WO2005026900A3 - Method and system for displaying network security incidents - Google Patents

Method and system for displaying network security incidents Download PDF

Info

Publication number
WO2005026900A3
WO2005026900A3 PCT/US2004/029185 US2004029185W WO2005026900A3 WO 2005026900 A3 WO2005026900 A3 WO 2005026900A3 US 2004029185 W US2004029185 W US 2004029185W WO 2005026900 A3 WO2005026900 A3 WO 2005026900A3
Authority
WO
WIPO (PCT)
Prior art keywords
network
security
network security
event correlation
sessions
Prior art date
Application number
PCT/US2004/029185
Other languages
French (fr)
Other versions
WO2005026900A2 (en
Inventor
Partha Bhattacharya
Imin T Lee
Aji Joseph
Eli Stevens
Diwakar Naramreddy
Original Assignee
Protego Networks Inc
Partha Bhattacharya
Imin T Lee
Aji Joseph
Eli Stevens
Diwakar Naramreddy
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Protego Networks Inc, Partha Bhattacharya, Imin T Lee, Aji Joseph, Eli Stevens, Diwakar Naramreddy filed Critical Protego Networks Inc
Priority to EP04788620.5A priority Critical patent/EP1665011B1/en
Publication of WO2005026900A2 publication Critical patent/WO2005026900A2/en
Publication of WO2005026900A3 publication Critical patent/WO2005026900A3/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Abstract

A network security monitor system groups a plurality of security events into network sessions, correlates the network sessions according to a set of predefined network security event correlation rules and generates a security incident for the network sessions that satisfy one of the network security event correlation rules. The system then presents the information of the network sessions and security incidents to a user of the system in an intuitive form. The user is able to not only learn the details of a possible network attack, but also creates new security event correlation rules intuitively, including drop rules for dropping a particular type of events.
PCT/US2004/029185 2003-09-12 2004-09-03 Method and system for displaying network security incidents WO2005026900A2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP04788620.5A EP1665011B1 (en) 2003-09-12 2004-09-03 Method and system for displaying network security incidents

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/661,224 US7644365B2 (en) 2003-09-12 2003-09-12 Method and system for displaying network security incidents
US10/661,224 2003-09-12

Publications (2)

Publication Number Publication Date
WO2005026900A2 WO2005026900A2 (en) 2005-03-24
WO2005026900A3 true WO2005026900A3 (en) 2006-03-30

Family

ID=34273828

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2004/029185 WO2005026900A2 (en) 2003-09-12 2004-09-03 Method and system for displaying network security incidents

Country Status (4)

Country Link
US (2) US7644365B2 (en)
EP (1) EP1665011B1 (en)
CN (1) CN100409148C (en)
WO (1) WO2005026900A2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9027120B1 (en) 2003-10-10 2015-05-05 Hewlett-Packard Development Company, L.P. Hierarchical architecture in a network security system

Families Citing this family (112)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7376969B1 (en) 2002-12-02 2008-05-20 Arcsight, Inc. Real time monitoring and analysis of events from multiple network security devices
US8176527B1 (en) 2002-12-02 2012-05-08 Hewlett-Packard Development Company, L. P. Correlation engine with support for time-based rules
US7788722B1 (en) 2002-12-02 2010-08-31 Arcsight, Inc. Modular agent for network security intrusion detection system
US7899901B1 (en) 2002-12-02 2011-03-01 Arcsight, Inc. Method and apparatus for exercising and debugging correlations for network security system
US7607169B1 (en) 2002-12-02 2009-10-20 Arcsight, Inc. User interface for network security console
US7219239B1 (en) 2002-12-02 2007-05-15 Arcsight, Inc. Method for batching events for transmission by software agent
US7260844B1 (en) 2003-09-03 2007-08-21 Arcsight, Inc. Threat detection in a network security system
US8015604B1 (en) * 2003-10-10 2011-09-06 Arcsight Inc Hierarchical architecture in a network security system
US7565696B1 (en) 2003-12-10 2009-07-21 Arcsight, Inc. Synchronizing network security devices within a network security system
EP1544707A1 (en) * 2003-12-15 2005-06-22 Abb Research Ltd. Network security system
US8041799B1 (en) * 2004-04-30 2011-10-18 Sprint Communications Company L.P. Method and system for managing alarms in a communications network
US7509677B2 (en) * 2004-05-04 2009-03-24 Arcsight, Inc. Pattern discovery in a network security system
US7836506B2 (en) * 2004-09-22 2010-11-16 Cyberdefender Corporation Threat protection network
US7730494B1 (en) * 2005-04-20 2010-06-01 At&T Corp. Methods and apparatus for service and network management event correlation
US7644438B1 (en) 2004-10-27 2010-01-05 Arcsight, Inc. Security event aggregation at software agent
US9100422B1 (en) * 2004-10-27 2015-08-04 Hewlett-Packard Development Company, L.P. Network zone identification in a network security system
US7809131B1 (en) 2004-12-23 2010-10-05 Arcsight, Inc. Adjusting sensor time in a network security system
US7647632B1 (en) 2005-01-04 2010-01-12 Arcsight, Inc. Object reference in a system
US8850565B2 (en) 2005-01-10 2014-09-30 Hewlett-Packard Development Company, L.P. System and method for coordinating network incident response activities
US9256740B2 (en) 2005-02-22 2016-02-09 International Business Machines Corporation Method and system for analysis of security events in a managed computer network
US7844999B1 (en) 2005-03-01 2010-11-30 Arcsight, Inc. Message parsing in a network security system
US8806634B2 (en) * 2005-04-05 2014-08-12 Donald N. Cohen System for finding potential origins of spoofed internet protocol attack traffic
US7937344B2 (en) 2005-07-25 2011-05-03 Splunk Inc. Machine data web
US7882262B2 (en) * 2005-08-18 2011-02-01 Cisco Technology, Inc. Method and system for inline top N query computation
CN100429890C (en) * 2005-09-05 2008-10-29 北京启明星辰信息技术有限公司 Visable positioning method and system for network safety event
JP4459890B2 (en) * 2005-11-04 2010-04-28 株式会社日立製作所 Information processing apparatus, incident response apparatus control method, and program
US7930746B1 (en) * 2005-12-29 2011-04-19 At&T Intellectual Property Ii, L.P. Method and apparatus for detecting anomalous network activities
US7408458B1 (en) * 2005-12-29 2008-08-05 At&T Corp. Method and apparatus for suppressing duplicate alarms
US20070195776A1 (en) * 2006-02-23 2007-08-23 Zheng Danyang R System and method for channeling network traffic
US7823069B1 (en) * 2006-03-23 2010-10-26 Cisco Technology, Inc. Method and application tool for dynamically navigating a user customizable representation of a network device configuration
US8233388B2 (en) * 2006-05-30 2012-07-31 Cisco Technology, Inc. System and method for controlling and tracking network content flow
US8132260B1 (en) * 2006-06-12 2012-03-06 Redseal Systems, Inc. Methods and apparatus for prioritization of remediation techniques for network security risks
US9715675B2 (en) 2006-08-10 2017-07-25 Oracle International Corporation Event-driven customizable automated workflows for incident remediation
US9824107B2 (en) * 2006-10-25 2017-11-21 Entit Software Llc Tracking changing state data to assist in computer network security
IL181428A0 (en) * 2007-02-19 2007-07-04 Deutsche Telekom Ag Deployment of distributed network intrusion detection systems in social networks
US8108924B1 (en) * 2007-05-24 2012-01-31 Sprint Communications Company L.P. Providing a firewall's connection data in a comprehendible format
EP2194677B1 (en) * 2007-09-28 2012-11-14 Nippon Telegraph and Telephone Corporation Network monitoring device, network monitoring method, and network monitoring program
US8412922B2 (en) * 2007-10-24 2013-04-02 Sercomm Corporation On-site configuration of a hardware device module of a security system
US9154379B2 (en) * 2007-10-25 2015-10-06 Sercomm Corporation Remote configuration of a hardware device module of a security system
US20090254970A1 (en) * 2008-04-04 2009-10-08 Avaya Inc. Multi-tier security event correlation and mitigation
US8279768B2 (en) * 2008-05-05 2012-10-02 Eaton Corporation Methods, devices and computer program products for capturing events associated network anomalies
US20100064235A1 (en) * 2008-08-26 2010-03-11 Walls Marshall G Visual Intuitive Interactive Interwoven Multi-Layered Maintenance Support GUI
US8744806B2 (en) 2008-10-29 2014-06-03 Sevone, Inc. Scalable performance management system
FR2944117B1 (en) * 2009-04-06 2014-05-09 Airbus France METHODS AND DEVICES FOR MANAGING EVENTS RELATING TO THE SAFETY OF COMPUTER AIRCRAFT SYSTEMS
US20100332593A1 (en) * 2009-06-29 2010-12-30 Igor Barash Systems and methods for operating an anti-malware network on a cloud computing platform
US8549641B2 (en) * 2009-09-03 2013-10-01 Palo Alto Research Center Incorporated Pattern-based application classification
US8779921B1 (en) * 2010-05-14 2014-07-15 Solio Security, Inc. Adaptive security network, sensor node and method for detecting anomalous events in a security network
US8356096B2 (en) * 2010-05-28 2013-01-15 Verizon Patent And Licensing Inc. Apparatuses, method and system for network performance metric statistics from traffic link data, identifying, violating network elements associated with threshold violation using visual cue
US8239529B2 (en) * 2010-11-30 2012-08-07 Google Inc. Event management for hosted applications
US9009185B2 (en) * 2010-12-28 2015-04-14 Sevone, Inc. Scalable performance management system
WO2013016245A1 (en) 2011-07-22 2013-01-31 Anne-Marie Turgeon Systems and methods for network monitoring and testing using intelligent sequencing
US20130074143A1 (en) * 2011-09-15 2013-03-21 Mcafee, Inc. System and method for real-time customized threat protection
US9137258B2 (en) 2012-02-01 2015-09-15 Brightpoint Security, Inc. Techniques for sharing network security event information
US8914406B1 (en) 2012-02-01 2014-12-16 Vorstack, Inc. Scalable network security with fast response protocol
US9710644B2 (en) * 2012-02-01 2017-07-18 Servicenow, Inc. Techniques for sharing network security event information
US9258195B1 (en) * 2012-08-08 2016-02-09 Shoretel, Inc. Logical topology visualization
US8782784B1 (en) 2012-09-25 2014-07-15 Emc Corporation Framework for implementing security incident and event management in an enterprise
US9485159B1 (en) * 2012-12-17 2016-11-01 Juniper Networks, Inc. Rules-based network service management with on-demand dependency insertion
US9239887B2 (en) 2012-12-18 2016-01-19 Cisco Technology, Inc. Automatic correlation of dynamic system events within computing devices
EP2747365A1 (en) * 2012-12-21 2014-06-25 British Telecommunications public limited company Network security management
FR3009163B1 (en) * 2013-07-25 2015-09-04 Thales Sa METHOD FOR SECURITY EXCHANGE OF DATA ON AN AD-HOC NETWORK USING XCAST BROADCAST SERVICE; ASSOCIATED NODE
WO2015069243A1 (en) * 2013-11-06 2015-05-14 Mcafee, Inc. Context-aware network forensics
US9686581B2 (en) 2013-11-07 2017-06-20 Cisco Technology, Inc. Second-screen TV bridge
US10366101B2 (en) 2014-04-15 2019-07-30 Splunk Inc. Bidirectional linking of ephemeral event streams to creators of the ephemeral event streams
US9762443B2 (en) 2014-04-15 2017-09-12 Splunk Inc. Transformation of network data at remote capture agents
US10127273B2 (en) 2014-04-15 2018-11-13 Splunk Inc. Distributed processing of network data using remote capture agents
US10693742B2 (en) 2014-04-15 2020-06-23 Splunk Inc. Inline visualizations of metrics related to captured network data
US11086897B2 (en) 2014-04-15 2021-08-10 Splunk Inc. Linking event streams across applications of a data intake and query system
US9923767B2 (en) * 2014-04-15 2018-03-20 Splunk Inc. Dynamic configuration of remote capture agents for network data capture
US10523521B2 (en) 2014-04-15 2019-12-31 Splunk Inc. Managing ephemeral event streams generated from captured network data
US11281643B2 (en) 2014-04-15 2022-03-22 Splunk Inc. Generating event streams including aggregated values from monitored network data
US10700950B2 (en) 2014-04-15 2020-06-30 Splunk Inc. Adjusting network data storage based on event stream statistics
US10462004B2 (en) 2014-04-15 2019-10-29 Splunk Inc. Visualizations of statistics associated with captured network data
US10360196B2 (en) 2014-04-15 2019-07-23 Splunk Inc. Grouping and managing event streams generated from captured network data
US10222935B2 (en) 2014-04-23 2019-03-05 Cisco Technology Inc. Treemap-type user interface
US10261660B2 (en) * 2014-06-25 2019-04-16 Oracle International Corporation Orbit visualization animation
US9444829B1 (en) * 2014-07-30 2016-09-13 Symantec Corporation Systems and methods for protecting computing resources based on logical data models
US10412117B2 (en) 2014-08-05 2019-09-10 Dflabs S.P.A. Method and system for automated cybersecurity incident and artifact visualization and correlation for security operation centers and computer emergency response teams
US9756062B2 (en) * 2014-08-27 2017-09-05 General Electric Company Collaborative infrastructure supporting cyber-security analytics in industrial networks
US20160253046A1 (en) * 2015-02-27 2016-09-01 Cisco Technology, Inc. Recording system state data and presenting a navigable graphical user interface
US10454950B1 (en) * 2015-06-30 2019-10-22 Fireeye, Inc. Centralized aggregation technique for detecting lateral movement of stealthy cyber-attacks
US9516052B1 (en) 2015-08-01 2016-12-06 Splunk Inc. Timeline displays of network security investigation events
US10254934B2 (en) * 2015-08-01 2019-04-09 Splunk Inc. Network security investigation workflow logging
US9363149B1 (en) 2015-08-01 2016-06-07 Splunk Inc. Management console for network security investigations
CN105227358B (en) * 2015-09-17 2019-07-09 Oppo广东移动通信有限公司 The setting method and system of network type
US9998482B2 (en) 2015-09-18 2018-06-12 International Business Machines Corporation Automated network interface attack response
US9888024B2 (en) 2015-09-30 2018-02-06 Symantec Corporation Detection of security incidents with low confidence security events
US10686805B2 (en) 2015-12-11 2020-06-16 Servicenow, Inc. Computer network threat assessment
US10552615B2 (en) 2016-02-18 2020-02-04 Swimlane Llc Threat response systems and methods
US10893059B1 (en) 2016-03-31 2021-01-12 Fireeye, Inc. Verification and enhancement using detection systems located at the network periphery and endpoint devices
US10826933B1 (en) * 2016-03-31 2020-11-03 Fireeye, Inc. Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints
US10103964B2 (en) 2016-06-17 2018-10-16 At&T Intellectual Property I, L.P. Managing large volumes of event data records
US10771492B2 (en) 2016-09-22 2020-09-08 Microsoft Technology Licensing, Llc Enterprise graph method of threat detection
US11250371B2 (en) 2016-09-26 2022-02-15 Splunk Inc. Managing process analytics across process components
US9781603B1 (en) * 2016-10-20 2017-10-03 Fortress Cyber Security, LLC Combined network and physical security appliance
US10372520B2 (en) 2016-11-22 2019-08-06 Cisco Technology, Inc. Graphical user interface for visualizing a plurality of issues with an infrastructure
US10739943B2 (en) 2016-12-13 2020-08-11 Cisco Technology, Inc. Ordered list user interface
US10652280B2 (en) * 2017-04-24 2020-05-12 Unisys Corporation User interface features for enterprise security management
US10333960B2 (en) 2017-05-03 2019-06-25 Servicenow, Inc. Aggregating network security data for export
US20180322295A1 (en) * 2017-05-04 2018-11-08 International Business Machines Corporation Encoding information using word embedding
US20180324207A1 (en) 2017-05-05 2018-11-08 Servicenow, Inc. Network security threat intelligence sharing
US10862867B2 (en) * 2018-04-01 2020-12-08 Cisco Technology, Inc. Intelligent graphical user interface
US10764149B2 (en) * 2018-09-12 2020-09-01 The Mitre Corporation Cyber-physical system evaluation
US11431734B2 (en) 2019-04-18 2022-08-30 Kyndryl, Inc. Adaptive rule generation for security event correlation
GB2585192A (en) * 2019-06-30 2021-01-06 British Telecomm Impeding location threat propagation in computer networks
EP3767913B1 (en) * 2019-07-17 2023-08-02 AO Kaspersky Lab Systems and methods for correlating events to detect an information security incident
RU2739864C1 (en) 2019-07-17 2020-12-29 Акционерное общество "Лаборатория Касперского" System and method of correlating events for detecting information security incident
US11245703B2 (en) 2019-09-27 2022-02-08 Bank Of America Corporation Security tool for considering multiple security contexts
US20220019340A1 (en) * 2020-07-15 2022-01-20 yuchen du Social knowledge graph for collective learning
US11601449B2 (en) * 2020-07-21 2023-03-07 Absolute Software Corporation Event evaluation pipeline for alert engine
US11711381B2 (en) 2020-10-29 2023-07-25 International Business Machines Corporation Automatic hotspot identification in network graphs
CN113179267B (en) * 2021-04-27 2022-12-06 长扬科技(北京)股份有限公司 Network security event correlation analysis method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5929855A (en) * 1994-09-02 1999-07-27 Square D Company Monitoring and control system using graphical representations with prelinked parameters for devices within a network
US20030033402A1 (en) * 1996-07-18 2003-02-13 Reuven Battat Method and apparatus for intuitively administering networked computer systems

Family Cites Families (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5566339A (en) 1992-10-23 1996-10-15 Fox Network Systems, Inc. System and method for monitoring computer environment and operation
JP3143539B2 (en) * 1993-02-03 2001-03-07 キヤノン株式会社 Ink remaining amount detecting method and apparatus, and ink jet recording apparatus
US6233575B1 (en) * 1997-06-24 2001-05-15 International Business Machines Corporation Multilevel taxonomy based on features derived from training documents classification using fisher values as discrimination values
US6088804A (en) * 1998-01-12 2000-07-11 Motorola, Inc. Adaptive system and method for responding to computer network security attacks
US6717949B1 (en) * 1998-08-31 2004-04-06 International Business Machines Corporation System and method for IP network address translation using selective masquerade
US6728885B1 (en) 1998-10-09 2004-04-27 Networks Associates Technology, Inc. System and method for network access control using adaptive proxies
US6321338B1 (en) 1998-11-09 2001-11-20 Sri International Network surveillance
US6550012B1 (en) 1998-12-11 2003-04-15 Network Associates, Inc. Active firewall system and methodology
US6609205B1 (en) * 1999-03-18 2003-08-19 Cisco Technology, Inc. Network intrusion detection signature analysis using decision graphs
US6502133B1 (en) 1999-03-25 2002-12-31 Lucent Technologies Inc. Real-time event processing system with analysis engine using recovery information
US6563824B1 (en) * 1999-04-20 2003-05-13 3Com Corporation Apparatus and methods for determining the correct workstation within a LAN for a LAN modem to route a packet
US6886102B1 (en) 1999-07-14 2005-04-26 Symantec Corporation System and method for protecting a computer network against denial of service attacks
US7159030B1 (en) * 1999-07-30 2007-01-02 Intel Corporation Associating a packet with a flow
US6505192B1 (en) * 1999-08-12 2003-01-07 International Business Machines Corporation Security rule processing for connectionless protocols
US6647400B1 (en) 1999-08-30 2003-11-11 Symantec Corporation System and method for analyzing filesystems to detect intrusions
US6826697B1 (en) 1999-08-30 2004-11-30 Symantec Corporation System and method for detecting buffer overflow attacks
US7124204B2 (en) * 1999-11-18 2006-10-17 Amdocs (Israel) Ltd. Threshold-based database synchronization system and method
US6779120B1 (en) * 2000-01-07 2004-08-17 Securify, Inc. Declarative language for specifying a security policy
US6871284B2 (en) * 2000-01-07 2005-03-22 Securify, Inc. Credential/condition assertion verification optimization
US6535227B1 (en) * 2000-02-08 2003-03-18 Harris Corporation System and method for assessing the security posture of a network and having a graphical user interface
US6795918B1 (en) 2000-03-07 2004-09-21 Steven T. Trolan Service level computer security
WO2001084775A2 (en) * 2000-04-28 2001-11-08 Internet Security Systems, Inc. System and method for managing security events on a network
US6826564B2 (en) 2000-07-10 2004-11-30 Fastforward Networks Scalable and programmable query distribution and collection in a network of queryable devices
DE60116877T2 (en) * 2000-08-11 2006-09-14 British Telecommunications P.L.C. SYSTEM AND METHOD FOR RECORDING EVENTS
AU2001296925A1 (en) * 2000-09-28 2002-04-08 Vigilos, Inc. Method and process for configuring a premises for monitoring
US9027121B2 (en) * 2000-10-10 2015-05-05 International Business Machines Corporation Method and system for creating a record for one or more computer security incidents
WO2002069194A1 (en) 2000-10-23 2002-09-06 Xacct Technologies, Ltd. Data collection system and method for reducing latency
US20020152185A1 (en) * 2001-01-03 2002-10-17 Sasken Communication Technologies Limited Method of network modeling and predictive event-correlation in a communication system by the use of contextual fuzzy cognitive maps
JP2002261788A (en) 2001-02-27 2002-09-13 Mitsubishi Electric Corp Firewall managing apparatus and method
US6920453B2 (en) * 2001-12-31 2005-07-19 Nokia Corporation Method and system for finding a query-subset of events within a master-set of events
KR100437169B1 (en) 2001-05-04 2004-06-25 이재형 Network traffic flow control system
US6816455B2 (en) 2001-05-09 2004-11-09 Telecom Italia S.P.A. Dynamic packet filter utilizing session tracking
US6883162B2 (en) 2001-06-06 2005-04-19 Sun Microsystems, Inc. Annotations for transaction tracing
US20020194490A1 (en) * 2001-06-18 2002-12-19 Avner Halperin System and method of virus containment in computer networks
US7310666B2 (en) * 2001-06-29 2007-12-18 International Business Machines Corporation Method and system for restricting and enhancing topology displays for multi-customer logical networks within a network management system
US8438241B2 (en) * 2001-08-14 2013-05-07 Cisco Technology, Inc. Detecting and protecting against worm traffic on a network
US7379993B2 (en) * 2001-09-13 2008-05-27 Sri International Prioritizing Bayes network alerts
US7246166B1 (en) * 2001-10-09 2007-07-17 Nortel Networks Limited Establishing a communications path via a multi-homed communications network
US7398389B2 (en) 2001-12-20 2008-07-08 Coretrace Corporation Kernel-based network security infrastructure
US7324990B2 (en) * 2002-02-07 2008-01-29 The Relegence Corporation Real time relevancy determination system and a method for calculating relevancy of real time information
US7171689B2 (en) * 2002-02-25 2007-01-30 Symantec Corporation System and method for tracking and filtering alerts in an enterprise and generating alert indications for analysis
US6985479B2 (en) 2002-03-04 2006-01-10 Qualcomm Incorporated Method and apparatus for processing internet protocol transmissions
US7299504B1 (en) * 2002-03-08 2007-11-20 Lucent Technologies Inc. System and method for implementing security management using a database-modeled security policy
US7296074B2 (en) * 2002-03-20 2007-11-13 Scientific-Atlanta, Inc. Media on demand session re-use
TW588532B (en) 2002-03-29 2004-05-21 Realtek Semiconductor Corp Management device and method of NAT/NAPT session
EP1490768B1 (en) 2002-03-29 2007-09-26 Global Dataguard, Inc. Adaptive behavioural intrusion detection
US20030200192A1 (en) * 2002-04-18 2003-10-23 Bell Brian L. Method of organizing information into topical, temporal, and location associations for organizing, selecting, and distributing information
US7359962B2 (en) 2002-04-30 2008-04-15 3Com Corporation Network security system integration
WO2003100617A1 (en) * 2002-05-22 2003-12-04 Lucid Security Corporation Adaptive intrusion detection system
US7574652B2 (en) 2002-06-20 2009-08-11 Canon Kabushiki Kaisha Methods for interactively defining transforms and for generating queries by manipulating existing query data
US20030236995A1 (en) * 2002-06-21 2003-12-25 Fretwell Lyman Jefferson Method and apparatus for facilitating detection of network intrusion
US7177859B2 (en) 2002-06-26 2007-02-13 Microsoft Corporation Programming model for subscription services
EP1535164B1 (en) 2002-08-26 2012-01-04 International Business Machines Corporation Determining threat level associated with network activity
US20040049698A1 (en) * 2002-09-06 2004-03-11 Ott Allen Eugene Computer network security system utilizing dynamic mobile sensor agents
US6952779B1 (en) * 2002-10-01 2005-10-04 Gideon Cohen System and method for risk detection and analysis in a computer network
US7961594B2 (en) * 2002-10-23 2011-06-14 Onaro, Inc. Methods and systems for history analysis for access paths in networks
US7603711B2 (en) 2002-10-31 2009-10-13 Secnap Networks Security, LLC Intrusion detection system
CN1419361A (en) * 2002-10-31 2003-05-21 上海交通大学 Intelligent monitoring administration method for picture on network
TWI234969B (en) * 2002-11-26 2005-06-21 Ind Tech Res Inst Dynamic network address translation system and method of transparent private network device
US7941854B2 (en) 2002-12-05 2011-05-10 International Business Machines Corporation Method and system for responding to a computer intrusion
US7483972B2 (en) * 2003-01-08 2009-01-27 Cisco Technology, Inc. Network security monitoring system
US7478151B1 (en) * 2003-01-23 2009-01-13 Gomez, Inc. System and method for monitoring global network performance
US6985920B2 (en) 2003-06-23 2006-01-10 Protego Networks Inc. Method and system for determining intra-session event correlation across network address translation devices
US7596807B2 (en) * 2003-07-03 2009-09-29 Arbor Networks, Inc. Method and system for reducing scope of self-propagating attack code in network
US7295831B2 (en) * 2003-08-12 2007-11-13 3E Technologies International, Inc. Method and system for wireless intrusion detection prevention and security management
US7761918B2 (en) 2004-04-13 2010-07-20 Tenable Network Security, Inc. System and method for scanning a network
US20060020582A1 (en) 2004-07-22 2006-01-26 International Business Machines Corporation Method and system for processing abstract derived entities defined in a data abstraction model
US7760653B2 (en) * 2004-10-26 2010-07-20 Riverbed Technology, Inc. Stackable aggregation for connection based anomaly detection
US7424742B1 (en) 2004-10-27 2008-09-09 Arcsight, Inc. Dynamic security events and event channels in a network security system
US20060242694A1 (en) * 2004-11-08 2006-10-26 Jeffrey Gold Mitigation and mitigation management of attacks in networked systems
US7627544B2 (en) 2005-05-20 2009-12-01 Microsoft Corporation Recognizing event patterns from event streams

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5929855A (en) * 1994-09-02 1999-07-27 Square D Company Monitoring and control system using graphical representations with prelinked parameters for devices within a network
US20030033402A1 (en) * 1996-07-18 2003-02-13 Reuven Battat Method and apparatus for intuitively administering networked computer systems

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP1665011A4 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9027120B1 (en) 2003-10-10 2015-05-05 Hewlett-Packard Development Company, L.P. Hierarchical architecture in a network security system

Also Published As

Publication number Publication date
US8423894B2 (en) 2013-04-16
EP1665011B1 (en) 2017-01-25
WO2005026900A2 (en) 2005-03-24
US20100058165A1 (en) 2010-03-04
US7644365B2 (en) 2010-01-05
EP1665011A2 (en) 2006-06-07
CN1829953A (en) 2006-09-06
EP1665011A4 (en) 2014-05-21
CN100409148C (en) 2008-08-06
US20050060562A1 (en) 2005-03-17

Similar Documents

Publication Publication Date Title
WO2005026900A3 (en) Method and system for displaying network security incidents
WO2008076183A3 (en) Customizable situational awareness dashboard and alerts, and associated systems and methods
WO2006107324A3 (en) Method and apparatus for application window grouping and management
WO2007015725A3 (en) Linking of personal information management data
WO2002091127A8 (en) Notifying a consumer of changes made to a credit report
WO2003096556A3 (en) Interactive chat messaging
CN104104910B (en) It is a kind of to carry out two-way live shared terminal and method with intelligent monitoring
US20140207797A1 (en) Methods, systems, and media for generating sentimental information associated with media content
CN206224515U (en) A kind of intelligent advisement player with flow of the people acquisition function
WO2011075111A3 (en) Method and apparatus for one-click reminder creation
WO2005048187A3 (en) System and method for managing geospatially-enhanced agronomic data
WO2007142777A3 (en) Systems and methods for distributed monitoring of remote sites
WO2009101629A3 (en) A system and methods for positioning information from a plurality of users
WO2002045433A3 (en) Interactive television application with research features
WO2013023837A3 (en) A method and apparatus for determining an event instance
WO2005109908A3 (en) Maintaining a graphical user interface state that is based on a selected piece of content
WO2005109904A3 (en) Maintaining a graphical user interface state that is based on a selected type of content
WO2006025986A3 (en) System and method for real-time configurable monitoring and management of task performance systems
WO2011129551A3 (en) Device capable of notifying operation state change thereof through network and communication method of the device
CN106845318B (en) Passenger flow information acquisition method and device, passenger flow information processing method and processing device
MY147617A (en) Information processing system, network system situation presenting method and computer program.
WO2005024581A3 (en) Method and implementation for real time retail
CN106502572A (en) Display content changing method and electronic equipment
CN104239178A (en) Monitoring system and monitoring method
WO2009019890A1 (en) Communication device and its event processing method

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 200480022035.X

Country of ref document: CN

AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BW BY BZ CA CH CN CO CR CU CZ DK DM DZ EC EE EG ES FI GB GD GE GM HR HU ID IL IN IS JP KE KG KP KZ LC LK LR LS LT LU LV MA MD MK MN MW MX MZ NA NI NO NZ PG PH PL PT RO RU SC SD SE SG SK SY TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): BW GH GM KE LS MW MZ NA SD SZ TZ UG ZM ZW AM AZ BY KG MD RU TJ TM AT BE BG CH CY DE DK EE ES FI FR GB GR HU IE IT MC NL PL PT RO SE SI SK TR BF CF CG CI CM GA GN GQ GW ML MR SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
REEP Request for entry into the european phase

Ref document number: 2004788620

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2004788620

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2004788620

Country of ref document: EP