WO2005026900A3 - Method and system for displaying network security incidents - Google Patents
Method and system for displaying network security incidents Download PDFInfo
- Publication number
- WO2005026900A3 WO2005026900A3 PCT/US2004/029185 US2004029185W WO2005026900A3 WO 2005026900 A3 WO2005026900 A3 WO 2005026900A3 US 2004029185 W US2004029185 W US 2004029185W WO 2005026900 A3 WO2005026900 A3 WO 2005026900A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- network
- security
- network security
- event correlation
- sessions
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP04788620.5A EP1665011B1 (en) | 2003-09-12 | 2004-09-03 | Method and system for displaying network security incidents |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/661,224 US7644365B2 (en) | 2003-09-12 | 2003-09-12 | Method and system for displaying network security incidents |
US10/661,224 | 2003-09-12 |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2005026900A2 WO2005026900A2 (en) | 2005-03-24 |
WO2005026900A3 true WO2005026900A3 (en) | 2006-03-30 |
Family
ID=34273828
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2004/029185 WO2005026900A2 (en) | 2003-09-12 | 2004-09-03 | Method and system for displaying network security incidents |
Country Status (4)
Country | Link |
---|---|
US (2) | US7644365B2 (en) |
EP (1) | EP1665011B1 (en) |
CN (1) | CN100409148C (en) |
WO (1) | WO2005026900A2 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9027120B1 (en) | 2003-10-10 | 2015-05-05 | Hewlett-Packard Development Company, L.P. | Hierarchical architecture in a network security system |
Families Citing this family (112)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7376969B1 (en) | 2002-12-02 | 2008-05-20 | Arcsight, Inc. | Real time monitoring and analysis of events from multiple network security devices |
US8176527B1 (en) | 2002-12-02 | 2012-05-08 | Hewlett-Packard Development Company, L. P. | Correlation engine with support for time-based rules |
US7788722B1 (en) | 2002-12-02 | 2010-08-31 | Arcsight, Inc. | Modular agent for network security intrusion detection system |
US7899901B1 (en) | 2002-12-02 | 2011-03-01 | Arcsight, Inc. | Method and apparatus for exercising and debugging correlations for network security system |
US7607169B1 (en) | 2002-12-02 | 2009-10-20 | Arcsight, Inc. | User interface for network security console |
US7219239B1 (en) | 2002-12-02 | 2007-05-15 | Arcsight, Inc. | Method for batching events for transmission by software agent |
US7260844B1 (en) | 2003-09-03 | 2007-08-21 | Arcsight, Inc. | Threat detection in a network security system |
US8015604B1 (en) * | 2003-10-10 | 2011-09-06 | Arcsight Inc | Hierarchical architecture in a network security system |
US7565696B1 (en) | 2003-12-10 | 2009-07-21 | Arcsight, Inc. | Synchronizing network security devices within a network security system |
EP1544707A1 (en) * | 2003-12-15 | 2005-06-22 | Abb Research Ltd. | Network security system |
US8041799B1 (en) * | 2004-04-30 | 2011-10-18 | Sprint Communications Company L.P. | Method and system for managing alarms in a communications network |
US7509677B2 (en) * | 2004-05-04 | 2009-03-24 | Arcsight, Inc. | Pattern discovery in a network security system |
US7836506B2 (en) * | 2004-09-22 | 2010-11-16 | Cyberdefender Corporation | Threat protection network |
US7730494B1 (en) * | 2005-04-20 | 2010-06-01 | At&T Corp. | Methods and apparatus for service and network management event correlation |
US7644438B1 (en) | 2004-10-27 | 2010-01-05 | Arcsight, Inc. | Security event aggregation at software agent |
US9100422B1 (en) * | 2004-10-27 | 2015-08-04 | Hewlett-Packard Development Company, L.P. | Network zone identification in a network security system |
US7809131B1 (en) | 2004-12-23 | 2010-10-05 | Arcsight, Inc. | Adjusting sensor time in a network security system |
US7647632B1 (en) | 2005-01-04 | 2010-01-12 | Arcsight, Inc. | Object reference in a system |
US8850565B2 (en) | 2005-01-10 | 2014-09-30 | Hewlett-Packard Development Company, L.P. | System and method for coordinating network incident response activities |
US9256740B2 (en) | 2005-02-22 | 2016-02-09 | International Business Machines Corporation | Method and system for analysis of security events in a managed computer network |
US7844999B1 (en) | 2005-03-01 | 2010-11-30 | Arcsight, Inc. | Message parsing in a network security system |
US8806634B2 (en) * | 2005-04-05 | 2014-08-12 | Donald N. Cohen | System for finding potential origins of spoofed internet protocol attack traffic |
US7937344B2 (en) | 2005-07-25 | 2011-05-03 | Splunk Inc. | Machine data web |
US7882262B2 (en) * | 2005-08-18 | 2011-02-01 | Cisco Technology, Inc. | Method and system for inline top N query computation |
CN100429890C (en) * | 2005-09-05 | 2008-10-29 | 北京启明星辰信息技术有限公司 | Visable positioning method and system for network safety event |
JP4459890B2 (en) * | 2005-11-04 | 2010-04-28 | 株式会社日立製作所 | Information processing apparatus, incident response apparatus control method, and program |
US7930746B1 (en) * | 2005-12-29 | 2011-04-19 | At&T Intellectual Property Ii, L.P. | Method and apparatus for detecting anomalous network activities |
US7408458B1 (en) * | 2005-12-29 | 2008-08-05 | At&T Corp. | Method and apparatus for suppressing duplicate alarms |
US20070195776A1 (en) * | 2006-02-23 | 2007-08-23 | Zheng Danyang R | System and method for channeling network traffic |
US7823069B1 (en) * | 2006-03-23 | 2010-10-26 | Cisco Technology, Inc. | Method and application tool for dynamically navigating a user customizable representation of a network device configuration |
US8233388B2 (en) * | 2006-05-30 | 2012-07-31 | Cisco Technology, Inc. | System and method for controlling and tracking network content flow |
US8132260B1 (en) * | 2006-06-12 | 2012-03-06 | Redseal Systems, Inc. | Methods and apparatus for prioritization of remediation techniques for network security risks |
US9715675B2 (en) | 2006-08-10 | 2017-07-25 | Oracle International Corporation | Event-driven customizable automated workflows for incident remediation |
US9824107B2 (en) * | 2006-10-25 | 2017-11-21 | Entit Software Llc | Tracking changing state data to assist in computer network security |
IL181428A0 (en) * | 2007-02-19 | 2007-07-04 | Deutsche Telekom Ag | Deployment of distributed network intrusion detection systems in social networks |
US8108924B1 (en) * | 2007-05-24 | 2012-01-31 | Sprint Communications Company L.P. | Providing a firewall's connection data in a comprehendible format |
EP2194677B1 (en) * | 2007-09-28 | 2012-11-14 | Nippon Telegraph and Telephone Corporation | Network monitoring device, network monitoring method, and network monitoring program |
US8412922B2 (en) * | 2007-10-24 | 2013-04-02 | Sercomm Corporation | On-site configuration of a hardware device module of a security system |
US9154379B2 (en) * | 2007-10-25 | 2015-10-06 | Sercomm Corporation | Remote configuration of a hardware device module of a security system |
US20090254970A1 (en) * | 2008-04-04 | 2009-10-08 | Avaya Inc. | Multi-tier security event correlation and mitigation |
US8279768B2 (en) * | 2008-05-05 | 2012-10-02 | Eaton Corporation | Methods, devices and computer program products for capturing events associated network anomalies |
US20100064235A1 (en) * | 2008-08-26 | 2010-03-11 | Walls Marshall G | Visual Intuitive Interactive Interwoven Multi-Layered Maintenance Support GUI |
US8744806B2 (en) | 2008-10-29 | 2014-06-03 | Sevone, Inc. | Scalable performance management system |
FR2944117B1 (en) * | 2009-04-06 | 2014-05-09 | Airbus France | METHODS AND DEVICES FOR MANAGING EVENTS RELATING TO THE SAFETY OF COMPUTER AIRCRAFT SYSTEMS |
US20100332593A1 (en) * | 2009-06-29 | 2010-12-30 | Igor Barash | Systems and methods for operating an anti-malware network on a cloud computing platform |
US8549641B2 (en) * | 2009-09-03 | 2013-10-01 | Palo Alto Research Center Incorporated | Pattern-based application classification |
US8779921B1 (en) * | 2010-05-14 | 2014-07-15 | Solio Security, Inc. | Adaptive security network, sensor node and method for detecting anomalous events in a security network |
US8356096B2 (en) * | 2010-05-28 | 2013-01-15 | Verizon Patent And Licensing Inc. | Apparatuses, method and system for network performance metric statistics from traffic link data, identifying, violating network elements associated with threshold violation using visual cue |
US8239529B2 (en) * | 2010-11-30 | 2012-08-07 | Google Inc. | Event management for hosted applications |
US9009185B2 (en) * | 2010-12-28 | 2015-04-14 | Sevone, Inc. | Scalable performance management system |
WO2013016245A1 (en) | 2011-07-22 | 2013-01-31 | Anne-Marie Turgeon | Systems and methods for network monitoring and testing using intelligent sequencing |
US20130074143A1 (en) * | 2011-09-15 | 2013-03-21 | Mcafee, Inc. | System and method for real-time customized threat protection |
US9137258B2 (en) | 2012-02-01 | 2015-09-15 | Brightpoint Security, Inc. | Techniques for sharing network security event information |
US8914406B1 (en) | 2012-02-01 | 2014-12-16 | Vorstack, Inc. | Scalable network security with fast response protocol |
US9710644B2 (en) * | 2012-02-01 | 2017-07-18 | Servicenow, Inc. | Techniques for sharing network security event information |
US9258195B1 (en) * | 2012-08-08 | 2016-02-09 | Shoretel, Inc. | Logical topology visualization |
US8782784B1 (en) | 2012-09-25 | 2014-07-15 | Emc Corporation | Framework for implementing security incident and event management in an enterprise |
US9485159B1 (en) * | 2012-12-17 | 2016-11-01 | Juniper Networks, Inc. | Rules-based network service management with on-demand dependency insertion |
US9239887B2 (en) | 2012-12-18 | 2016-01-19 | Cisco Technology, Inc. | Automatic correlation of dynamic system events within computing devices |
EP2747365A1 (en) * | 2012-12-21 | 2014-06-25 | British Telecommunications public limited company | Network security management |
FR3009163B1 (en) * | 2013-07-25 | 2015-09-04 | Thales Sa | METHOD FOR SECURITY EXCHANGE OF DATA ON AN AD-HOC NETWORK USING XCAST BROADCAST SERVICE; ASSOCIATED NODE |
WO2015069243A1 (en) * | 2013-11-06 | 2015-05-14 | Mcafee, Inc. | Context-aware network forensics |
US9686581B2 (en) | 2013-11-07 | 2017-06-20 | Cisco Technology, Inc. | Second-screen TV bridge |
US10366101B2 (en) | 2014-04-15 | 2019-07-30 | Splunk Inc. | Bidirectional linking of ephemeral event streams to creators of the ephemeral event streams |
US9762443B2 (en) | 2014-04-15 | 2017-09-12 | Splunk Inc. | Transformation of network data at remote capture agents |
US10127273B2 (en) | 2014-04-15 | 2018-11-13 | Splunk Inc. | Distributed processing of network data using remote capture agents |
US10693742B2 (en) | 2014-04-15 | 2020-06-23 | Splunk Inc. | Inline visualizations of metrics related to captured network data |
US11086897B2 (en) | 2014-04-15 | 2021-08-10 | Splunk Inc. | Linking event streams across applications of a data intake and query system |
US9923767B2 (en) * | 2014-04-15 | 2018-03-20 | Splunk Inc. | Dynamic configuration of remote capture agents for network data capture |
US10523521B2 (en) | 2014-04-15 | 2019-12-31 | Splunk Inc. | Managing ephemeral event streams generated from captured network data |
US11281643B2 (en) | 2014-04-15 | 2022-03-22 | Splunk Inc. | Generating event streams including aggregated values from monitored network data |
US10700950B2 (en) | 2014-04-15 | 2020-06-30 | Splunk Inc. | Adjusting network data storage based on event stream statistics |
US10462004B2 (en) | 2014-04-15 | 2019-10-29 | Splunk Inc. | Visualizations of statistics associated with captured network data |
US10360196B2 (en) | 2014-04-15 | 2019-07-23 | Splunk Inc. | Grouping and managing event streams generated from captured network data |
US10222935B2 (en) | 2014-04-23 | 2019-03-05 | Cisco Technology Inc. | Treemap-type user interface |
US10261660B2 (en) * | 2014-06-25 | 2019-04-16 | Oracle International Corporation | Orbit visualization animation |
US9444829B1 (en) * | 2014-07-30 | 2016-09-13 | Symantec Corporation | Systems and methods for protecting computing resources based on logical data models |
US10412117B2 (en) | 2014-08-05 | 2019-09-10 | Dflabs S.P.A. | Method and system for automated cybersecurity incident and artifact visualization and correlation for security operation centers and computer emergency response teams |
US9756062B2 (en) * | 2014-08-27 | 2017-09-05 | General Electric Company | Collaborative infrastructure supporting cyber-security analytics in industrial networks |
US20160253046A1 (en) * | 2015-02-27 | 2016-09-01 | Cisco Technology, Inc. | Recording system state data and presenting a navigable graphical user interface |
US10454950B1 (en) * | 2015-06-30 | 2019-10-22 | Fireeye, Inc. | Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks |
US9516052B1 (en) | 2015-08-01 | 2016-12-06 | Splunk Inc. | Timeline displays of network security investigation events |
US10254934B2 (en) * | 2015-08-01 | 2019-04-09 | Splunk Inc. | Network security investigation workflow logging |
US9363149B1 (en) | 2015-08-01 | 2016-06-07 | Splunk Inc. | Management console for network security investigations |
CN105227358B (en) * | 2015-09-17 | 2019-07-09 | Oppo广东移动通信有限公司 | The setting method and system of network type |
US9998482B2 (en) | 2015-09-18 | 2018-06-12 | International Business Machines Corporation | Automated network interface attack response |
US9888024B2 (en) | 2015-09-30 | 2018-02-06 | Symantec Corporation | Detection of security incidents with low confidence security events |
US10686805B2 (en) | 2015-12-11 | 2020-06-16 | Servicenow, Inc. | Computer network threat assessment |
US10552615B2 (en) | 2016-02-18 | 2020-02-04 | Swimlane Llc | Threat response systems and methods |
US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
US10826933B1 (en) * | 2016-03-31 | 2020-11-03 | Fireeye, Inc. | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
US10103964B2 (en) | 2016-06-17 | 2018-10-16 | At&T Intellectual Property I, L.P. | Managing large volumes of event data records |
US10771492B2 (en) | 2016-09-22 | 2020-09-08 | Microsoft Technology Licensing, Llc | Enterprise graph method of threat detection |
US11250371B2 (en) | 2016-09-26 | 2022-02-15 | Splunk Inc. | Managing process analytics across process components |
US9781603B1 (en) * | 2016-10-20 | 2017-10-03 | Fortress Cyber Security, LLC | Combined network and physical security appliance |
US10372520B2 (en) | 2016-11-22 | 2019-08-06 | Cisco Technology, Inc. | Graphical user interface for visualizing a plurality of issues with an infrastructure |
US10739943B2 (en) | 2016-12-13 | 2020-08-11 | Cisco Technology, Inc. | Ordered list user interface |
US10652280B2 (en) * | 2017-04-24 | 2020-05-12 | Unisys Corporation | User interface features for enterprise security management |
US10333960B2 (en) | 2017-05-03 | 2019-06-25 | Servicenow, Inc. | Aggregating network security data for export |
US20180322295A1 (en) * | 2017-05-04 | 2018-11-08 | International Business Machines Corporation | Encoding information using word embedding |
US20180324207A1 (en) | 2017-05-05 | 2018-11-08 | Servicenow, Inc. | Network security threat intelligence sharing |
US10862867B2 (en) * | 2018-04-01 | 2020-12-08 | Cisco Technology, Inc. | Intelligent graphical user interface |
US10764149B2 (en) * | 2018-09-12 | 2020-09-01 | The Mitre Corporation | Cyber-physical system evaluation |
US11431734B2 (en) | 2019-04-18 | 2022-08-30 | Kyndryl, Inc. | Adaptive rule generation for security event correlation |
GB2585192A (en) * | 2019-06-30 | 2021-01-06 | British Telecomm | Impeding location threat propagation in computer networks |
EP3767913B1 (en) * | 2019-07-17 | 2023-08-02 | AO Kaspersky Lab | Systems and methods for correlating events to detect an information security incident |
RU2739864C1 (en) | 2019-07-17 | 2020-12-29 | Акционерное общество "Лаборатория Касперского" | System and method of correlating events for detecting information security incident |
US11245703B2 (en) | 2019-09-27 | 2022-02-08 | Bank Of America Corporation | Security tool for considering multiple security contexts |
US20220019340A1 (en) * | 2020-07-15 | 2022-01-20 | yuchen du | Social knowledge graph for collective learning |
US11601449B2 (en) * | 2020-07-21 | 2023-03-07 | Absolute Software Corporation | Event evaluation pipeline for alert engine |
US11711381B2 (en) | 2020-10-29 | 2023-07-25 | International Business Machines Corporation | Automatic hotspot identification in network graphs |
CN113179267B (en) * | 2021-04-27 | 2022-12-06 | 长扬科技(北京)股份有限公司 | Network security event correlation analysis method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5929855A (en) * | 1994-09-02 | 1999-07-27 | Square D Company | Monitoring and control system using graphical representations with prelinked parameters for devices within a network |
US20030033402A1 (en) * | 1996-07-18 | 2003-02-13 | Reuven Battat | Method and apparatus for intuitively administering networked computer systems |
Family Cites Families (71)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5566339A (en) | 1992-10-23 | 1996-10-15 | Fox Network Systems, Inc. | System and method for monitoring computer environment and operation |
JP3143539B2 (en) * | 1993-02-03 | 2001-03-07 | キヤノン株式会社 | Ink remaining amount detecting method and apparatus, and ink jet recording apparatus |
US6233575B1 (en) * | 1997-06-24 | 2001-05-15 | International Business Machines Corporation | Multilevel taxonomy based on features derived from training documents classification using fisher values as discrimination values |
US6088804A (en) * | 1998-01-12 | 2000-07-11 | Motorola, Inc. | Adaptive system and method for responding to computer network security attacks |
US6717949B1 (en) * | 1998-08-31 | 2004-04-06 | International Business Machines Corporation | System and method for IP network address translation using selective masquerade |
US6728885B1 (en) | 1998-10-09 | 2004-04-27 | Networks Associates Technology, Inc. | System and method for network access control using adaptive proxies |
US6321338B1 (en) | 1998-11-09 | 2001-11-20 | Sri International | Network surveillance |
US6550012B1 (en) | 1998-12-11 | 2003-04-15 | Network Associates, Inc. | Active firewall system and methodology |
US6609205B1 (en) * | 1999-03-18 | 2003-08-19 | Cisco Technology, Inc. | Network intrusion detection signature analysis using decision graphs |
US6502133B1 (en) | 1999-03-25 | 2002-12-31 | Lucent Technologies Inc. | Real-time event processing system with analysis engine using recovery information |
US6563824B1 (en) * | 1999-04-20 | 2003-05-13 | 3Com Corporation | Apparatus and methods for determining the correct workstation within a LAN for a LAN modem to route a packet |
US6886102B1 (en) | 1999-07-14 | 2005-04-26 | Symantec Corporation | System and method for protecting a computer network against denial of service attacks |
US7159030B1 (en) * | 1999-07-30 | 2007-01-02 | Intel Corporation | Associating a packet with a flow |
US6505192B1 (en) * | 1999-08-12 | 2003-01-07 | International Business Machines Corporation | Security rule processing for connectionless protocols |
US6647400B1 (en) | 1999-08-30 | 2003-11-11 | Symantec Corporation | System and method for analyzing filesystems to detect intrusions |
US6826697B1 (en) | 1999-08-30 | 2004-11-30 | Symantec Corporation | System and method for detecting buffer overflow attacks |
US7124204B2 (en) * | 1999-11-18 | 2006-10-17 | Amdocs (Israel) Ltd. | Threshold-based database synchronization system and method |
US6779120B1 (en) * | 2000-01-07 | 2004-08-17 | Securify, Inc. | Declarative language for specifying a security policy |
US6871284B2 (en) * | 2000-01-07 | 2005-03-22 | Securify, Inc. | Credential/condition assertion verification optimization |
US6535227B1 (en) * | 2000-02-08 | 2003-03-18 | Harris Corporation | System and method for assessing the security posture of a network and having a graphical user interface |
US6795918B1 (en) | 2000-03-07 | 2004-09-21 | Steven T. Trolan | Service level computer security |
WO2001084775A2 (en) * | 2000-04-28 | 2001-11-08 | Internet Security Systems, Inc. | System and method for managing security events on a network |
US6826564B2 (en) | 2000-07-10 | 2004-11-30 | Fastforward Networks | Scalable and programmable query distribution and collection in a network of queryable devices |
DE60116877T2 (en) * | 2000-08-11 | 2006-09-14 | British Telecommunications P.L.C. | SYSTEM AND METHOD FOR RECORDING EVENTS |
AU2001296925A1 (en) * | 2000-09-28 | 2002-04-08 | Vigilos, Inc. | Method and process for configuring a premises for monitoring |
US9027121B2 (en) * | 2000-10-10 | 2015-05-05 | International Business Machines Corporation | Method and system for creating a record for one or more computer security incidents |
WO2002069194A1 (en) | 2000-10-23 | 2002-09-06 | Xacct Technologies, Ltd. | Data collection system and method for reducing latency |
US20020152185A1 (en) * | 2001-01-03 | 2002-10-17 | Sasken Communication Technologies Limited | Method of network modeling and predictive event-correlation in a communication system by the use of contextual fuzzy cognitive maps |
JP2002261788A (en) | 2001-02-27 | 2002-09-13 | Mitsubishi Electric Corp | Firewall managing apparatus and method |
US6920453B2 (en) * | 2001-12-31 | 2005-07-19 | Nokia Corporation | Method and system for finding a query-subset of events within a master-set of events |
KR100437169B1 (en) | 2001-05-04 | 2004-06-25 | 이재형 | Network traffic flow control system |
US6816455B2 (en) | 2001-05-09 | 2004-11-09 | Telecom Italia S.P.A. | Dynamic packet filter utilizing session tracking |
US6883162B2 (en) | 2001-06-06 | 2005-04-19 | Sun Microsystems, Inc. | Annotations for transaction tracing |
US20020194490A1 (en) * | 2001-06-18 | 2002-12-19 | Avner Halperin | System and method of virus containment in computer networks |
US7310666B2 (en) * | 2001-06-29 | 2007-12-18 | International Business Machines Corporation | Method and system for restricting and enhancing topology displays for multi-customer logical networks within a network management system |
US8438241B2 (en) * | 2001-08-14 | 2013-05-07 | Cisco Technology, Inc. | Detecting and protecting against worm traffic on a network |
US7379993B2 (en) * | 2001-09-13 | 2008-05-27 | Sri International | Prioritizing Bayes network alerts |
US7246166B1 (en) * | 2001-10-09 | 2007-07-17 | Nortel Networks Limited | Establishing a communications path via a multi-homed communications network |
US7398389B2 (en) | 2001-12-20 | 2008-07-08 | Coretrace Corporation | Kernel-based network security infrastructure |
US7324990B2 (en) * | 2002-02-07 | 2008-01-29 | The Relegence Corporation | Real time relevancy determination system and a method for calculating relevancy of real time information |
US7171689B2 (en) * | 2002-02-25 | 2007-01-30 | Symantec Corporation | System and method for tracking and filtering alerts in an enterprise and generating alert indications for analysis |
US6985479B2 (en) | 2002-03-04 | 2006-01-10 | Qualcomm Incorporated | Method and apparatus for processing internet protocol transmissions |
US7299504B1 (en) * | 2002-03-08 | 2007-11-20 | Lucent Technologies Inc. | System and method for implementing security management using a database-modeled security policy |
US7296074B2 (en) * | 2002-03-20 | 2007-11-13 | Scientific-Atlanta, Inc. | Media on demand session re-use |
TW588532B (en) | 2002-03-29 | 2004-05-21 | Realtek Semiconductor Corp | Management device and method of NAT/NAPT session |
EP1490768B1 (en) | 2002-03-29 | 2007-09-26 | Global Dataguard, Inc. | Adaptive behavioural intrusion detection |
US20030200192A1 (en) * | 2002-04-18 | 2003-10-23 | Bell Brian L. | Method of organizing information into topical, temporal, and location associations for organizing, selecting, and distributing information |
US7359962B2 (en) | 2002-04-30 | 2008-04-15 | 3Com Corporation | Network security system integration |
WO2003100617A1 (en) * | 2002-05-22 | 2003-12-04 | Lucid Security Corporation | Adaptive intrusion detection system |
US7574652B2 (en) | 2002-06-20 | 2009-08-11 | Canon Kabushiki Kaisha | Methods for interactively defining transforms and for generating queries by manipulating existing query data |
US20030236995A1 (en) * | 2002-06-21 | 2003-12-25 | Fretwell Lyman Jefferson | Method and apparatus for facilitating detection of network intrusion |
US7177859B2 (en) | 2002-06-26 | 2007-02-13 | Microsoft Corporation | Programming model for subscription services |
EP1535164B1 (en) | 2002-08-26 | 2012-01-04 | International Business Machines Corporation | Determining threat level associated with network activity |
US20040049698A1 (en) * | 2002-09-06 | 2004-03-11 | Ott Allen Eugene | Computer network security system utilizing dynamic mobile sensor agents |
US6952779B1 (en) * | 2002-10-01 | 2005-10-04 | Gideon Cohen | System and method for risk detection and analysis in a computer network |
US7961594B2 (en) * | 2002-10-23 | 2011-06-14 | Onaro, Inc. | Methods and systems for history analysis for access paths in networks |
US7603711B2 (en) | 2002-10-31 | 2009-10-13 | Secnap Networks Security, LLC | Intrusion detection system |
CN1419361A (en) * | 2002-10-31 | 2003-05-21 | 上海交通大学 | Intelligent monitoring administration method for picture on network |
TWI234969B (en) * | 2002-11-26 | 2005-06-21 | Ind Tech Res Inst | Dynamic network address translation system and method of transparent private network device |
US7941854B2 (en) | 2002-12-05 | 2011-05-10 | International Business Machines Corporation | Method and system for responding to a computer intrusion |
US7483972B2 (en) * | 2003-01-08 | 2009-01-27 | Cisco Technology, Inc. | Network security monitoring system |
US7478151B1 (en) * | 2003-01-23 | 2009-01-13 | Gomez, Inc. | System and method for monitoring global network performance |
US6985920B2 (en) | 2003-06-23 | 2006-01-10 | Protego Networks Inc. | Method and system for determining intra-session event correlation across network address translation devices |
US7596807B2 (en) * | 2003-07-03 | 2009-09-29 | Arbor Networks, Inc. | Method and system for reducing scope of self-propagating attack code in network |
US7295831B2 (en) * | 2003-08-12 | 2007-11-13 | 3E Technologies International, Inc. | Method and system for wireless intrusion detection prevention and security management |
US7761918B2 (en) | 2004-04-13 | 2010-07-20 | Tenable Network Security, Inc. | System and method for scanning a network |
US20060020582A1 (en) | 2004-07-22 | 2006-01-26 | International Business Machines Corporation | Method and system for processing abstract derived entities defined in a data abstraction model |
US7760653B2 (en) * | 2004-10-26 | 2010-07-20 | Riverbed Technology, Inc. | Stackable aggregation for connection based anomaly detection |
US7424742B1 (en) | 2004-10-27 | 2008-09-09 | Arcsight, Inc. | Dynamic security events and event channels in a network security system |
US20060242694A1 (en) * | 2004-11-08 | 2006-10-26 | Jeffrey Gold | Mitigation and mitigation management of attacks in networked systems |
US7627544B2 (en) | 2005-05-20 | 2009-12-01 | Microsoft Corporation | Recognizing event patterns from event streams |
-
2003
- 2003-09-12 US US10/661,224 patent/US7644365B2/en not_active Expired - Fee Related
-
2004
- 2004-09-03 CN CNB200480022035XA patent/CN100409148C/en active Active
- 2004-09-03 WO PCT/US2004/029185 patent/WO2005026900A2/en active Application Filing
- 2004-09-03 EP EP04788620.5A patent/EP1665011B1/en active Active
-
2009
- 2009-11-16 US US12/619,519 patent/US8423894B2/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5929855A (en) * | 1994-09-02 | 1999-07-27 | Square D Company | Monitoring and control system using graphical representations with prelinked parameters for devices within a network |
US20030033402A1 (en) * | 1996-07-18 | 2003-02-13 | Reuven Battat | Method and apparatus for intuitively administering networked computer systems |
Non-Patent Citations (1)
Title |
---|
See also references of EP1665011A4 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9027120B1 (en) | 2003-10-10 | 2015-05-05 | Hewlett-Packard Development Company, L.P. | Hierarchical architecture in a network security system |
Also Published As
Publication number | Publication date |
---|---|
US8423894B2 (en) | 2013-04-16 |
EP1665011B1 (en) | 2017-01-25 |
WO2005026900A2 (en) | 2005-03-24 |
US20100058165A1 (en) | 2010-03-04 |
US7644365B2 (en) | 2010-01-05 |
EP1665011A2 (en) | 2006-06-07 |
CN1829953A (en) | 2006-09-06 |
EP1665011A4 (en) | 2014-05-21 |
CN100409148C (en) | 2008-08-06 |
US20050060562A1 (en) | 2005-03-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005026900A3 (en) | Method and system for displaying network security incidents | |
WO2008076183A3 (en) | Customizable situational awareness dashboard and alerts, and associated systems and methods | |
WO2006107324A3 (en) | Method and apparatus for application window grouping and management | |
WO2007015725A3 (en) | Linking of personal information management data | |
WO2002091127A8 (en) | Notifying a consumer of changes made to a credit report | |
WO2003096556A3 (en) | Interactive chat messaging | |
CN104104910B (en) | It is a kind of to carry out two-way live shared terminal and method with intelligent monitoring | |
US20140207797A1 (en) | Methods, systems, and media for generating sentimental information associated with media content | |
CN206224515U (en) | A kind of intelligent advisement player with flow of the people acquisition function | |
WO2011075111A3 (en) | Method and apparatus for one-click reminder creation | |
WO2005048187A3 (en) | System and method for managing geospatially-enhanced agronomic data | |
WO2007142777A3 (en) | Systems and methods for distributed monitoring of remote sites | |
WO2009101629A3 (en) | A system and methods for positioning information from a plurality of users | |
WO2002045433A3 (en) | Interactive television application with research features | |
WO2013023837A3 (en) | A method and apparatus for determining an event instance | |
WO2005109908A3 (en) | Maintaining a graphical user interface state that is based on a selected piece of content | |
WO2005109904A3 (en) | Maintaining a graphical user interface state that is based on a selected type of content | |
WO2006025986A3 (en) | System and method for real-time configurable monitoring and management of task performance systems | |
WO2011129551A3 (en) | Device capable of notifying operation state change thereof through network and communication method of the device | |
CN106845318B (en) | Passenger flow information acquisition method and device, passenger flow information processing method and processing device | |
MY147617A (en) | Information processing system, network system situation presenting method and computer program. | |
WO2005024581A3 (en) | Method and implementation for real time retail | |
CN106502572A (en) | Display content changing method and electronic equipment | |
CN104239178A (en) | Monitoring system and monitoring method | |
WO2009019890A1 (en) | Communication device and its event processing method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200480022035.X Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BW BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE EG ES FI GB GD GE GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MK MN MW MX MZ NA NI NO NZ PG PH PL PT RO RU SC SD SE SG SK SY TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): BW GH GM KE LS MW MZ NA SD SZ TZ UG ZM ZW AM AZ BY KG MD RU TJ TM AT BE BG CH CY DE DK EE ES FI FR GB GR HU IE IT MC NL PL PT RO SE SI SK TR BF CF CG CI CM GA GN GQ GW ML MR SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
REEP | Request for entry into the european phase |
Ref document number: 2004788620 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004788620 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2004788620 Country of ref document: EP |