会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 8. 发明授权
    • Integrated network intrusion detection
    • 集成网络入侵检测
    • US08752173B2
    • 2014-06-10
    • US12649018
    • 2009-12-29
    • Satyendra Yadav
    • Satyendra Yadav
    • H04L29/06
    • H04L63/1416H04L63/02H04L63/0218H04L63/0227H04L63/1408H04L63/1425H04L63/1441H04L63/145H04L63/20
    • Intrusion preludes may be detected (including detection using fabricated responses to blocked network requests), and particular sources of network communications may be singled out for greater scrutiny, by performing intrusion analysis on packets blocked by a firewall. An integrated intrusion detection system uses an end-node firewall that is dynamically controlled using invoked-application information and a network policy. The system may use various alert levels to trigger heightened monitoring states, alerts sent to a security operation center, and/or logging of network activity for later forensic analysis. The system may monitor network traffic to block traffic that violates the network policy, monitor blocked traffic to detect an intrusion prelude, and monitor traffic from a potential intruder when an intrusion prelude is detected. The system also may track behavior of applications using the network policy to identify abnormal application behavior, and monitor traffic from an abnormally behaving application to identify an intrusion.
    • 可以检测到入侵前提(包括使用对阻塞的网络请求的制造响应的检测),并且可以通过对由防火墙阻止的分组进行入侵分析来选择特定的网络通信源来进行更大的检查。 集成入侵检测系统使用通过调用的应用程序信息和网络策略动态控制的终端节点防火墙。 系统可以使用各种警报级别来触发更高的监视状态,发送到安全操作中心的警报和/或记录网络活动以供稍后的法庭分析。 系统可以监视网络流量以阻止违反网络策略的流量,监视阻止的流量以检测入侵前奏,并且在检测到入侵前奏时监视来自潜在入侵者的流量。 该系统还可以跟踪使用网络策略的应用程序的行为,以识别异常应用程序行为,并监视来自异常行为的应用程序的流量以识别入侵。
    • 9. 发明申请
    • Integrated Network Intrusion Detection
    • 综合网络入侵检测
    • US20100122317A1
    • 2010-05-13
    • US12649018
    • 2009-12-29
    • Satyendra Yadav
    • Satyendra Yadav
    • G06F21/00G06F11/30
    • H04L63/1416H04L63/02H04L63/0218H04L63/0227H04L63/1408H04L63/1425H04L63/1441H04L63/145H04L63/20
    • Intrusion preludes may be detected (including detection using fabricated responses to blocked network requests), and particular sources of network communications may be singled out for greater scrutiny, by performing intrusion analysis on packets blocked by a firewall. An integrated intrusion detection system uses an end-node firewall that is dynamically controlled using invoked-application information and a network policy. The system may use various alert levels to trigger heightened monitoring states, alerts sent to a security operation center, and/or logging of network activity for later forensic analysis. The system may monitor network traffic to block traffic that violates the network policy, monitor blocked traffic to detect an intrusion prelude, and monitor traffic from a potential intruder when an intrusion prelude is detected. The system also may track behavior of applications using the network policy to identify abnormal application behavior, and monitor traffic from an abnormally behaving application to identify an intrusion.
    • 可以检测到入侵前提(包括使用对阻塞的网络请求的制造响应的检测),并且可以通过对由防火墙阻止的分组进行入侵分析来选择特定的网络通信源来进行更大的检查。 集成入侵检测系统使用通过调用的应用程序信息和网络策略动态控制的终端节点防火墙。 系统可以使用各种警报级别来触发更高的监视状态,发送到安全操作中心的警报和/或记录网络活动以供稍后的法庭分析。 系统可以监视网络流量以阻止违反网络策略的流量,监视阻止的流量以检测入侵前奏,并且在检测到入侵前奏时监视来自潜在入侵者的流量。 该系统还可以跟踪使用网络策略的应用程序的行为,以识别异常应用程序行为,并监视来自异常行为的应用程序的流量以识别入侵。
    • 10. 发明授权
    • Method and apparatus for enforcing network security policies
    • 执行网络安全策略的方法和装置
    • US07448067B2
    • 2008-11-04
    • US10261828
    • 2002-09-30
    • Satyendra Yadav
    • Satyendra Yadav
    • H04L29/00
    • H04L63/0227H04L63/20
    • The invention is a system and method for applying a uniform network security policy. The security policy is described using a computer-readable file. The computer-readable file may be filtered and/or translated into other files that may be used as inputs to security devices. An example of one such security device is a remote system security controller, which is responsible for ensuring that remote devices outside the corporate network enforce the corporate security policy. In addition, the system is capable of updating the security policy of all network components based on feedback received from one or more devices.
    • 本发明是应用统一网络安全策略的系统和方法。 使用计算机可读文件描述安全策略。 计算机可读文件可以被过滤和/或翻译成可用作安全设备的输入的其他文件。 一个这样的安全设备的示例是远程系统安全控制器,其负责确保企业网络之外的远程设备执行公司安全策略。 此外,该系统能够基于从一个或多个设备接收的反馈来更新所有网络组件的安全策略。