CA2537882A1 - High-performance network content analysis platform - Google Patents
High-performance network content analysis platform Download PDFInfo
- Publication number
- CA2537882A1 CA2537882A1 CA002537882A CA2537882A CA2537882A1 CA 2537882 A1 CA2537882 A1 CA 2537882A1 CA 002537882 A CA002537882 A CA 002537882A CA 2537882 A CA2537882 A CA 2537882A CA 2537882 A1 CA2537882 A1 CA 2537882A1
- Authority
- CA
- Canada
- Prior art keywords
- network data
- data
- information
- client
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
Abstract
One implementation of a method reassembles complete client-server conversation streams, applies decoders and/or decompressors, and analyzes the resulting data stream using multi-dimensional content profiling and/or weighted keyword-in-context. The method may detect the extrusion of the data, for example, even if the data has been modified from its original form and/or document type. The decoders may also uncover hidden transport mechanisms such as, for example, e-mail attachments. The method may further detect unauthorized (e.g., rogue) encrypted sessions and stop data transfers deemed malicious. The method allows, for example, for building 2 Gbps (Full-Duplex)-capable extrusion prevention machines.
Claims (23)
1. A method comprising:
receiving network data;
reassembling a client-server communications session from the network data; and detecting, through the network data, leaks of information by analyzing the client-server communications session using at least one of (i) statistical and (ii) keyword -based detection.
receiving network data;
reassembling a client-server communications session from the network data; and detecting, through the network data, leaks of information by analyzing the client-server communications session using at least one of (i) statistical and (ii) keyword -based detection.
2. The method of claim 1, further comprising decoding the client-server communications session to detect and inspect one or more application protocols, and wherein the client-server communications session includes the one or more application protocols.
3. The method of claim 2, wherein the one or more application protocols includes at least one of (i) pdf, (ii) http, (iii) e-mail, (iv) e-mail attachment, (v) ftp, (vi) zip, (vii) ms word, (viii) ms excel, (ix) html, (x) xml, (xi) gzip, (xii) tar and (xiii) plain text.
4. The method of claim 1, wherein the client-server communications session includes at least one of (i) TCP, (ii) IP and (iii) ethernet.
5. The method of claim 1, wherein the statistical-based detection includes multi-dimensional content profiling.
6. The method of claim 1, wherein the statistical-based detection includes domain-specific high-level features.
7. The method of claim 6, wherein the domain-specific high-level features includes at least one of (i) social security numbers, (ii) credit card numbers, (iii) postal addresses and (iv) e-mail addresses.
8. The method of claim 1, wherein the keyword-based detection includes one or more weighted keywords.
9. The method of claim 1, wherein the information includes a digital asset.
10. The method of claim 1, further including analyzing the network data so as to detect any unauthorized encrypted session.
11. A method comprising:
receiving network communications; and preventing an unauthorized and/or malicious transfer, through the network communications, of data by providing at least content reassembly, scanning and recognition to the network communications in real time.
receiving network communications; and preventing an unauthorized and/or malicious transfer, through the network communications, of data by providing at least content reassembly, scanning and recognition to the network communications in real time.
12. The method of claim 11, wherein the content scanning and recognition includes multi-dimensional content profiling.
13. The method of claim 11, wherein the content scanning and recognition is tailored to local data.
14. The method of claim 11, wherein the method is capable of preventing the unauthorized and/or malicious transfer, through the network communications, of data on fully saturated Gigabit speeds.
15. A method comprising:
receiving network data; and preventing, through the network data, leaks of information by at least applying multi-dimensional content profiling.
receiving network data; and preventing, through the network data, leaks of information by at least applying multi-dimensional content profiling.
16. The method of claim 15, wherein the information includes a digital asset.
17. The method of claim 15, wherein the multi-dimensional content profiling takes into account the structure of the information.
18. A machine-readable medium having encoded information, which when read and executed by a machine causes a method comprising:
receiving network data;
reassembling a client-server communications session from the network data; and detecting, through the network data, leaks of information by analyzing the client-server communications session using at least one of (i) statistical and (ii) keyword -based detection.
receiving network data;
reassembling a client-server communications session from the network data; and detecting, through the network data, leaks of information by analyzing the client-server communications session using at least one of (i) statistical and (ii) keyword -based detection.
19. A machine-readable medium having encoded information, which when read and executed by a machine causes a method comprising:
receiving network communications; and preventing an unauthorized and/or malicious transfer, through the network communications, of data by providing at least content reassembly, scanning and recognition to the network communications in real time.
receiving network communications; and preventing an unauthorized and/or malicious transfer, through the network communications, of data by providing at least content reassembly, scanning and recognition to the network communications in real time.
20. A machine-readable medium having encoded information, which when read and executed by a machine causes a method comprising:
receiving network data; and preventing, through the network data, leaks of information by at least applying multi-dimensional content profiling.
receiving network data; and preventing, through the network data, leaks of information by at least applying multi-dimensional content profiling.
21. An apparatus comprising:
a receiver to receive network data;
a processor, coupled to the receiver, to (i) reassemble a client-server communications session from the network data and (ii) detect, through the network data, leaks of information by analyzing the client-server communications session using at least one of (i) statistical and (ii) keyword -based detection.
a receiver to receive network data;
a processor, coupled to the receiver, to (i) reassemble a client-server communications session from the network data and (ii) detect, through the network data, leaks of information by analyzing the client-server communications session using at least one of (i) statistical and (ii) keyword -based detection.
22. An apparatus comprising:
a receiver to receive network communications; and a processor, coupled to the receiver, to prevent an unauthorized and/or malicious transfer, through the network communications, of data by providing at least content reassembly, scanning and recognition to the network communications in real time.
a receiver to receive network communications; and a processor, coupled to the receiver, to prevent an unauthorized and/or malicious transfer, through the network communications, of data by providing at least content reassembly, scanning and recognition to the network communications in real time.
23. An apparatus comprising:
a receiver to receive network data; and a processor, coupled to the receiver, to prevent, through the network data, leaks of information by at least applying multi-dimensional content profiling.
a receiver to receive network data; and a processor, coupled to the receiver, to prevent, through the network data, leaks of information by at least applying multi-dimensional content profiling.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/658,777 US7467202B2 (en) | 2003-09-10 | 2003-09-10 | High-performance network content analysis platform |
US10/658,777 | 2003-09-10 | ||
PCT/US2004/029503 WO2005027539A2 (en) | 2003-09-10 | 2004-09-09 | High-performance network content analysis platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CA2537882A1 true CA2537882A1 (en) | 2005-03-24 |
CA2537882C CA2537882C (en) | 2011-04-05 |
Family
ID=34226847
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA2537882A Expired - Fee Related CA2537882C (en) | 2003-09-10 | 2004-09-09 | High-performance network content analysis platform |
Country Status (8)
Country | Link |
---|---|
US (2) | US7467202B2 (en) |
EP (1) | EP1665818B1 (en) |
JP (2) | JP2007507763A (en) |
CN (1) | CN1965306B (en) |
CA (1) | CA2537882C (en) |
HK (1) | HK1105031A1 (en) |
IL (1) | IL174163A (en) |
WO (1) | WO2005027539A2 (en) |
Families Citing this family (315)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6760772B2 (en) * | 2000-12-15 | 2004-07-06 | Qualcomm, Inc. | Generating and implementing a communication protocol and interface for high data rate signal transfer |
US8812706B1 (en) | 2001-09-06 | 2014-08-19 | Qualcomm Incorporated | Method and apparatus for compensating for mismatched delays in signals of a mobile display interface (MDDI) system |
US7730175B1 (en) | 2003-05-12 | 2010-06-01 | Sourcefire, Inc. | Systems and methods for identifying the services of a network |
US8705579B2 (en) * | 2003-06-02 | 2014-04-22 | Qualcomm Incorporated | Generating and implementing a signal protocol and interface for higher data rates |
AU2003233838A1 (en) * | 2003-06-04 | 2005-01-04 | Inion Ltd | Biodegradable implant and method for manufacturing one |
EP2363989B1 (en) * | 2003-08-13 | 2018-09-19 | Qualcomm Incorporated | A signal interface for higher data rates |
US8719334B2 (en) * | 2003-09-10 | 2014-05-06 | Qualcomm Incorporated | High data rate interface |
CN102801615A (en) * | 2003-10-15 | 2012-11-28 | 高通股份有限公司 | High data rate interface |
US7954151B1 (en) | 2003-10-28 | 2011-05-31 | Emc Corporation | Partial document content matching using sectional analysis |
WO2005043862A1 (en) * | 2003-10-29 | 2005-05-12 | Qualcomm Incorporated | High data rate interface |
CA2545817C (en) * | 2003-11-12 | 2011-11-29 | Qualcomm Incorporated | High data rate interface with improved link control |
MXPA06006012A (en) * | 2003-11-25 | 2006-08-23 | Qualcomm Inc | High data rate interface with improved link synchronization. |
EP2247071B1 (en) * | 2003-12-08 | 2013-09-25 | QUALCOMM Incorporated | High data rate interface with improved link synchronization |
US8472792B2 (en) | 2003-12-08 | 2013-06-25 | Divx, Llc | Multimedia distribution system |
US7519274B2 (en) | 2003-12-08 | 2009-04-14 | Divx, Inc. | File format for multiple track digital data |
US20060200744A1 (en) * | 2003-12-08 | 2006-09-07 | Adrian Bourke | Distributing and displaying still photos in a multimedia distribution system |
US8656039B2 (en) * | 2003-12-10 | 2014-02-18 | Mcafee, Inc. | Rule parser |
US7774604B2 (en) | 2003-12-10 | 2010-08-10 | Mcafee, Inc. | Verifying captured objects before presentation |
US8548170B2 (en) | 2003-12-10 | 2013-10-01 | Mcafee, Inc. | Document de-registration |
US7899828B2 (en) * | 2003-12-10 | 2011-03-01 | Mcafee, Inc. | Tag data structure for maintaining relational data over captured objects |
US7984175B2 (en) * | 2003-12-10 | 2011-07-19 | Mcafee, Inc. | Method and apparatus for data capture and analysis system |
US7814327B2 (en) * | 2003-12-10 | 2010-10-12 | Mcafee, Inc. | Document registration |
US7930540B2 (en) * | 2004-01-22 | 2011-04-19 | Mcafee, Inc. | Cryptographic policy enforcement |
US7970831B2 (en) * | 2004-02-02 | 2011-06-28 | The Boeing Company | Intelligent email services |
US8669988B2 (en) * | 2004-03-10 | 2014-03-11 | Qualcomm Incorporated | High data rate interface apparatus and method |
JP4519903B2 (en) * | 2004-03-17 | 2010-08-04 | クゥアルコム・インコーポレイテッド | High speed data rate interface apparatus and method |
WO2005096594A1 (en) * | 2004-03-24 | 2005-10-13 | Qualcomm Incorporated | High data rate interface apparatus and method |
US7529187B1 (en) * | 2004-05-04 | 2009-05-05 | Symantec Corporation | Detecting network evasion and misinformation |
US8630305B2 (en) * | 2004-06-04 | 2014-01-14 | Qualcomm Incorporated | High data rate interface apparatus and method |
US8650304B2 (en) * | 2004-06-04 | 2014-02-11 | Qualcomm Incorporated | Determining a pre skew and post skew calibration data rate in a mobile display digital interface (MDDI) communication system |
US7434058B2 (en) * | 2004-06-07 | 2008-10-07 | Reconnex Corporation | Generating signatures over a document |
US7779464B2 (en) | 2004-06-14 | 2010-08-17 | Lionic Corporation | System security approaches utilizing a hierarchical memory system |
US7930742B2 (en) * | 2004-06-14 | 2011-04-19 | Lionic Corporation | Multiple-level data processing system |
US7962591B2 (en) * | 2004-06-23 | 2011-06-14 | Mcafee, Inc. | Object classification in a capture system |
US7483916B2 (en) * | 2004-08-23 | 2009-01-27 | Mcafee, Inc. | Database for a capture system |
US8560534B2 (en) * | 2004-08-23 | 2013-10-15 | Mcafee, Inc. | Database for a capture system |
US7949849B2 (en) * | 2004-08-24 | 2011-05-24 | Mcafee, Inc. | File system for a capture system |
US7716380B1 (en) * | 2004-11-17 | 2010-05-11 | Juniper Networks, Inc. | Recycling items in a network device |
US8692838B2 (en) | 2004-11-24 | 2014-04-08 | Qualcomm Incorporated | Methods and systems for updating a buffer |
US8539119B2 (en) * | 2004-11-24 | 2013-09-17 | Qualcomm Incorporated | Methods and apparatus for exchanging messages having a digital data interface device message format |
US8699330B2 (en) * | 2004-11-24 | 2014-04-15 | Qualcomm Incorporated | Systems and methods for digital data transmission rate control |
US8667363B2 (en) * | 2004-11-24 | 2014-03-04 | Qualcomm Incorporated | Systems and methods for implementing cyclic redundancy checks |
US8873584B2 (en) | 2004-11-24 | 2014-10-28 | Qualcomm Incorporated | Digital data interface device |
US8533357B2 (en) * | 2004-12-03 | 2013-09-10 | Microsoft Corporation | Mechanism for binding a structured data protocol to a protocol offering up byte streams |
US7855974B2 (en) | 2004-12-23 | 2010-12-21 | Solera Networks, Inc. | Method and apparatus for network packet capture distributed storage system |
US8266320B1 (en) * | 2005-01-27 | 2012-09-11 | Science Applications International Corporation | Computer network defense |
US9325728B1 (en) | 2005-01-27 | 2016-04-26 | Leidos, Inc. | Systems and methods for implementing and scoring computer network defense exercises |
US7565395B2 (en) * | 2005-02-01 | 2009-07-21 | Microsoft Corporation | Mechanism for preserving session state when using an access-limited buffer |
US7779411B2 (en) * | 2005-02-17 | 2010-08-17 | Red Hat, Inc. | System, method and medium for providing asynchronous input and output with less system calls to and from an operating system |
US7823021B2 (en) * | 2005-05-26 | 2010-10-26 | United Parcel Service Of America, Inc. | Software process monitor |
US8332826B2 (en) * | 2005-05-26 | 2012-12-11 | United Parcel Service Of America, Inc. | Software process monitor |
US8130759B2 (en) | 2005-07-29 | 2012-03-06 | Opnet Technologies, Inc. | Routing validation |
US7907608B2 (en) * | 2005-08-12 | 2011-03-15 | Mcafee, Inc. | High speed packet capture |
US8140665B2 (en) * | 2005-08-19 | 2012-03-20 | Opnet Technologies, Inc. | Managing captured network traffic data |
US7818326B2 (en) * | 2005-08-31 | 2010-10-19 | Mcafee, Inc. | System and method for word indexing in a capture system and querying thereof |
US8489562B1 (en) | 2007-11-30 | 2013-07-16 | Silver Peak Systems, Inc. | Deferred data storage |
US8929402B1 (en) | 2005-09-29 | 2015-01-06 | Silver Peak Systems, Inc. | Systems and methods for compressing packet data by predicting subsequent data |
US8811431B2 (en) | 2008-11-20 | 2014-08-19 | Silver Peak Systems, Inc. | Systems and methods for compressing packet data |
US20070081471A1 (en) * | 2005-10-06 | 2007-04-12 | Alcatel Usa Sourcing, L.P. | Apparatus and method for analyzing packet data streams |
US7730011B1 (en) * | 2005-10-19 | 2010-06-01 | Mcafee, Inc. | Attributes of captured objects in a capture system |
US20070091875A1 (en) * | 2005-10-22 | 2007-04-26 | Revnx, Inc. | Method and System For Device Mobility Using Application Label Switching In A Mobile Communication Network |
US7733803B2 (en) | 2005-11-14 | 2010-06-08 | Sourcefire, Inc. | Systems and methods for modifying network map attributes |
US8046833B2 (en) | 2005-11-14 | 2011-10-25 | Sourcefire, Inc. | Intrusion event correlation with network discovery information |
US8272064B2 (en) * | 2005-11-16 | 2012-09-18 | The Boeing Company | Automated rule generation for a secure downgrader |
US7657104B2 (en) * | 2005-11-21 | 2010-02-02 | Mcafee, Inc. | Identifying image type in a capture system |
US8730069B2 (en) * | 2005-11-23 | 2014-05-20 | Qualcomm Incorporated | Double data rate serial encoder |
US8692839B2 (en) * | 2005-11-23 | 2014-04-08 | Qualcomm Incorporated | Methods and systems for updating a buffer |
US20070127438A1 (en) * | 2005-12-01 | 2007-06-07 | Scott Newman | Method and system for processing telephone technical support |
US7941515B2 (en) * | 2006-01-13 | 2011-05-10 | Cisco Technology, Inc. | Applying a filter set to information provided to a subscribing client |
US8510596B1 (en) * | 2006-02-09 | 2013-08-13 | Virsec Systems, Inc. | System and methods for run time detection and correction of memory corruption |
US8700568B2 (en) * | 2006-02-17 | 2014-04-15 | Google Inc. | Entity normalization via name normalization |
US7675854B2 (en) | 2006-02-21 | 2010-03-09 | A10 Networks, Inc. | System and method for an adaptive TCP SYN cookie with time validation |
DE102006011294A1 (en) * | 2006-03-10 | 2007-09-13 | Siemens Ag | Method and communication system for the computer-aided finding and identification of copyrighted content |
EP1999883A4 (en) | 2006-03-14 | 2013-03-06 | Divx Llc | Federated digital rights management scheme including trusted systems |
GB2432934B (en) * | 2006-03-14 | 2007-12-19 | Streamshield Networks Ltd | A method and apparatus for providing network security |
US8504537B2 (en) * | 2006-03-24 | 2013-08-06 | Mcafee, Inc. | Signature distribution in a document registration system |
US20070226504A1 (en) * | 2006-03-24 | 2007-09-27 | Reconnex Corporation | Signature match processing in a document registration system |
US8972300B2 (en) * | 2006-04-27 | 2015-03-03 | Panasonic Corporation | Content distribution system |
US8010689B2 (en) * | 2006-05-22 | 2011-08-30 | Mcafee, Inc. | Locational tagging in a capture system |
US7958227B2 (en) * | 2006-05-22 | 2011-06-07 | Mcafee, Inc. | Attributes of captured objects in a capture system |
US7689614B2 (en) | 2006-05-22 | 2010-03-30 | Mcafee, Inc. | Query generation for a capture system |
EP1868321B1 (en) * | 2006-06-12 | 2016-01-20 | Mitsubishi Denki Kabushiki Kaisha | In-line content analysis of a TCP segment stream |
DE602006014667D1 (en) * | 2006-06-23 | 2010-07-15 | Nippon Office Automation Co Lt | Protocol and session analyzer |
US8127149B1 (en) * | 2006-06-29 | 2012-02-28 | Symantec Corporation | Method and apparatus for content based encryption |
US8885632B2 (en) * | 2006-08-02 | 2014-11-11 | Silver Peak Systems, Inc. | Communications scheduler |
US8755381B2 (en) | 2006-08-02 | 2014-06-17 | Silver Peak Systems, Inc. | Data matching using flow based packet data storage |
US20080046966A1 (en) * | 2006-08-03 | 2008-02-21 | Richard Chuck Rhoades | Methods and apparatus to process network messages |
US8135990B2 (en) | 2006-08-11 | 2012-03-13 | Opnet Technologies, Inc. | Multi-variate network survivability analysis |
US7613840B2 (en) * | 2006-08-17 | 2009-11-03 | General Electric Company | Methods and apparatus for dynamic data acquisition configuration parameters |
US8136162B2 (en) | 2006-08-31 | 2012-03-13 | Broadcom Corporation | Intelligent network interface controller |
US8181036B1 (en) * | 2006-09-29 | 2012-05-15 | Symantec Corporation | Extrusion detection of obfuscated content |
US8312507B2 (en) | 2006-10-17 | 2012-11-13 | A10 Networks, Inc. | System and method to apply network traffic policy to an application session |
US8584199B1 (en) | 2006-10-17 | 2013-11-12 | A10 Networks, Inc. | System and method to apply a packet routing policy to an application session |
US7725466B2 (en) * | 2006-10-24 | 2010-05-25 | Tarique Mustafa | High accuracy document information-element vector encoding server |
US9276903B2 (en) * | 2007-01-11 | 2016-03-01 | Nice-Systems Ltd. | Branch IP recording |
WO2008084467A2 (en) * | 2007-01-11 | 2008-07-17 | Nice Systems Ltd. | Branch ip recording |
US9026638B2 (en) * | 2007-02-05 | 2015-05-05 | Novell, Inc. | Stealth entropy collection |
US8069352B2 (en) * | 2007-02-28 | 2011-11-29 | Sourcefire, Inc. | Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session |
CA2685292C (en) | 2007-04-30 | 2013-09-24 | Sourcefire, Inc. | Real-time user awareness for a computer network |
US8095649B2 (en) | 2007-05-09 | 2012-01-10 | Opnet Technologies, Inc. | Network delay analysis including parallel delay effects |
US9270641B1 (en) * | 2007-07-31 | 2016-02-23 | Hewlett Packard Enterprise Development Lp | Methods and systems for using keywords preprocessing, Boyer-Moore analysis, and hybrids thereof, for processing regular expressions in intrusion-prevention systems |
US8291495B1 (en) | 2007-08-08 | 2012-10-16 | Juniper Networks, Inc. | Identifying applications for intrusion detection systems |
US8069315B2 (en) * | 2007-08-30 | 2011-11-29 | Nokia Corporation | System and method for parallel scanning |
US8165985B2 (en) * | 2007-10-12 | 2012-04-24 | Palo Alto Research Center Incorporated | System and method for performing discovery of digital information in a subject area |
US8073682B2 (en) * | 2007-10-12 | 2011-12-06 | Palo Alto Research Center Incorporated | System and method for prospecting digital information |
US8671104B2 (en) * | 2007-10-12 | 2014-03-11 | Palo Alto Research Center Incorporated | System and method for providing orientation into digital information |
US7917446B2 (en) * | 2007-10-31 | 2011-03-29 | American Express Travel Related Services Company, Inc. | Latency locator |
US8112800B1 (en) | 2007-11-08 | 2012-02-07 | Juniper Networks, Inc. | Multi-layered application classification and decoding |
CN101861583B (en) | 2007-11-16 | 2014-06-04 | 索尼克Ip股份有限公司 | Hierarchical and reduced index structures for multimedia files |
US8307115B1 (en) | 2007-11-30 | 2012-11-06 | Silver Peak Systems, Inc. | Network memory mirroring |
KR101112204B1 (en) * | 2007-12-04 | 2012-03-09 | 한국전자통신연구원 | Mobile Advertisement Method |
US8220041B2 (en) * | 2007-12-13 | 2012-07-10 | Trend Micro Incorporated | Method and system for protecting a computer system during boot operation |
US8474043B2 (en) * | 2008-04-17 | 2013-06-25 | Sourcefire, Inc. | Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing |
US8521732B2 (en) | 2008-05-23 | 2013-08-27 | Solera Networks, Inc. | Presentation of an extracted artifact based on an indexing technique |
US20090292736A1 (en) * | 2008-05-23 | 2009-11-26 | Matthew Scott Wood | On demand network activity reporting through a dynamic file system and method |
US8004998B2 (en) * | 2008-05-23 | 2011-08-23 | Solera Networks, Inc. | Capture and regeneration of a network data using a virtual software switch |
US8625642B2 (en) | 2008-05-23 | 2014-01-07 | Solera Networks, Inc. | Method and apparatus of network artifact indentification and extraction |
US8743683B1 (en) | 2008-07-03 | 2014-06-03 | Silver Peak Systems, Inc. | Quality of service using multiple flows |
US10164861B2 (en) | 2015-12-28 | 2018-12-25 | Silver Peak Systems, Inc. | Dynamic monitoring and visualization for network health characteristics |
US10805840B2 (en) | 2008-07-03 | 2020-10-13 | Silver Peak Systems, Inc. | Data transmission via a virtual wide area network overlay |
US9717021B2 (en) | 2008-07-03 | 2017-07-25 | Silver Peak Systems, Inc. | Virtual network overlay |
US8205242B2 (en) | 2008-07-10 | 2012-06-19 | Mcafee, Inc. | System and method for data mining and security policy management |
US9253154B2 (en) | 2008-08-12 | 2016-02-02 | Mcafee, Inc. | Configuration management for a capture/registration system |
US8321204B2 (en) * | 2008-08-26 | 2012-11-27 | Saraansh Software Solutions Pvt. Ltd. | Automatic lexicon generation system for detection of suspicious e-mails from a mail archive |
US20100057536A1 (en) * | 2008-08-28 | 2010-03-04 | Palo Alto Research Center Incorporated | System And Method For Providing Community-Based Advertising Term Disambiguation |
US20100057577A1 (en) * | 2008-08-28 | 2010-03-04 | Palo Alto Research Center Incorporated | System And Method For Providing Topic-Guided Broadening Of Advertising Targets In Social Indexing |
US8010545B2 (en) * | 2008-08-28 | 2011-08-30 | Palo Alto Research Center Incorporated | System and method for providing a topic-directed search |
US8209616B2 (en) * | 2008-08-28 | 2012-06-26 | Palo Alto Research Center Incorporated | System and method for interfacing a web browser widget with social indexing |
US9569528B2 (en) * | 2008-10-03 | 2017-02-14 | Ab Initio Technology Llc | Detection of confidential information |
WO2010045089A1 (en) | 2008-10-08 | 2010-04-22 | Sourcefire, Inc. | Target-based smb and dce/rpc processing for an intrusion detection system or intrusion prevention system |
US8572717B2 (en) | 2008-10-09 | 2013-10-29 | Juniper Networks, Inc. | Dynamic access control policy with port restrictions for a network security appliance |
US8549016B2 (en) * | 2008-11-14 | 2013-10-01 | Palo Alto Research Center Incorporated | System and method for providing robust topic identification in social indexes |
US9384492B1 (en) * | 2008-12-11 | 2016-07-05 | Symantec Corporation | Method and apparatus for monitoring product purchasing activity on a network |
US8549625B2 (en) * | 2008-12-12 | 2013-10-01 | International Business Machines Corporation | Classification of unwanted or malicious software through the identification of encrypted data communication |
JP5197344B2 (en) * | 2008-12-19 | 2013-05-15 | キヤノンItソリューションズ株式会社 | Information processing apparatus, information processing method, and computer program |
CA2749170C (en) | 2009-01-07 | 2016-06-21 | Divx, Inc. | Singular, collective and automated creation of a media guide for online content |
US8850591B2 (en) | 2009-01-13 | 2014-09-30 | Mcafee, Inc. | System and method for concept building |
US8706709B2 (en) | 2009-01-15 | 2014-04-22 | Mcafee, Inc. | System and method for intelligent term grouping |
US8239397B2 (en) * | 2009-01-27 | 2012-08-07 | Palo Alto Research Center Incorporated | System and method for managing user attention by detecting hot and cold topics in social indexes |
US8452781B2 (en) * | 2009-01-27 | 2013-05-28 | Palo Alto Research Center Incorporated | System and method for using banded topic relevance and time for article prioritization |
US8356044B2 (en) * | 2009-01-27 | 2013-01-15 | Palo Alto Research Center Incorporated | System and method for providing default hierarchical training for social indexing |
US8473442B1 (en) | 2009-02-25 | 2013-06-25 | Mcafee, Inc. | System and method for intelligent state management |
US9398043B1 (en) * | 2009-03-24 | 2016-07-19 | Juniper Networks, Inc. | Applying fine-grain policy action to encapsulated network attacks |
US8146082B2 (en) * | 2009-03-25 | 2012-03-27 | Vmware, Inc. | Migrating virtual machines configured with pass-through devices |
US8667121B2 (en) | 2009-03-25 | 2014-03-04 | Mcafee, Inc. | System and method for managing data and policies |
US20100251369A1 (en) * | 2009-03-25 | 2010-09-30 | Grant Calum A M | Method and system for preventing data leakage from a computer facilty |
US8447722B1 (en) | 2009-03-25 | 2013-05-21 | Mcafee, Inc. | System and method for data mining and security policy management |
KR20100107801A (en) * | 2009-03-26 | 2010-10-06 | 삼성전자주식회사 | Apparatus and method for antenna selection in wireless communication system |
US8050251B2 (en) * | 2009-04-10 | 2011-11-01 | Barracuda Networks, Inc. | VPN optimization by defragmentation and deduplication apparatus and method |
US8812347B2 (en) * | 2009-05-21 | 2014-08-19 | At&T Mobility Ii Llc | Aggregating and capturing subscriber traffic |
US9871811B2 (en) | 2009-05-26 | 2018-01-16 | Microsoft Technology Licensing, Llc | Identifying security properties of systems from application crash traffic |
CN101964728B (en) | 2009-07-24 | 2012-06-13 | 中兴通讯股份有限公司 | Method and system for registering DPI equipment |
US9960967B2 (en) | 2009-10-21 | 2018-05-01 | A10 Networks, Inc. | Determining an application delivery server based on geo-location information |
US8533579B2 (en) * | 2009-10-21 | 2013-09-10 | Symantec Corporation | Data loss detection method for handling fuzziness in sensitive keywords |
US20110125749A1 (en) * | 2009-11-15 | 2011-05-26 | Solera Networks, Inc. | Method and Apparatus for Storing and Indexing High-Speed Network Traffic Data |
WO2011060377A1 (en) * | 2009-11-15 | 2011-05-19 | Solera Networks, Inc. | Method and apparatus for real time identification and recording of artifacts |
CA2782825C (en) | 2009-12-04 | 2016-04-26 | Divx, Llc | Elementary bitstream cryptographic material transport systems and methods |
US8671400B2 (en) * | 2009-12-23 | 2014-03-11 | Intel Corporation | Performance analysis of software executing in different sessions |
US8438270B2 (en) | 2010-01-26 | 2013-05-07 | Tenable Network Security, Inc. | System and method for correlating network identities and addresses |
US8302198B2 (en) | 2010-01-28 | 2012-10-30 | Tenable Network Security, Inc. | System and method for enabling remote registry service security audits |
US8707440B2 (en) * | 2010-03-22 | 2014-04-22 | Tenable Network Security, Inc. | System and method for passively identifying encrypted and interactive network sessions |
US8140656B2 (en) * | 2010-03-26 | 2012-03-20 | Juniper Networks, Inc. | Ager ring optimization |
JP5809238B2 (en) | 2010-04-16 | 2015-11-10 | シスコ テクノロジー,インコーポレイテッド | System and method for near real-time network attack detection, and system and method for integrated detection by detection routing |
US9031944B2 (en) | 2010-04-30 | 2015-05-12 | Palo Alto Research Center Incorporated | System and method for providing multi-core and multi-level topical organization in social indexes |
US8549650B2 (en) | 2010-05-06 | 2013-10-01 | Tenable Network Security, Inc. | System and method for three-dimensional visualization of vulnerability and asset data |
US8433790B2 (en) | 2010-06-11 | 2013-04-30 | Sourcefire, Inc. | System and method for assigning network blocks to sensors |
US8671182B2 (en) | 2010-06-22 | 2014-03-11 | Sourcefire, Inc. | System and method for resolving operating system or service identity conflicts |
US8782434B1 (en) | 2010-07-15 | 2014-07-15 | The Research Foundation For The State University Of New York | System and method for validating program execution at run-time |
US8904189B1 (en) | 2010-07-15 | 2014-12-02 | The Research Foundation For The State University Of New York | System and method for validating program execution at run-time using control flow signatures |
US8351325B2 (en) | 2010-08-18 | 2013-01-08 | Yr20 | Method and system for layer-2 pseudo-wire rapid-deployment service over unknown internet protocol networks |
US8464342B2 (en) | 2010-08-31 | 2013-06-11 | Microsoft Corporation | Adaptively selecting electronic message scanning rules |
US8635289B2 (en) * | 2010-08-31 | 2014-01-21 | Microsoft Corporation | Adaptive electronic message scanning |
US20120078683A1 (en) * | 2010-09-28 | 2012-03-29 | Alcatel-Lucent Usa Inc. | Method and apparatus for providing advice to service provider |
US9215275B2 (en) | 2010-09-30 | 2015-12-15 | A10 Networks, Inc. | System and method to balance servers based on server load status |
EP2633646B1 (en) * | 2010-10-26 | 2019-11-27 | Hewlett-Packard Enterprise Development LP | Methods and systems for detecting suspected data leakage using traffic samples |
US9455892B2 (en) * | 2010-10-29 | 2016-09-27 | Symantec Corporation | Data loss monitoring of partial data streams |
US8806615B2 (en) | 2010-11-04 | 2014-08-12 | Mcafee, Inc. | System and method for protecting specified data combinations |
US9609052B2 (en) | 2010-12-02 | 2017-03-28 | A10 Networks, Inc. | Distributing application traffic to servers based on dynamic service response time |
US8849991B2 (en) | 2010-12-15 | 2014-09-30 | Blue Coat Systems, Inc. | System and method for hypertext transfer protocol layered reconstruction |
CN103392314B (en) * | 2010-12-29 | 2016-06-15 | 思杰系统有限公司 | For the system and method that the N nuclear statistics information that can expand is polymerized |
US9247312B2 (en) | 2011-01-05 | 2016-01-26 | Sonic Ip, Inc. | Systems and methods for encoding source media in matroska container files for adaptive bitrate streaming using hypertext transfer protocol |
US8578022B2 (en) * | 2011-01-19 | 2013-11-05 | Cisco Technology, Inc. | Adaptive idle timeout for TCP connections in ESTAB state |
DK2490393T3 (en) * | 2011-02-17 | 2013-10-07 | DESOMA GmbH | Method and device for analyzing data packets |
US8601034B2 (en) * | 2011-03-11 | 2013-12-03 | Sourcefire, Inc. | System and method for real time data awareness |
US8666985B2 (en) | 2011-03-16 | 2014-03-04 | Solera Networks, Inc. | Hardware accelerated application-based pattern matching for real time classification and recording of network traffic |
US20120246609A1 (en) | 2011-03-24 | 2012-09-27 | International Business Machines Corporation | Automatic generation of user stories for software products via a product content space |
US8683573B2 (en) | 2011-06-27 | 2014-03-25 | International Business Machines Corporation | Detection of rogue client-agnostic nat device tunnels |
CN102291394B (en) * | 2011-07-22 | 2014-06-11 | 网宿科技股份有限公司 | Security defense system based on network accelerating equipment |
US9075678B2 (en) * | 2011-08-29 | 2015-07-07 | Hewlett-Packard Development Company, L.P. | Client and server for installation of files embedded within a client profile |
US9467708B2 (en) | 2011-08-30 | 2016-10-11 | Sonic Ip, Inc. | Selection of resolutions for seamless resolution switching of multimedia content |
US8818171B2 (en) | 2011-08-30 | 2014-08-26 | Kourosh Soroushian | Systems and methods for encoding alternative streams of video for playback on playback devices having predetermined display aspect ratios and network connection maximum data rates |
WO2013033458A2 (en) | 2011-08-30 | 2013-03-07 | Divx, Llc | Systems and methods for encoding and streaming video encoded using a plurality of maximum bitrate levels |
US8909922B2 (en) | 2011-09-01 | 2014-12-09 | Sonic Ip, Inc. | Systems and methods for playing back alternative streams of protected content protected using common cryptographic information |
US8964977B2 (en) | 2011-09-01 | 2015-02-24 | Sonic Ip, Inc. | Systems and methods for saving encoded media streamed using adaptive bitrate streaming |
US9130991B2 (en) | 2011-10-14 | 2015-09-08 | Silver Peak Systems, Inc. | Processing data packets in performance enhancing proxy (PEP) environment |
US8897154B2 (en) | 2011-10-24 | 2014-11-25 | A10 Networks, Inc. | Combining stateless and stateful server load balancing |
US9626224B2 (en) | 2011-11-03 | 2017-04-18 | Silver Peak Systems, Inc. | Optimizing available computing resources within a virtual environment |
US9386088B2 (en) | 2011-11-29 | 2016-07-05 | A10 Networks, Inc. | Accelerating service processing using fast path TCP |
US8725741B2 (en) | 2011-12-04 | 2014-05-13 | Riverbed Technology, Inc. | Assessing application performance with an operational index |
US9094364B2 (en) | 2011-12-23 | 2015-07-28 | A10 Networks, Inc. | Methods to manage services over a service gateway |
US20130246334A1 (en) | 2011-12-27 | 2013-09-19 | Mcafee, Inc. | System and method for providing data protection workflows in a network environment |
US10044582B2 (en) | 2012-01-28 | 2018-08-07 | A10 Networks, Inc. | Generating secure name records |
US9367707B2 (en) | 2012-02-23 | 2016-06-14 | Tenable Network Security, Inc. | System and method for using file hashes to track data leakage and document propagation in a network |
US8874736B2 (en) * | 2012-04-23 | 2014-10-28 | Hewlett-Packard Development Company, L.P. | Event extractor |
US9767259B2 (en) * | 2012-05-07 | 2017-09-19 | Google Inc. | Detection of unauthorized content in live multiuser composite streams |
US10452715B2 (en) | 2012-06-30 | 2019-10-22 | Divx, Llc | Systems and methods for compressing geotagged video |
US8782221B2 (en) * | 2012-07-05 | 2014-07-15 | A10 Networks, Inc. | Method to allocate buffer for TCP proxy session based on dynamic network conditions |
US9122873B2 (en) | 2012-09-14 | 2015-09-01 | The Research Foundation For The State University Of New York | Continuous run-time validation of program execution: a practical approach |
US9843484B2 (en) | 2012-09-25 | 2017-12-12 | A10 Networks, Inc. | Graceful scaling in software driven networks |
US10002141B2 (en) | 2012-09-25 | 2018-06-19 | A10 Networks, Inc. | Distributed database in software driven networks |
US10021174B2 (en) | 2012-09-25 | 2018-07-10 | A10 Networks, Inc. | Distributing service sessions |
WO2014052099A2 (en) | 2012-09-25 | 2014-04-03 | A10 Networks, Inc. | Load distribution in data networks |
US9069782B2 (en) | 2012-10-01 | 2015-06-30 | The Research Foundation For The State University Of New York | System and method for security and privacy aware virtual machine checkpointing |
US8850596B2 (en) * | 2012-11-08 | 2014-09-30 | Microsoft Corporation | Data leakage detection in a multi-tenant data architecture |
US9338225B2 (en) | 2012-12-06 | 2016-05-10 | A10 Networks, Inc. | Forwarding policies on a virtual service network |
US9191457B2 (en) | 2012-12-31 | 2015-11-17 | Sonic Ip, Inc. | Systems, methods, and media for controlling delivery of content |
US9313510B2 (en) | 2012-12-31 | 2016-04-12 | Sonic Ip, Inc. | Use of objective quality measures of streamed content to reduce streaming bandwidth |
CN105122727A (en) * | 2013-01-11 | 2015-12-02 | Db网络公司 | Systems and methods for detecting and mitigating threats to a structured data storage system |
US9087155B2 (en) | 2013-01-15 | 2015-07-21 | International Business Machines Corporation | Automated data collection, computation and reporting of content space coverage metrics for software products |
US9659053B2 (en) | 2013-01-15 | 2017-05-23 | International Business Machines Corporation | Graphical user interface streamlining implementing a content space |
US9396342B2 (en) | 2013-01-15 | 2016-07-19 | International Business Machines Corporation | Role based authorization based on product content space |
US9141379B2 (en) | 2013-01-15 | 2015-09-22 | International Business Machines Corporation | Automated code coverage measurement and tracking per user story and requirement |
US9111040B2 (en) | 2013-01-15 | 2015-08-18 | International Business Machines Corporation | Integration of a software content space with test planning and test case generation |
US9063809B2 (en) | 2013-01-15 | 2015-06-23 | International Business Machines Corporation | Content space environment representation |
US9218161B2 (en) | 2013-01-15 | 2015-12-22 | International Business Machines Corporation | Embedding a software content space for run-time implementation |
US9081645B2 (en) | 2013-01-15 | 2015-07-14 | International Business Machines Corporation | Software product licensing based on a content space |
US9075544B2 (en) | 2013-01-15 | 2015-07-07 | International Business Machines Corporation | Integration and user story generation and requirements management |
US9069647B2 (en) | 2013-01-15 | 2015-06-30 | International Business Machines Corporation | Logging and profiling content space data and coverage metric self-reporting |
US9531846B2 (en) | 2013-01-23 | 2016-12-27 | A10 Networks, Inc. | Reducing buffer usage for TCP proxy session based on delayed acknowledgement |
US9900252B2 (en) | 2013-03-08 | 2018-02-20 | A10 Networks, Inc. | Application delivery controller and global server load balancer |
SG11201506938PA (en) * | 2013-03-14 | 2015-09-29 | Fidelis Cybersecurity Inc | System and method for extracting and preserving metadata for analyzing network communications |
US9906785B2 (en) | 2013-03-15 | 2018-02-27 | Sonic Ip, Inc. | Systems, methods, and media for transcoding video data according to encoding parameters indicated by received metadata |
US9992107B2 (en) | 2013-03-15 | 2018-06-05 | A10 Networks, Inc. | Processing data packets using a policy based network path |
US10397292B2 (en) | 2013-03-15 | 2019-08-27 | Divx, Llc | Systems, methods, and media for delivery of content |
WO2014179753A2 (en) | 2013-05-03 | 2014-11-06 | A10 Networks, Inc. | Facilitating secure network traffic by an application delivery controller |
US10027761B2 (en) | 2013-05-03 | 2018-07-17 | A10 Networks, Inc. | Facilitating a secure 3 party network session by a network device |
US9094737B2 (en) | 2013-05-30 | 2015-07-28 | Sonic Ip, Inc. | Network video streaming with trick play based on separate trick play files |
US9967305B2 (en) | 2013-06-28 | 2018-05-08 | Divx, Llc | Systems, methods, and media for streaming media content |
EP3044719B1 (en) | 2013-09-12 | 2019-08-28 | Virsec Systems Inc. | Automated runtime detection of malware |
US10230770B2 (en) | 2013-12-02 | 2019-03-12 | A10 Networks, Inc. | Network proxy layer for policy-based application proxies |
US9942152B2 (en) | 2014-03-25 | 2018-04-10 | A10 Networks, Inc. | Forwarding data packets using a service-based forwarding policy |
US10020979B1 (en) | 2014-03-25 | 2018-07-10 | A10 Networks, Inc. | Allocating resources in multi-core computing environments |
US9942162B2 (en) | 2014-03-31 | 2018-04-10 | A10 Networks, Inc. | Active application response delay time |
US9866878B2 (en) | 2014-04-05 | 2018-01-09 | Sonic Ip, Inc. | Systems and methods for encoding and playing back video at different frame rates using enhancement layers |
US9806943B2 (en) | 2014-04-24 | 2017-10-31 | A10 Networks, Inc. | Enabling planned upgrade/downgrade of network devices without impacting network sessions |
US9906422B2 (en) | 2014-05-16 | 2018-02-27 | A10 Networks, Inc. | Distributed system to determine a server's health |
US10129122B2 (en) | 2014-06-03 | 2018-11-13 | A10 Networks, Inc. | User defined objects for network devices |
US9986061B2 (en) | 2014-06-03 | 2018-05-29 | A10 Networks, Inc. | Programming a data network device using user defined scripts |
US9992229B2 (en) | 2014-06-03 | 2018-06-05 | A10 Networks, Inc. | Programming a data network device using user defined scripts with licenses |
CA2953793C (en) | 2014-06-24 | 2021-10-19 | Virsec Systems, Inc. | System and methods for automated detection of input and output validation and resource management vulnerability |
AU2015279920B2 (en) | 2014-06-24 | 2018-03-29 | Virsec Systems, Inc. | Automated root cause analysis of single or N-TIERED applications |
US9948496B1 (en) | 2014-07-30 | 2018-04-17 | Silver Peak Systems, Inc. | Determining a transit appliance for data traffic to a software service |
US9875344B1 (en) | 2014-09-05 | 2018-01-23 | Silver Peak Systems, Inc. | Dynamic monitoring and authorization of an optimization device |
US10594707B2 (en) * | 2015-03-17 | 2020-03-17 | British Telecommunications Public Limited Company | Learned profiles for malicious encrypted network traffic identification |
US20160292445A1 (en) | 2015-03-31 | 2016-10-06 | Secude Ag | Context-based data classification |
US9917753B2 (en) | 2015-06-12 | 2018-03-13 | Level 3 Communications, Llc | Network operational flaw detection using metrics |
US10515150B2 (en) | 2015-07-14 | 2019-12-24 | Genesys Telecommunications Laboratories, Inc. | Data driven speech enabled self-help systems and methods of operating thereof |
US10581976B2 (en) | 2015-08-12 | 2020-03-03 | A10 Networks, Inc. | Transmission control of protocol state exchange for dynamic stateful service insertion |
US10243791B2 (en) | 2015-08-13 | 2019-03-26 | A10 Networks, Inc. | Automated adjustment of subscriber policies |
CN106470136B (en) * | 2015-08-21 | 2022-04-12 | 腾讯科技(北京)有限公司 | Platform test method and platform test system |
US10462116B1 (en) * | 2015-09-15 | 2019-10-29 | Amazon Technologies, Inc. | Detection of data exfiltration |
CN105183482A (en) * | 2015-09-23 | 2015-12-23 | 浪潮(北京)电子信息产业有限公司 | Network simulation development testing method and system |
US10552735B1 (en) * | 2015-10-14 | 2020-02-04 | Trading Technologies International, Inc. | Applied artificial intelligence technology for processing trade data to detect patterns indicative of potential trade spoofing |
US10455088B2 (en) | 2015-10-21 | 2019-10-22 | Genesys Telecommunications Laboratories, Inc. | Dialogue flow optimization and personalization |
US10382623B2 (en) * | 2015-10-21 | 2019-08-13 | Genesys Telecommunications Laboratories, Inc. | Data-driven dialogue enabled self-help systems |
IL242218B (en) | 2015-10-22 | 2020-11-30 | Verint Systems Ltd | System and method for maintaining a dynamic dictionary |
US10397325B2 (en) * | 2015-10-22 | 2019-08-27 | Oracle International Corporation | System and method for data payload collection monitoring and analysis in a transaction processing environment |
IL242219B (en) * | 2015-10-22 | 2020-11-30 | Verint Systems Ltd | System and method for keyword searching using both static and dynamic dictionaries |
US10673887B2 (en) * | 2015-10-28 | 2020-06-02 | Qomplx, Inc. | System and method for cybersecurity analysis and score generation for insurance purposes |
JP6575318B2 (en) * | 2015-11-18 | 2019-09-18 | 富士通株式会社 | Network control device, cluster system, and control program |
US10075416B2 (en) | 2015-12-30 | 2018-09-11 | Juniper Networks, Inc. | Network session data sharing |
EP3400694B1 (en) | 2016-01-08 | 2023-10-25 | BELDEN Inc. | Method and protection apparatus to prevent malicious information communication in ip networks by exploiting benign networking protocols |
US10318288B2 (en) | 2016-01-13 | 2019-06-11 | A10 Networks, Inc. | System and method to process a chain of network applications |
US10432484B2 (en) | 2016-06-13 | 2019-10-01 | Silver Peak Systems, Inc. | Aggregating select network traffic statistics |
US10148989B2 (en) | 2016-06-15 | 2018-12-04 | Divx, Llc | Systems and methods for encoding video content |
KR102419574B1 (en) | 2016-06-16 | 2022-07-11 | 버섹 시스템즈, 인코포레이션 | Systems and methods for correcting memory corruption in computer applications |
US10860347B1 (en) | 2016-06-27 | 2020-12-08 | Amazon Technologies, Inc. | Virtual machine with multiple content processes |
US9899038B2 (en) | 2016-06-30 | 2018-02-20 | Karen Elaine Khaleghi | Electronic notebook system |
CN107645478B (en) | 2016-07-22 | 2020-12-22 | 阿里巴巴集团控股有限公司 | Network attack defense system, method and device |
RU2625053C1 (en) * | 2016-07-29 | 2017-07-11 | Акционерное общество "Лаборатория Касперского" | Elimination of false activation of anti-virus records |
US9967056B1 (en) | 2016-08-19 | 2018-05-08 | Silver Peak Systems, Inc. | Forward packet recovery with constrained overhead |
CN107196844A (en) * | 2016-11-28 | 2017-09-22 | 北京神州泰岳信息安全技术有限公司 | Exception mail recognition methods and device |
CN106778241B (en) * | 2016-11-28 | 2020-12-25 | 东软集团股份有限公司 | Malicious file identification method and device |
CN110168657B (en) * | 2016-12-05 | 2024-03-12 | 皇家飞利浦有限公司 | Tumor tracking with intelligent tumor size change notification |
US10389835B2 (en) | 2017-01-10 | 2019-08-20 | A10 Networks, Inc. | Application aware systems and methods to process user loadable network applications |
CN110300958B (en) * | 2017-01-13 | 2023-04-18 | 甲骨文国际公司 | System and method for conditional call path monitoring in a distributed transactional middleware environment |
US11044202B2 (en) | 2017-02-06 | 2021-06-22 | Silver Peak Systems, Inc. | Multi-level learning for predicting and classifying traffic flows from first packet data |
US10892978B2 (en) | 2017-02-06 | 2021-01-12 | Silver Peak Systems, Inc. | Multi-level learning for classifying traffic flows from first packet data |
US10257082B2 (en) | 2017-02-06 | 2019-04-09 | Silver Peak Systems, Inc. | Multi-level learning for classifying traffic flows |
US10771394B2 (en) | 2017-02-06 | 2020-09-08 | Silver Peak Systems, Inc. | Multi-level learning for classifying traffic flows on a first packet from DNS data |
US10171477B1 (en) * | 2017-02-14 | 2019-01-01 | Amazon Technologies, Inc. | Authenticated data streaming |
US10498795B2 (en) | 2017-02-17 | 2019-12-03 | Divx, Llc | Systems and methods for adaptive switching between multiple content delivery networks during adaptive bitrate streaming |
US10594664B2 (en) | 2017-03-13 | 2020-03-17 | At&T Intellectual Property I, L.P. | Extracting data from encrypted packet flows |
CN107066882B (en) * | 2017-03-17 | 2019-07-12 | 平安科技(深圳)有限公司 | Information leakage detection method and device |
US11042659B2 (en) | 2017-07-06 | 2021-06-22 | AO Kaspersky Lab | System and method of determining text containing confidential data |
US10382481B2 (en) | 2017-08-18 | 2019-08-13 | eSentire, Inc. | System and method to spoof a TCP reset for an out-of-band security device |
US11212210B2 (en) | 2017-09-21 | 2021-12-28 | Silver Peak Systems, Inc. | Selective route exporting using source type |
CN109472138B (en) * | 2017-12-01 | 2022-07-01 | 北京安天网络安全技术有限公司 | Method, device and storage medium for detecting snort rule conflict |
US11574074B2 (en) * | 2017-12-11 | 2023-02-07 | Digital Guardian Llc | Systems and methods for identifying content types for data loss prevention |
CN108009429B (en) * | 2017-12-11 | 2021-09-03 | 北京奇虎科技有限公司 | Patch function generation method and device |
US11531779B2 (en) | 2017-12-11 | 2022-12-20 | Digital Guardian Llc | Systems and methods for identifying personal identifiers in content |
CN108200033A (en) * | 2017-12-27 | 2018-06-22 | 北京工业大学 | A kind of access control method based on NDN Yu open type moving health system frame |
US10235998B1 (en) | 2018-02-28 | 2019-03-19 | Karen Elaine Khaleghi | Health monitoring system and appliance |
US10637721B2 (en) | 2018-03-12 | 2020-04-28 | Silver Peak Systems, Inc. | Detecting path break conditions while minimizing network overhead |
US11388141B1 (en) * | 2018-03-28 | 2022-07-12 | Juniper Networks, Inc | Apparatus, system, and method for efficiently filtering packets at network devices |
US11212305B2 (en) * | 2018-04-27 | 2021-12-28 | Check Point Web Applications And Api Protection Ltd. | Web application security methods and systems |
US10872164B2 (en) | 2018-11-15 | 2020-12-22 | Bank Of America Corporation | Trusted access control value systems |
US10798105B2 (en) | 2018-11-15 | 2020-10-06 | Bank Of America Corporation | Access control value systems |
US11057501B2 (en) * | 2018-12-31 | 2021-07-06 | Fortinet, Inc. | Increasing throughput density of TCP traffic on a hybrid data network having both wired and wireless connections by modifying TCP layer behavior over the wireless connection while maintaining TCP protocol |
US10559307B1 (en) | 2019-02-13 | 2020-02-11 | Karen Elaine Khaleghi | Impaired operator detection and interlock apparatus |
US11122081B2 (en) | 2019-02-21 | 2021-09-14 | Bank Of America Corporation | Preventing unauthorized access to information resources by deploying and utilizing multi-path data relay systems and sectional transmission techniques |
US11113396B2 (en) | 2019-02-22 | 2021-09-07 | Bank Of America Corporation | Data management system and method |
US10735191B1 (en) | 2019-07-25 | 2020-08-04 | The Notebook, Llc | Apparatus and methods for secure distributed communications and data access |
US11018943B1 (en) | 2020-05-20 | 2021-05-25 | Cisco Technology, Inc. | Learning packet capture policies to enrich context for device classification systems |
US11379281B2 (en) * | 2020-11-18 | 2022-07-05 | Akamai Technologies, Inc. | Detection and optimization of content in the payloads of API messages |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5884033A (en) * | 1996-05-15 | 1999-03-16 | Spyglass, Inc. | Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions |
US6065055A (en) * | 1998-04-20 | 2000-05-16 | Hughes; Patrick Alan | Inappropriate site management software |
US7315891B2 (en) | 2000-01-12 | 2008-01-01 | Vericept Corporation | Employee internet management device |
US6654373B1 (en) * | 2000-06-12 | 2003-11-25 | Netrake Corporation | Content aware network apparatus |
US7681032B2 (en) * | 2001-03-12 | 2010-03-16 | Portauthority Technologies Inc. | System and method for monitoring unauthorized transport of digital content |
US7363278B2 (en) * | 2001-04-05 | 2008-04-22 | Audible Magic Corporation | Copyright detection and protection system and method |
CN1145318C (en) * | 2001-06-26 | 2004-04-07 | 华为技术有限公司 | Method for implementing safety guard to internet service provider |
JP2003141129A (en) * | 2001-11-07 | 2003-05-16 | Just Syst Corp | Document classifying device, document classifying method, program for executing the method by computer, and computer readable recording medium recording the program |
US7260555B2 (en) * | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets |
US7783765B2 (en) * | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents |
JP2003242267A (en) * | 2002-02-15 | 2003-08-29 | Fujitsu Ltd | Profile information disclosing method and profile information disclosing program |
JP4361714B2 (en) * | 2002-05-31 | 2009-11-11 | 富士通株式会社 | Network relay device |
WO2004023263A2 (en) * | 2002-09-09 | 2004-03-18 | Netrake Corporation | System for allowing network traffic through firewalls |
JPWO2005006191A1 (en) * | 2003-07-10 | 2006-08-24 | 富士通株式会社 | Apparatus and method for registering multiple types of information |
US7515717B2 (en) * | 2003-07-31 | 2009-04-07 | International Business Machines Corporation | Security containers for document components |
-
2003
- 2003-09-10 US US10/658,777 patent/US7467202B2/en active Active
-
2004
- 2004-09-09 CA CA2537882A patent/CA2537882C/en not_active Expired - Fee Related
- 2004-09-09 WO PCT/US2004/029503 patent/WO2005027539A2/en active Application Filing
- 2004-09-09 JP JP2006526298A patent/JP2007507763A/en not_active Withdrawn
- 2004-09-09 CN CN2004800330608A patent/CN1965306B/en not_active Expired - Fee Related
- 2004-09-09 EP EP04788665.0A patent/EP1665818B1/en active Active
-
2006
- 2006-03-07 IL IL174163A patent/IL174163A/en active IP Right Grant
-
2007
- 2007-11-05 HK HK07111976.8A patent/HK1105031A1/en not_active IP Right Cessation
-
2008
- 2008-11-12 US US12/269,610 patent/US20090138945A1/en not_active Abandoned
-
2009
- 2009-03-09 JP JP2009055249A patent/JP2009211703A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
WO2005027539A2 (en) | 2005-03-24 |
WO2005027539A3 (en) | 2007-01-18 |
US20050055399A1 (en) | 2005-03-10 |
CN1965306B (en) | 2012-09-26 |
CN1965306A (en) | 2007-05-16 |
CA2537882C (en) | 2011-04-05 |
JP2009211703A (en) | 2009-09-17 |
EP1665818B1 (en) | 2018-11-07 |
EP1665818A4 (en) | 2012-11-14 |
US7467202B2 (en) | 2008-12-16 |
HK1105031A1 (en) | 2008-02-01 |
US20090138945A1 (en) | 2009-05-28 |
JP2007507763A (en) | 2007-03-29 |
IL174163A (en) | 2010-11-30 |
EP1665818A2 (en) | 2006-06-07 |
IL174163A0 (en) | 2006-08-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CA2537882A1 (en) | High-performance network content analysis platform | |
CN109902709A (en) | A kind of industrial control system malice sample generating method based on confrontation study | |
Farrell et al. | Pervasive monitoring is an attack | |
US7822073B2 (en) | Packet flow side channel | |
KR100884714B1 (en) | Application layer security method and system | |
US20050022031A1 (en) | Advanced URL and IP features | |
US7523498B2 (en) | Method and system for monitoring personal computer documents for sensitive data | |
US20070230445A1 (en) | Integrated Circuit Apparatus And Method For High Throughput Signature Based Network Applications | |
HK1180855A1 (en) | Method and system for data communication coordination with sequence numbers | |
CN111181901A (en) | Abnormal flow detection device and abnormal flow detection method thereof | |
CN101505276A (en) | Network application flow recognition method and apparatus and network application flow management apparatus | |
US7152103B1 (en) | Lawful communication interception—intercepting communication associated information | |
CN100547996C (en) | Intranet and extranet information safety transmission system and method | |
CN101969411A (en) | Method and system for analyzing and restoring unencrypted WEB mail | |
CN116455649A (en) | Import and export trade data exchange system | |
CN1314042A (en) | Data link between two computers and method for transmitting data between said computers | |
Tian et al. | Steganalysis of analysis‐by‐synthesis speech exploiting pulse‐position distribution characteristics | |
US20080235370A1 (en) | Method and System for Controlling Network Traffic of P2P and Instant Messenger Softwares | |
Farrell et al. | RFC 7258: Pervasive Monitoring Is an Attack | |
KR20040013180A (en) | Email blocking algorithm and system based on URL pattern matching method | |
Tedesco et al. | Adaptive alert throttling for intrusion detection systems | |
Jallad | FastPacket: Towards Pre-trained Packets Embedding based on FastText for next-generation NIDS | |
US20240039948A1 (en) | Mail protection system | |
CN1286450A (en) | Mobile digital antiforge system and method | |
Yoo et al. | Intelligent firewall: packet-based recognition against internet-scale virus attacks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
EEER | Examination request | ||
MKLA | Lapsed |
Effective date: 20180910 |