那么将新的数据包与签名进行比较。 如果至少有一个新的数据包与签名相匹配,则会检测该蠕虫。
    • 6. 发明授权
    • Apparatus and methods for providing an application level gateway for use in networks
    • 用于提供在网络中使用的应用级网关的装置和方法
    • US07788407B1
    • 2010-08-31
    • US10914444
    • 2004-08-09
    • Balaji VenkatKaushik NarayanManokar NamasivayanShankar Sthanuretnam
    • Balaji VenkatKaushik NarayanManokar NamasivayanShankar Sthanuretnam
    • G06F15/16G06F15/173
    • G06F17/30876H04L29/12047H04L29/12386H04L29/12556H04L61/15H04L61/2521H04L61/2585H04L67/1002H04L67/1014
    • An application level gateway allows computers on a local area or “internal” network to serve data (e.g., web pages, files or other constructs) to computer systems on an external or public network such as the Internet, even though references such as hostnames and/or network addresses within the internal network that are contained within the data (e.g., URLs in web pages) might not be compatible (e.g., DNS resolvable or routable) with the external network. The system detects, in a portion of data (e.g., a web page), a local reference to a computer system on the internal network, determines whether a computer system identifier is mapped to the computer system specified in the local reference, and replaces the local reference with a translated reference obtained from the mapping. The translated reference contains the computer system identifier and a reference to a gateway computer system coupled to the internal network, such that subsequent referrals to the translated reference are directed to the gateway computer system. When a request for the data is subsequently received, the gateway performs a reverse mapping to determine the identity of the computer system on the internal network.
    • 应用级网关允许本地或“内部”网络上的计算机向诸如因特网的外部或公共网络上的计算机系统提供数据(例如,网页,文件或其他结构),即使诸如主机名和 /或包含在数据内的内部网络中的网络地址(例如,网页中的URL)可能与外部网络不兼容(例如,DNS可解析或可路由)。 该系统在一部分数据(例如网页)中检测对内部网络上的计算机系统的本地引用,确定计算机系统标识符是否映射到本地引用中指定的计算机系统,并且替换 使用从映射获取的转换引用的本地引用。 经翻译的参考文献包含计算机系统标识符和对与内部网络耦合的网关计算机系统的引用,使得到翻译的引用的后续引用被引导到网关计算机系统。 当随后接收到对数据的请求时,网关执行反向映射以确定内部网络上的计算机系统的身份。